Cyber Security

Factors to Consider When Designing Blockchain Solutions- CSA

Paper provides insights into the three layers of distributed ledger technology and how they interact with enterprise security services to deliver specific security outcomes

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released the Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations report. Drafted by the CSA Blockchain/Distributed Ledger Working Group, the report encourages stakeholders to take a holistic view of blockchain/DLT network security by providing a reference security architecture to guide stakeholders’ thinking around the why, what, and how aspects of Hyperledger Fabric security.

The paper explains the three layers of blockchain security (conceptual, component interaction, and technology) and their interaction with on-premises and cloud IT environments of organizations in critical sectors. It addresses both the value of security controls in terms of controlling an organization’s exposure to operational risk, but also how the security measures can enable organizations to exploit business opportunities.

“There is no shortage of guidance on how to design, configure, and deploy Hyperledger Fabric, but too few documents take a systematic approach to Fabric security that recognizes that durable security always starts with requirements,” said Dr. Frederick Wamala, the paper’s lead author. “Configuration-led fabric guidance, for instance, rarely explains why high assurance security controls are needed to obtain authorization to operate blockchain solutions in critical sectors. We wanted to close the information gap by highlighting the steps that should be considered when designing these types of blockchain solutions.”

The document offers guidance in helping:

  • Business and government leaders understand the true risk balance of using blockchain and the resultant security, financial, regulatory, reputational, business, and consumer risks
  • Chief Information Security Officers and enterprise security architects assess the risk of introducing DLT components into a corporate network while maintaining compliance
  • Regulators and internal risk managers evaluate the potential risks associated with financial crime, consumer exposure, and espionage and devise appropriate policies in response
  • Individuals gain high-level knowledge about blockchain security and reduce their exposure to fraudulent activity and unsuitable products

The Blockchain/Distributed Ledger Working Group works to produce useful content to educate different industries on blockchain and its proper use, as well as define blockchain security and compliance requirements based upon different industries and use cases. Individuals interested in becoming involved in Blockchain/Distributed Ledger future research and initiatives are invited to join the working group.

For more such updates and perspectives around Digital Innovation, IoT, Data Infrastructure, AI & Cybersecurity, go to AI-Techpark.com.

Related posts

Cybersecurity leader Accedian Achieves its 3rd ISO Certification

PR Newswire

Expel unveils Updated NIST CSF 2.0 Getting Started Toolkit

Business Wire

ESET Announces ESET PROTECT Elite

PR Newswire