Download Publication
Who it's for:
- Security Engineers
- Cloud Customers, CISOs / CTOs / CIOs
- Cybersecurity Professionals
- Cloud Security Practitioners
- IT Analysts, Program and Project Managers
Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations
Release Date: 02/16/2022
Working Group: Blockchain/Distributed Ledger
There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockchain technology interact with enterprise security services to deliver specific security outcomes. This holistic approach does not shy away from the hard work of operating production blockchain networks within computer networks constrained by critical sector requirements, such as security accreditation, PCI DSS segmentation, etc. These insights offer a method that can help organizations to deploy DLT solutions that are secure, cost-effective, and meet regulatory and compliance requirements for organizations. It also provides recommendations for Hyperledger Fabric that could be applied to other permissioned blockchains.
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Kurt Seifried
Chief Innovation Officer, CSA
Kurt Seifried
Chief Innovation Officer, CSA
For over two decades, Kurt has excelled in information security, starting with Windows and Linux, and advancing to cloud computing and AI. With a strong focus on AI security, privacy, and open source, Kurt brings extensive expertise to the Cloud Security Alliance (CSA).
Terri Jackson
Terri Jackson
Anis Hammami
Anis Hammami
Goni Sarakinov
Goni Sarakinov
Dr Frederick Wamala
Director, Enterprise Security Architecture - Cryptography at Cyber PLC Ltd
Dr Frederick Wamala
Director, Enterprise Security Architecture - Cryptography at Cyber PLC Ltd
Daniel Skipworth
Daniel Skipworth
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more