Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Corda Enterprise 4.8 - Architecture Security Report
Corda Enterprise 4.8 - Architecture Security Report
Who it's for:

  • CISO
  • CSO
  • Blockchain Architects
  • Security Architects
  • Application and Smart Contract Developers
  • Blockchain Network Administrators

Corda Enterprise 4.8 - Architecture Security Report

Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many of these workflows involve transactions and custody of value in the form of digital assets or other high-value data, cybersecurity attributes such as privacy, confidentiality, integrity, and availability certainly take center stage in the blockchain space.

This report from our Blockchain/Distributed Ledger Working Group aims to address the above concerns by examining the cybersecurity risks of the blockchain framework Corda Enterprise 4.8 when it is implemented as a permissioned enterprise network for a trade finance business in a cloud-based environment.

Then, in the accompanying Corda Enterprise 4.8 - Security Controls Checklist, we deliver a fully implementable security controls checklist for Corda 4.8 aligned with the NIST Cybersecurity Framework.

Key Takeaways:
  • An overview of how a Corda 4.8 Permissioned Blockchain Network was used to depict a simple transaction within a trade finance workflow
  • The steps and methodology used to identify Corda 4.8 security risks
  • The results of a Corda 4.8 threat analysis, how to mitigate the discovered risks, and recommendations for a risk-based incident response strategy
  • Cryptography module recommendations for a Corda 4.8 Permissioned Network
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
How Cloud-Native Architectures Reshape Security: SOC2 and Secrets Management
How Cloud-Native Architectures Reshape Security: SOC2 and Secrets M...
Published: 11/22/2024
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024

Acknowledgements

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Urmila Nagvekar
Urmila Nagvekar

Urmila Nagvekar

Urmila Nagvekar is a Certified Information Systems Security Professional (CISSP), with a combined 27 years in Information Technology, Security, and Privacy involving leading Cybersecurity, Information Risk Management, and Data Privacy Programs as business value drivers for Engineering and Geoscience with oil majors.

She has been actively contributing and presenting topics related to Blockchain Security at CSA’s Blockchain/DLT Working ...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Michael Theriault Headshot Missing
Michael Theriault

Michael Theriault

Jyoti Ponnapalli
Jyoti Ponnapalli

Jyoti Ponnapalli

Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...

Read more

Huili Wang Headshot Missing
Huili Wang

Huili Wang

Teju Oyewole Headshot Missing
Teju Oyewole

Teju Oyewole

Frederic de Vaulx Headshot Missing
Frederic de Vaulx

Frederic de Vaulx

Goni Sarakinov Headshot Missing
Goni Sarakinov

Goni Sarakinov

Gustavo Arreaza Headshot Missing
Gustavo Arreaza

Gustavo Arreaza

John Carpenter Headshot Missing
John Carpenter

John Carpenter

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training