Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

Crypto-Asset Exchange Security Guidelines
Crypto-Asset Exchange Security Guidelines
Who it's for:
 Users, operators, and auditors of crypto-asset exchanges 

Crypto-Asset Exchange Security Guidelines

Release Date: 04/13/2021

Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitude of security questions arise: What risks should cryptocurrency users be aware of? How can they protect themselves? What security controls should operators put in place?

Experts have identified crypto-asset exchanges as a major pain point of crypto security. Exchanges are platforms that mediate crypto-asset transactions between entities. There are several types of attacks that are successful against exchanges. In this document, we give an overview of these attacks, describe an exchange security reference architecture, and then provide a detailed list of crypto-asset exchange security best practices, administrative controls, and physical controls. This is part of an ongoing project by the Blockchain/Distributed Ledger Working Group.

Key Takeaways:
  • The types of attacks that threaten crypto-asset exchanges
  • The details of a centralized exchange reference architecture that applies to a broad spectrum of crypto-asset exchanges
  • Crypto-asset exchange security best practices for end-users, exchange operators, and auditors
  • Crypto-asset exchange administrative and physical security control measures including: legal considerations, risk management, information access management, security awareness and training, workstation security, and more
This publication is part of a larger series on Securing DLT Frameworks for Financial Institutes. If you’re interested in learning more, you can find all the papers in the series here
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
CSA CCM v4.0 Addendum - IBM Cloud Framework for Financial Services v1.1.0
CSA CCM v4.0 Addendum - IBM Cloud Framework for...
Enhancing AI Reliability: Introducing the LLM Observability & Trust API
Enhancing AI Reliability: Introducing the LLM Observability & Trust...
Published: 07/19/2024
And now for something completely different… a Cloud Security Alliance RFI
And now for something completely different… a Cloud Security Allian...
Published: 07/01/2024
AI Resilience & Diversity
AI Resilience & Diversity
Published: 06/20/2024
Cloud Threats Deploying Crypto CDN
Cloud Threats Deploying Crypto CDN
Published: 06/03/2024

Acknowledgements

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

Jyoti Ponnapalli
Jyoti Ponnapalli

Jyoti Ponnapalli

Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...

Read more

Ken Huang
Ken Huang
Chief AI Officer at DistributedApps.ai

Ken Huang

Chief AI Officer at DistributedApps.ai

Ken Huang is an acclaimed author of 8 books on AI and Web3. He is the Co-Chair of the AI Organizational Responsibility Working Group and AI Control Framework at the Cloud Security Alliance. Additionally, Huang serves as Chief AI Officer of DistributedApps.ai, which provides training and consulting services for Generative AI Security.

In addition, Huang contributed extensively to key initiatives in the space. He is a core contributor t...

Read more

Dave Jevans Headshot Missing
Dave Jevans

Dave Jevans

Boulevard A. Aladetoyinbo Esq. Headshot Missing
Boulevard A. Aladetoyinbo Esq.

Boulevard A. Aladetoyinbo Esq.

Abdulwahab AL-Zuaby Headshot Missing
Abdulwahab AL-Zuaby

Abdulwahab AL-Zuaby

Kurt Seifried
Kurt Seifried
Chief Blockchain Officer & Director of Special Projects, CSA

Kurt Seifried

Chief Blockchain Officer & Director of Special Projects, CSA

For over 2 decades Kurt has been involved in the information security field, starting with Windows and Linux and continuing on to cloud and now Blockchain. With a strong focus on security and privacy Kurt brings a wealth of knowledge and experience to the CSA.

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training