Circle
Events
Blog

Download Publication

Crypto-Asset Exchange Security Guidelines
Crypto-Asset Exchange Security Guidelines
Who it's for:
 Users, operators, and auditors of crypto-asset exchanges 

Crypto-Asset Exchange Security Guidelines

Release Date: 04/13/2021

Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitude of security questions arise: What risks should cryptocurrency users be aware of? How can they protect themselves? What security controls should operators put in place?

Experts have identified crypto-asset exchanges as a major pain point of crypto security. Exchanges are platforms that mediate crypto-asset transactions between entities. There are several types of attacks that are successful against exchanges. In this document, we give an overview of these attacks, describe an exchange security reference architecture, and then provide a detailed list of crypto-asset exchange security best practices, administrative controls, and physical controls. This is part of an ongoing project by the Blockchain/Distributed Ledger Working Group.

Key Takeaways:
  • The types of attacks that threaten crypto-asset exchanges
  • The details of a centralized exchange reference architecture that applies to a broad spectrum of crypto-asset exchanges
  • Crypto-asset exchange security best practices for end-users, exchange operators, and auditors
  • Crypto-asset exchange administrative and physical security control measures including: legal considerations, risk management, information access management, security awareness and training, workstation security, and more
This publication is part of a larger series on Securing DLT Frameworks for Financial Institutes. If you’re interested in learning more, you can find all the papers in the series here

Fill out this form to access this resource.

In my current job I work in:

Can we send you emails about other CSA projects?

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).

Can we send you emails about other CSA projects?

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).

Download
Provide feedback on this form

Acknowledgements

Bill Izzo Headshot
Bill Izzo

Bill Izzo

This person does not have a biography listed with CSA.

Ashish Mehta Headshot
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?