Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Best Practices for Smart Contract Security Hyperledger Fabric
Best Practices for Smart Contract Security Hyperledger Fabric
Who it's for:
  • CISOs / CTOs / CIOs
  • Cybersecurity professionals
  • Secure software development managers
  • Security engineers
  • Developers

Best Practices for Smart Contract Security Hyperledger Fabric

Release Date: 05/18/2022

The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for Smart Contract Developers to gain an understanding of the benefits, challenges, and opportunities for deploying smart contracts within their organization. The reader should also gain an understanding of many of the legal, regulatory, and security considerations that must be taken to count when using any smart contract.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure w...
Published: 04/24/2024
Neutralizing the Threat with Cloud Remediation
Neutralizing the Threat with Cloud Remediation
Published: 04/23/2024
10 Tips to Guide Your Cloud Email Security Strategy
10 Tips to Guide Your Cloud Email Security Strategy
Published: 04/17/2024
The Widening Overlap Between Cloud Workloads and Cybersecurity
The Widening Overlap Between Cloud Workloads and Cybersecurity
Published: 04/17/2024

Acknowledgements

Gustavo Arreaza Headshot Missing
Gustavo Arreaza

Gustavo Arreaza

This person does not have a biography listed with CSA.

John Carpenter Headshot Missing
John Carpenter

John Carpenter

This person does not have a biography listed with CSA.

Jyoti Ponnapalli
Jyoti Ponnapalli

Jyoti Ponnapalli

Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...

Read more

Michael Theriault Headshot Missing
Michael Theriault

Michael Theriault

This person does not have a biography listed with CSA.

Raul Documet Headshot Missing
Raul Documet

Raul Documet

This person does not have a biography listed with CSA.

Ulf Mattsson Headshot Missing
Ulf Mattsson

Ulf Mattsson

This person does not have a biography listed with CSA.

Nnamdi Osuagwgu Headshot Missing
Nnamdi Osuagwgu

Nnamdi Osuagwgu

This person does not have a biography listed with CSA.

Kurt Seifried
Kurt Seifried
Chief Blockchain Officer & Director of Special Projects, CSA

Kurt Seifried

Chief Blockchain Officer & Director of Special Projects, CSA

For over 2 decades Kurt has been involved in the information security field, starting with Windows and Linux and continuing on to cloud and now Blockchain. With a strong focus on security and privacy Kurt brings a wealth of knowledge and experience to the CSA.

Read more

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training