Cloud 101CircleEventsBlog
Discover the latest cloud threats, evolving AI risks, and how to stay ahead. Don’t miss CSA’s free Cloud Threats & Vulnerabilities Summitregister now!

Download Publication

DLT Cybersecurity Governance Package
DLT Cybersecurity Governance Package
Who it's for:
Teams that use distributed ledger technology

DLT Cybersecurity Governance Package

Release Date: 01/22/2025

Distributed Ledger Technology (DLT) brings traceability and transparency to external business workflows, while also instilling trust and efficiency in an untrusted and competitive business environment. However, many of these workflows involve transactions and custody of value in the form of digital assets and sensitive data. As a result, cybersecurity takes center stage in the DLT space. 

CSA’s DLT Cybersecurity Governance Framework serves as a comprehensive framework for blockchain and DLT security professionals to manage the cybersecurity risk of their DLT assets. 

What’s Included in This Download:
  • A report that provides an introduction to the Framework and its use cases. Get a detailed explanation of how the Framework is able to deliver a repeatable, measurable, and layered DLT risk management process that balances security needs with business priorities.
  • A user guide with step-by-step instructions on how to use the Framework. It also shares methods for modeling risk mitigation strategies prior to deployment of the security controls.
  • The first half of the Framework, the Inherent Cybersecurity Risk Profile. This spreadsheet provides a quantified assessment of DLT-related cybersecurity risks.
  • The second half of the Framework, the Cybersecurity Maturity Core. This spreadsheet provides a set of activities and outcomes that are helpful in managing DLT cybersecurity risk. It references examples of other control frameworks (COSO, NIST CSF, etc.) to explain how to achieve those outcomes.  

Key Takeaways:
  • The purpose and contents of the DLT Cybersecurity Governance Framework
  • Use cases for the Framework, including identifying inherent risk, conducting ongoing compliance assessments, and conducting internal governance audits
  • A step-by-step demonstration of how to use both parts of the Framework
  • How to evaluate DLT cybersecurity attributes
  • How to conduct risk assessments for various DLT risk categories
  • Standards, guidelines, and practices that help achieve the desired DLT security outcomes
Download this Resource

Bookmark
Share
Related resources
CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Cloud Key Management Working Group Charter 2025
Cloud Key Management Working Group Charter 2025
Enterprise Authority To Operate (EATO) Auditing Guidelines
Enterprise Authority To Operate (EATO) Auditing...
Don’t Buy A Network Pen Test Until You Ask These Questions
Don’t Buy A Network Pen Test Until You Ask These Questions
Published: 03/28/2025
How To Transform Your GRC with Continuous Controls Monitoring
How To Transform Your GRC with Continuous Controls Monitoring
Published: 03/26/2025
Zero Trust Makes Cybersecurity Everyone's Responsibility
Zero Trust Makes Cybersecurity Everyone's Responsibility
Published: 03/25/2025
Forget the Corporate Ladder and ‘Rock-Climb’ Your Way to Success
Forget the Corporate Ladder and ‘Rock-Climb’ Your Way to Success
Published: 03/25/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training