ChaptersEventsBlog
How is your organization adopting AI technologies? Take this short survey to help us identify key trends and risks across FSI →

Hyperledger Fabric 2.0 Architecture Security Controls Checklist

Released: 06/28/2021

Blockchain/Distributed Ledger

Hyperledger Fabric 2.0 Architecture Security Controls Checklist
Hyperledger Fabric 2.0 Architecture Security Controls Checklist
Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many of these workflows involve transactions and custody of value in the form of digital assets or other high-value data, cybersecurity attributes such as privacy, confidentiality, integrity, and availability certainly take center stage in the blockchain space.

In this spreadsheet, we deliver a fully implementable security controls checklist for the blockchain framework Hyperledger Fabric 2.0. These controls are aligned with the NIST Cybersecurity Framework’s controls to proactively prevent, detect and respond to the risks of Fabric 2.0, thus mitigating the business impacts downstream caused by loss of trade, trust, and ownership. In the accompanying Hyperledger Fabric 2.0 Architecture Security Report, we identified the cybersecurity risks of implementing Hyperledger Fabric 2.0’s architecture as a permissioned blockchain enterprise network for a trade finance business in a cloud-based environment.

Key Takeaways:
  • Definitions for terms relating to Hyperledger Fabric and cybersecurity
  • Descriptions for 156 controls
  • The cybersecurity functional area for each control, allowing for clear lines of roles and responsibilities
  • The architectural flaws or weaknesses that could be triggered or exploited to get access to the Fabric network
  • How each control works to mitigate the listed vulnerability
This publication is part of a larger series on Securing DLT Frameworks for Financial Institutes. If you’re interested in learning more, you can find all the papers in the series here.

Prefer to access this resource without an account? Download it now.


Best For IconBest For:
  • CISO
  • CSO
  • Blockchain Architects
  • Security Architects
  • Application and Smart Contract Developers
  • Blockchain Network Administrators

Partner Event Spotlight

Want to see your content featured here?

Contact us to learn more!

Explore More of CSA

Research & Best Practices

Stay informed about the latest best practices, reports, and solutions in cloud security with CSA research.

Upcoming Events & Conferences

Stay connected with the cloud security community by attending local events, workshops, and global CSA conferences. Engage with industry leaders, gain new insights, and build valuable professional relationships—both virtually and in person.

Training & Certificates

Join the countless professionals who have selected CSA for their training and certification needs.

Industry News

Stay informed with the latest in cloud security news - visit our blog to keep your competitive edge sharp.