Download Publication
Who it's for:
- CISO
- CSO
- Blockchain Architects
- Security Architects
- Application and Smart Contract Developers
- Blockchain Network Administrators
Hyperledger Fabric 2.0 Architecture Security Controls Checklist
Release Date: 06/28/2021
Working Group: Blockchain/Distributed Ledger
Key Takeaways:
- Definitions for terms relating to Hyperledger Fabric and cybersecurity
- Descriptions for 156 controls
- The cybersecurity functional area for each control, allowing for clear lines of roles and responsibilities
- The architectural flaws or weaknesses that could be triggered or exploited to get access to the Fabric network
- How each control works to mitigate the listed vulnerability
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Natividad Munoz
Ramesh Reddi
Jyoti Ponnapalli
Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...
Frederic de Vaulx
Hillary Baron
Senior Technical Director - Research, CSA
Goni Sarakinov
Michael Theriault
Teju Oyewole
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect
Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.
He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...
Urmila Nagvekar
Urmila Nagvekar is a Certified Information Systems Security Professional (CISSP), with a combined 27 years in Information Technology, Security, and Privacy involving leading Cybersecurity, Information Risk Management, and Data Privacy Programs as business value drivers for Engineering and Geoscience with oil majors.
She has been actively contributing and presenting topics related to Blockchain Security at CSA’s Blockchain/DLT Working ...
Huili Wang
Carlos Dominguez
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more