Cloud 101CircleEventsBlog
Have a chance to win a free CCSK v5 token by taking the Non-Human Identity Security Survey!

Download Publication

Hyperledger Fabric 2.0 Architecture Security Controls Checklist
Hyperledger Fabric 2.0 Architecture Security Controls Checklist
Who it's for:
  • CISO
  • CSO
  • Blockchain Architects
  • Security Architects
  • Application and Smart Contract Developers
  • Blockchain Network Administrators

Hyperledger Fabric 2.0 Architecture Security Controls Checklist

Release Date: 06/28/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many of these workflows involve transactions and custody of value in the form of digital assets or other high-value data, cybersecurity attributes such as privacy, confidentiality, integrity, and availability certainly take center stage in the blockchain space.

In this spreadsheet, we deliver a fully implementable security controls checklist for the blockchain framework Hyperledger Fabric 2.0. These controls are aligned with the NIST Cybersecurity Framework’s controls to proactively prevent, detect and respond to the risks of Fabric 2.0, thus mitigating the business impacts downstream caused by loss of trade, trust, and ownership. In the accompanying Hyperledger Fabric 2.0 Architecture Security Report, we identified the cybersecurity risks of implementing Hyperledger Fabric 2.0’s architecture as a permissioned blockchain enterprise network for a trade finance business in a cloud-based environment.

Key Takeaways:
  • Definitions for terms relating to Hyperledger Fabric and cybersecurity
  • Descriptions for 156 controls
  • The cybersecurity functional area for each control, allowing for clear lines of roles and responsibilities
  • The architectural flaws or weaknesses that could be triggered or exploited to get access to the Fabric network
  • How each control works to mitigate the listed vulnerability
This publication is part of a larger series on Securing DLT Frameworks for Financial Institutes. If you’re interested in learning more, you can find all the papers in the series here.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
CSA CCM v4.0 Addendum - IBM Cloud Framework for Financial Services v1.1.0
CSA CCM v4.0 Addendum - IBM Cloud Framework for...
Cloud Threats Deploying Crypto CDN
Cloud Threats Deploying Crypto CDN
Published: 06/03/2024
Unlocking Trust in the Digital Age: The Power of Blockchain Technologies
Unlocking Trust in the Digital Age: The Power of Blockchain Technol...
Published: 05/28/2024
Apple's New iMessage, Signal, and Post-Quantum Cryptography
Apple's New iMessage, Signal, and Post-Quantum Cryptography
Published: 05/17/2024
New SEC Rules: Material Incident Reporting Through Cybersecurity Disclosures
New SEC Rules: Material Incident Reporting Through Cybersecurity Di...
Published: 05/13/2024

Acknowledgements

Natividad Munoz Headshot Missing
Natividad Munoz

Natividad Munoz

Ramesh Reddi Headshot Missing
Ramesh Reddi

Ramesh Reddi

Jyoti Ponnapalli
Jyoti Ponnapalli

Jyoti Ponnapalli

Jyoti Ponnapalli is the SVP, Head of Blockchain Innovation Strategy at Truist. She has more than 18 years of experience leading emerging technology and complex digital transformations for fortune 500 companies across a range of industries including Finance, Telecom, Airline, Energy, and Food & Beverage. Prior to joining Truist, she was a Director of Blockchain at DTCC leading strategic initiatives in support of efforts to modernize the fina...

Read more

Frederic de Vaulx Headshot Missing
Frederic de Vaulx

Frederic de Vaulx

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Goni Sarakinov Headshot Missing
Goni Sarakinov

Goni Sarakinov

Michael Theriault Headshot Missing
Michael Theriault

Michael Theriault

Teju Oyewole Headshot Missing
Teju Oyewole

Teju Oyewole

Ashish Mehta
Ashish Mehta
Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta

Cybersecurity - Sr. Risk Manager & Security Architect

Ashish Mehta has extensive experience in cybersecurity, blockchain, web development, IT management, financial markets, and the energy industry.

He currently serves as Co-Chair of the Blockchain Working Group and is a part of the Internet of Things (IoT) and Quantum-Safe Security Leadership Teams at the Cloud Security Alliance. In that capacity, he is responsible for pushing their multiple research efforts as well as coordinating with ...

Read more

Urmila Nagvekar
Urmila Nagvekar

Urmila Nagvekar

Urmila Nagvekar is a Certified Information Systems Security Professional (CISSP), with a combined 27 years in Information Technology, Security, and Privacy involving leading Cybersecurity, Information Risk Management, and Data Privacy Programs as business value drivers for Engineering and Geoscience with oil majors.

She has been actively contributing and presenting topics related to Blockchain Security at CSA’s Blockchain/DLT Working ...

Read more

Huili Wang Headshot Missing
Huili Wang

Huili Wang

Carlos Dominguez Headshot Missing
Carlos Dominguez

Carlos Dominguez

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training