Circle
Events
Blog

Blockchain/Distributed Ledger

Latest ResearchJoin Group
Crypto-Asset Exchange Security Guidelines
Crypto-Asset Exchange Security Guidelines

Download

Join CSA in shaping the future of blockchain
Blockchain/Distributed Ledger
Blockchain improves cloud security by improving data security, specifically the confidentiality (privacy), integrity and availability of data. Depending on the Blockchain solution and technology used you can set the needed security levels for the system as a whole but down to the individual record level as needed. Because cloud computing often involves the outsourcing of trust to a provider (that runs your IT infrastructure, stores your data, etc.) new ways of ensuring data security are needed. Blockchain technologies offer a high degree of customization. You can build fully private, public, and mixed blockchains. You can choose the consensus mechanisms for transaction processing and dispute resolution as well as the governance model so that they fit your needs and regulatory requirements. Additional capabilities such as Smart Contracts and Smart Assets can be added allowing for a rich ecosystem to be developed to support the business needs now, and in future.

What are the security issues with blockchain? Like any complex technology, most Blockchain/DLT systems suffer from new security issues. The CSA currently has a draft listing of almost 200 weaknesses and vulnerabilities in Blockchain technology, many of which are not fully understood or documented at this time. As part of our work we are attempting to classify and publicize these weaknesses and allow other industry efforts (such as CWE, https://cwe.mitre.org) to leverage them.

CSA is creating a framework for distributed ledger technologies used by financial services. You can learn more about this project and read the latest papers released for this initiative in this blog.

Blockchain/Distributed LedgerInternet of ThingsFinancial Services Stakeholder Platform

This group investigates relevant use cases, and security implications of blockchain. Currently they are creating a framework and glossary that would help provide guidance and security around: wallets, exchanges, cryptography and more.

Next Meeting

Dec 01, 2021, 10:00AM PST
Join the Meeting



Working Group Leadership

Ashish Mehta Headshot
Ashish Mehta
Ashish Mehta

Director at Genese Incubation Management Services Pvt, Ltd

Ashish is co-chair of the CSA Blockchain/Distributed Ledger working group, where he leads and supports the group’s peer-reviewed research papers and coordinates educational and networking webinars with various industry players for the wider CSA community and industry participants. He has represented CSA as a speaker at multiple global events and is he...

Read more

Bill Izzo Headshot
Bill Izzo
Bill Izzo

This person does not have a biography listed with CSA.

Join CSA in shaping the future of blockchain

Cloud Security Research for Blockchain

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Hyperledger Fabric 2.0 Architecture Security Report

Hyperledger Fabric 2.0 Architecture Security Report

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows.Considering that many of these external business workflows involve transactions and custody of value in the form of digital assets or other high-value data, cybersecurity certainly takes center stage. In this paper we identified Fabric 2.0’s architectural risks to Cybersecurity attributes (Privacy, Confidentiality, Integrity, Availability) while being implemented as a permissioned blockchain enterprise network for a trade finance business use case in a cloud-based environment.

Using Blockchain Technology to Secure the Internet of Things

Using Blockchain Technology to Secure the Internet of Things

This paper describes a high-level overview of blockchain technology and outlines a set of architectural patterns that enable blockchain to be used as a technology to secure IoT capabilities. Specific use-case examples of blockchain for IoT security are also explored, although technical implementation of those use cases will vary across companies.

Crypto-Asset Exchange Security Guidelines

Crypto-Asset Exchange Security Guidelines

Experts have identified crypto-asset exchanges as a major pain point of crypto security. Exchanges are platforms that mediate crypto-asset transactions between entities. There are several types of attacks that are successful against exchanges. In this document, we give an overview of these attacks, describe an exchange security reference architecture, and then provide a detailed list of crypto-asset exchange security best practices, administrative controls, and physical controls. 

Crypto-Asset Exchange Security Guidelines

Distributed ledger technologies introduce a multitude of value propositions for the financial services industry. The pace of innovation is aggressively picking up in use cases pertaining to finance such as digital assets, tokenization and cryptocurrency. However, the security measures are significantly inadequate to support innovation. There is a growing need for increased vigilance and an industry-standard security framework. To address this gap DTCC & CSA have launched an initiative to address the needs of the industrywide DLT Security Framework.
The goal of this framework will be a series of papers addressing specific topics related to blockchain.

The first of these papers is now available. You can request access to the Crypto-Asset Exchange Security Guidelines here



Webinars & Resources

Hyperledger Fabric 2.0 Architecture Security Controls Checklist and Report

Hyperledger Fabric 2.0 Architecture Security Controls Checklist and Report

In this webinar the lead authors for the blockchain working group’s latest release, Urmila Nagvekar & Carlos Dominguez, will discuss the Hyperledger Fabric 2.0 Architecture Security Controls Checklist and Security Report.

Blockchain in the Quantum Era

Blockchain in the Quantum Era

In this webinar, Ashish Mehta, Co-chair for the Blockchain/DLT Working Group, and Bruno Huttner, Co-chair for the Quantum-safe Security Working Group, provide you with an introduction to DLT/blockchain technology, some of its representative applications, and an overview of the leading post-quantum algorithm candidates that are actively being pursued.  

LIVE Cyber Attack Simulation: A Crypto Crime in Action

LIVE Cyber Attack Simulation: A Crypto Crime in Action

Crypto mining and cyber crime are at the top of the list for headline-grabbing attacks. Watch a live simulation of hackers bypassing security controls and executing a crypto mining attack. Watch how a security engineer is able to quickly identify the attack, and then learn the tips you can take home to improve your own security posture.

Blog Posts

Secure Distributed Ledger Technology Framework for Financial Institutes
The Use of Blockchain in Healthcare: A Collaboration Between Two CSA Working Groups
Detecting new crypto-mining attack targeting Kubeflow and TensorFlow

Press Coverage