What are the security issues with blockchain? Like any complex technology, most Blockchain/DLT systems suffer from new security issues. The CSA currently has a draft listing of almost 200 weaknesses and vulnerabilities in Blockchain technology, many of which are not fully understood or documented at this time. As part of our work we are attempting to classify and publicize these weaknesses and allow other industry efforts (such as CWE, https://cwe.mitre.org) to leverage them.
This group investigates relevant use cases, and security implications of blockchain. Currently they are creating a framework and glossary that would help provide guidance and security around: wallets, exchanges, cryptography and more.
Jan 27, 2021, 10:00AM PST
Join the Meeting
Working Group Leadership
Cloud Security Research for Blockchain
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Blockchain Use Cases v2
This document builds on the use cases provided in the previous use case paper and introduces ways that blockchain could be used for: cross border payments, voting, land registry, food supply chain, media and entertainment, identity, royalties, and insurance.
Using Blockchain Technology to Secure the Internet of Things
This paper describes a high-level overview of blockchain technology and outlines a set of architectural patterns that enable blockchain to be used as a technology to secure IoT capabilities. Specific use-case examples of blockchain for IoT security are also explored, although technical implementation of those use cases will vary across companies.
Blockchain Use Cases
Innovative technologies of Blockchain and other systems of distributed ledger technology (DLT) have proven their ability to increase security of data during transactions and provide immutable long-term data storage. While blockchain technology is primarily associated with Bitcoin cryptocurrency, many other business models are currently taking advantage of blockchain technology. This paper covers nine use cases beyond cryptocurrency for Blockchain including: shipping, airline ticket sales, automated reinsurance, Nostro Bank Accounts Reconciliations, drug supply chain security, food safety, education, supply chain, and real estate.
DLT Framework for Financial Services Initiative
The goal of this framework will be a series of papers addressing specific topics related to blockchain. It is unique from the overall Blockchain working group since it will be focused on issues specific to the financial services industry.
The CloudSecurityAlliance is currently working on a DLT Security Framework with a number of working groups that include participating from other organizations. The security framework aims to not only provide specific guidance but includes related information such as threat modelling guidance and operational guidance for Blockchain/DLT systems.
Watch this webinar to learn more about the DLT Framework
Webinars & Resources
LIVE Cyber Attack Simulation: A Crypto Crime in Action
Crypto mining and cyber crime are at the top of the list for headline-grabbing attacks. Watch a live simulation of hackers bypassing security controls and executing a crypto mining attack. Watch how a security engineer is able to quickly identify the attack, and then learn the tips you can take home to improve your own security posture.
Crypto Conflagration and Securing the Cryptocurrency Ecosystem
Not only do cryptocurrencies rely on blockchain for their security, but they also rely on an ecosystem of software that runs exchanges, wallets, smart contracts and more. This software ecosystem, as well as the infrastructure on which it runs are required to be secure. Whether you are a builder, investor, or consumer- this webinar will help you learn how to identify the vulnerable aspects of the software that powers the cryptocurrency ecosystem - and how to avoid them.
|CNAs and CVEs – Can allowing vendors to assign their own vulnerability IDs actually hinder security?||The Daily Swig||November 03, 2020|