ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Corda Enterprise 4.8 - Architecture Security Report
Corda Enterprise 4.8 - Architecture Security Report
Who it's for:

  • CISO
  • CSO
  • Blockchain Architects
  • Security Architects
  • Application and Smart Contract Developers
  • Blockchain Network Administrators

Corda Enterprise 4.8 - Architecture Security Report

Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many of these workflows involve transactions and custody of value in the form of digital assets or other high-value data, cybersecurity attributes such as privacy, confidentiality, integrity, and availability certainly take center stage in the blockchain space.

This report from our Blockchain/Distributed Ledger Working Group aims to address the above concerns by examining the cybersecurity risks of the blockchain framework Corda Enterprise 4.8 when it is implemented as a permissioned enterprise network for a trade finance business in a cloud-based environment.

Then, in the accompanying Corda Enterprise 4.8 - Security Controls Checklist, we deliver a fully implementable security controls checklist for Corda 4.8 aligned with the NIST Cybersecurity Framework.

Key Takeaways:
  • An overview of how a Corda 4.8 Permissioned Blockchain Network was used to depict a simple transaction within a trade finance workflow
  • The steps and methodology used to identify Corda 4.8 security risks
  • The results of a Corda 4.8 threat analysis, how to mitigate the discovered risks, and recommendations for a risk-based incident response strategy
  • Cryptography module recommendations for a Corda 4.8 Permissioned Network
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
Achieving Resilience Through Zero Trust
Achieving Resilience Through Zero Trust
Published: 08/29/2025
The Emerging Identity Imperatives of Agentic AI
The Emerging Identity Imperatives of Agentic AI
Published: 08/28/2025
Risk-Based vs. Compliance-Based Security: Why One Size Doesn’t Fit All
Risk-Based vs. Compliance-Based Security: Why One Size Doesn’t Fit All
Published: 08/27/2025
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025

Interested in helping develop research with CSA?

Related Certificates & Training