Download Publication
Who it's for:
- CISO
- CSO
- Blockchain Architects
- Security Architects
- Application and Smart Contract Developers
- Blockchain Network Administrators
Hyperledger Fabric 2.0 Architecture Security Report
Release Date: 06/28/2021
Working Group: Blockchain/Distributed Ledger
Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many of these workflows involve transactions and custody of value in the form of digital assets or other high-value data, cybersecurity attributes such as privacy, confidentiality, integrity, and availability certainly take center stage in the blockchain space.
In this report, we examine the security of the blockchain framework Hyperledger Fabric 2.0. First, we identified the cybersecurity risks of implementing Hyperledger Fabric 2.0’s architecture as a permissioned blockchain enterprise network for a trade finance business in a cloud-based environment. Then, in the accompanying Hyperledger Fabric 2.0 Security Controls Checklist, we delivered a fully implementable security controls checklist aligned with the NIST Cybersecurity Framework.
Key Takeaways:
- An overview of how a Hyperledger Fabric 2.0 permissioned blockchain network was used to depict a simple transaction within a trade finance workflow
- The steps and method used in the Fabric 2.0 risk identification process
- The results of a threat evaluation and analysis
- Cryptography module recommendations for a Fabric 2.0 permissioned network
This publication is part of a larger series on Securing DLT Frameworks for Financial Institutes. If you’re interested in learning more, you can find all the papers in the series here.
Download this Resource
Prefer to access this resource without an account? Download it now.
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more

.jpeg)
.jpeg)
.jpeg)
.jpeg)
.jpg)
.jpg)
.jpg)