SlideShare a Scribd company logo
1 of 29
Download to read offline
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Shahid Sharif
Blockchain Security
A Different Perspective
Carlos Dominguez
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Disclaimer & License
Disclaimer
The views and opinions expressed in this presentation are those of the authors. They do not purport to reflect the policies,
views, opinions or positions of any other agency, entity, organization, employer or company.
License
This presentation is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0).
You are free to:
• Share , copy and redistribute the material in any medium or format
• Adapt , remix, transform, and build upon the material for any purpose, even commercially
• Under the following terms of Attribution: You must give appropriate credit, provide a link to the license, and indicate if
changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor
endorses you or your use.
License details: https://creativecommons.org/licenses/by/4.0/legalcode
2
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Topics
• Intro
• Cyber Security Considerations
• Design
• Architecture
• Application Security
• Identity and Access Management
• Privacy & Confidentiality
• Data Governance
• Security Operations
• Compliance and Audit
• Conclusions
3
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
BIO’s
Shahid Sharif
CCSK, CISA, CISSP, CRISC, CSSP, PCIP, PMP
IT Security professional with over 20 years of experience in various
industries in different roles. Some of the highlights include:
• Application Security Assessments
• Security Architecture advisory pertaining to Mobile Devices,
Networks, Applications, & Systems
• Extensive experience in managing and supporting audits related
to PCI-DSS, SSAE16. CSAE3416, 5025, SOC2, and SOX
• In-depth knowledge and experience on implementing
Governance, Risk, & Compliance and supporting frameworks like
COBIT 5, NIST, ISO, etc
• Extensive experience in creating procedures, policies and
standards
• In-depth knowledge of Business Continuity Management which
includes BCP, DRP, and Crisis Management.
• Private/Public Blockchain technologies
LinkedIn: https://www.linkedin.com/in/shahidsharif/
Carlos Dominguez
CISSP, CISA, CCBP, CBPro
Security professional with over 20 years of IT experience across several
industries including financial and technology firms, performing as a
subject matter expert in Security Architecture, Information Risk and
Security Governance. Currently researching Blockchain and Distributed
Ledger Technologies, and their Cybersecurity impacts.
Highlights
• Information Security Threat and Risk Assessments.
• Information Risk Management.
• Security Governance
• Security Architecture, Enterprise Security Architecture
• Information Security Policies, Standards and Procedures
• Blockchain and Distributed Ledger Technologies
LinkedIn: https://www.linkedin.com/in/carlos-l-dominguez/
4
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Intro - Audience
Q:Target Audience?
A:Anybody who designs and implements:
• New blockchain technology
• dApps
• Oracles
• Exchanges
• Enterprise Applications
• Public Facing Applications
• Mining Farms
• Blockchain Technology Integrations
5
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Intro – The Basics
Types of blockchains:
● Public
● Permissioned
● Hybrid
Note: This presentation is focusing on Public Blockchains
6
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Intro – The Basics
Inherent Security Attributes (CIA-R):
• Confidentiality: Assurance that information is disclosed only to
authorized parties.
• Integrity: Assurance for the accuracy and completeness of data
• Availability: Assurance that the system will be available for use when
required
• Non-Repudiation: Assurance on parties not being able to deny
having participated in a transaction.
7
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Intro – Role of Cyber
Despite its inherent security attributes, even properly designed and implemented
blockchain technology is still susceptible to other factors that could compromise
its security
Also, trust-less operation of a blockchain does not extend to components residing
outside the consensus network. Those out-of-chain components don’t benefit
from any of the inherent or emergent blockchain attributes and can be susceptible
to STRIDE threats (Spoofing, Tampering, Repudiation, Information Disclosure,
Denial of service and Elevation of privilege)
Caution: Designers and Implementers can be held accountable for assurances on
the Cyber Security of the system, its design and operation
8
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Design – Security Architecture
Security Architecture is the collection of design artifacts that describe
how the security controls work and the system CIA-R attributes.
Considerations:
• System Architecture (DApp vs Traditional)
• Layers and Tiers
• Components (on-chain, off-chain)
• Type of blockchain (public/permissioned)
• Actors/Threats
Caution: Control design by Cryptoeconomics is a new field still being developed
9
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Security Architectural View
Blockchain technology could be described by the type or architecture under consideration:
● Primary Architecture (Business): the business capabilities being fulfilled, as per the inclusion of specific business
roles, business processes and business functions being addressed by the blockchain. It could also include the
business cases and business requirements. This is the architecture that exposes the blockchain to high level legal or
requirements
● Secondary Architecture (Application): the blockchain as a business application that support the primary architecture.
Includes the role and function of the layers, the logical components involved, the interfaces and their static and
dynamic behaviors. This architecture also includes the cryptographic techniques as logical components of the
implementation. It clearly defines what is “on-chain” vs “off-chain”
● Tertiary Architecture (Infrastructure): The IT systems that support the blockchain as an application, and described in
terms of infrastructure. Also includes the IT systems that provide operational support, including security operations,
as well as the off-chain components that interact with the blockchain
10
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Crypto Economics
● Cryptographic primitives and techniques have a unique attribute among all other security controls in the technical
domain: is it cheaper for the defender to apply them than for an attacker to defeat the controls.
● This cost asymmetry is an inherent property of current algorithms, and is supported by formal proofs and
mathematical analysis of the techniques leading to adoption as technical standards.
● Open financial instruments that rely on Blockchain Technology are making use of cryptographic techniques to drive
economic incentives, implemented as design mechanisms in those instruments. This usage has been branded
“Cryptoeconomics”.
● Cryptoeconomics can be defined as the application of game theory costs models to cryptographic techniques to
determine economic incentives in decentralized systems that is assumed to have adversarial actors, with the
objective of leverage cryptography cost asymmetry to provide a level of fault tolerance and resolve conflicts. This
field is not exclusive to blockchains but is a built-in property for blockchains.
● Cryptoeconomics plays a role in Blockchain Technology Threat Modeling as the functions that inhabit the boundary
between on-chain and off-chain could upset the design balance of the system.
● While security controls costs are usually consider during their design, the application of game theory for developing
security controls in the form of incentives by levering cryptography is a novel approach.
11
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Threat Modeling Considerations
Given the diversity of potential configurations and applications for blockchains it is not possible to build a generic threat
model that applies to all circumstances. Threat modeling can still be applied, but with special consideration for the
blockchain specific architecture as a distributed system.
When performing a threat model for a blockchain implementation the practitioner should pay special attention to:
• Functions that rely on data and transactions recorded in the blockchain (on-chain) and benefit from its inherent
attributes
• Functions that are executed outside the blockchain (off-chain) and therefore do not inherit any of the blockchain
inherent attributes
• Functions that cross the boundary between on-chain and off-chain processing. While the blockchain may be able to
provide transaction trust among untrusted parties by means of a consensus mechanism, parties that are not
participating in the consensus mechanism (off-chain) can not be said to be part of the transaction trust
• Layering effect due to encapsulation of protocols that could result on expected attributes from one layer not to be
present in the layers above
12
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Off-chain components vulnerabilities
The trust-less operation of a blockchain does not extend to components residing outside the consensus
network. Those out-of-chain components don’t benefit from any of the inherent or emergent blockchain
attributes and can be susceptible to STRIDE threats (Spoofing, Tampering, Repudiation, Information
disclosure, Denial of service and Elevation of privilege).
These are examples of functions that are executed off-chain:
• Oracles acting as an appointed trusted source providing real world data to a blockchain
• Applications that connect to the blockchain via APIs
• IoT devices feeding data to an Oracle or an application
• Inter-node messages that are not recorded in the ledger
• Third parties such as Wallets and exchanges acting on behalf of a user that does not interact directly
with the blockchain via a node participating in the consensus
13
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Application Security – Smart Contracts
Smart Contract Pitfalls
• Designing with Immutability in mind (kill switch, ownership)
• Versioning
• Coding Language
• Frameworks (external dependencies)
• Run-away processes protection
Caution: there is a lot code out there that is neither smart nor contracts
14
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Smart Contract Security Tools
• Various organizations are now bringing out blockchain security tools to address this void. Here is the list:
• A platform should support conventional programming languages to ensure existing secure coding practices can be leveraged.
• OpenZeppelin has created an open framework of reusable and secure smart contracts in the Solidity language.
• Trailofbits has created following tools:
• A repository that contains examples of common Ethereum smart contract vulnerabilities, including real code.
• "Slither combines a set of proprietary static analyses on Solidity that detect common mistakes such as bugs in reentrancy, constructors, method access, and more.
Run Slither as you develop, on every new checkin of code."
• "Echidna applies next-generation smart fuzzing to EVM bytecode. Write Echidna tests for your code after you complete new features. It provides simple, high
coverage unit tests that discover security bugs. Until your app has 80+% coverage with Echidna, don’t consider it complete".
• "Manticore uses symbolic execution to simulate complex multi-contract and multi-transaction attacks against EVM bytecode. Once your app is functional, write
Manticore tests to discover hidden, unexpected, or dangerous states that it can enter. Manticore enumerates the execution states of your contract and verifies
critical functionality".
• They have also created some reversing tools just like Porosity below which converts bytecode to solidity code.
• NCC Group had compiled a DASP (Decentralized Application Security Project) Top10 list
• Porosity, a decompiler and smart contract auditing tool for Ethereum smart-contracts.
15
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Application Security – Best Practices
Recommended Best Practices
• Code Management (Code supply chain security: Github, CVS)
• Code Sources: Open Source, Proprietary
• Security Testing: Environment Isolation, DevSecOps pipeline)
• Code assurances: Signing, fingerprint, distribution, packaging
• Tools: DAST, SAST, Smart Contract proofing, Test Driven
Development
• Industry Standard Cryptographic primitives
Caution: Open Blockchain and Open Source are not the same thing.
16
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Identity and Access Management
Consider who has access, how and why:
• End user
• Developers
• Administrative Access
• MFA/2FA
• Segregation of Duties/Roles in Conflict
Identity Sources:
• Centralized & Decentralized
• Identity Providers, Trust, and Consumption
Caution: Identity underpins Access. Bad Identity results on Bad Access
17
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Privacy & Confidentiality Considerations 1/2
• Due to its inherent security attributes, blockchain technology would seem to
be a good fit for data security solutions where high integrity and availability
are required.
• A review of use cases, either in public or consortium domains, would reveal
that Database technology is not challenged by blockchain technology when
considering transaction performance, confidentiality and data retention
requirements.
• Use of blockchain technology for data security, or to store or manage data,
requires to pay attention to the data security requirements. Not doing so could
lead to miss-applications of blockchain technology.
18
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Privacy & Confidentiality Considerations 2/2
The first consideration would be regarding the classification of the data, specifically around the inclusion of data elements
that require High Confidentiality. A subset of this would include Personal Identifiable Information (PII).
Public and Consortium Blockchains may not suitable for sharing data across parties, when the data needs to remain
confidential to those parties.
Consortiums could rely on off-chain compensating controls to address Confidentiality issues, as part of Consortium
Governance. Public blockchains currently lack the controls required to provide forward looking Confidentiality
requirements, and any data stored in a public blockchain could be considered to be at risk and potentially exposed in the
future.
Use of blockchain technology for storing PII is strongly not recommended, as it is not likely to comply with privacy
legislation:
• Once the data is shared, it can not be unshared
• Data encryption, as a confidentiality control, is exposed to technology obsolesce
• Data that has been shared, and protected with current encryption standards, could be exposed in the future
• Current technologies don’t address data retention requirements
• Data stored in a blockchain is immutable and cant be updated as per new encryption standards
19
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Immutability & Data Retention
• While it may seem that blockchain immutability is an all-around positive
attribute, it does creates some challenges with data management. Data that
has been stored in a blockchain, specially public ones, is not susceptible to
data retention policies. Once recorded, the data would remain as is for the
lifetime of the blockchain.
• The Immutability security attribute of blockchain technology creates additional
challenges for Confidentiality, as it makes it virtually impossible to address
legacy data protection controls: it can neither be deleted or re-encrypted.
20
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Security Operations - Processes
Consider “who, where, when & how” for these processes
• Blockchain initiation Ceremony (genesis block)
• Incident Response (before it becomes a crisis)
• Crisis Management (when things go really bad)
• Third party validations and assessment (trust no one)
• Vulnerability Management (and Remediation)
• Capacity Management
• Disaster Recovery
• Physical Security
21
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Security Operations – Key Management
The complexity of Key Management is usually underestimated up front.
• Type of Wallet supported (HD Wallets recommended)
• Type of Key (do not invent, follow)
• Safe key storage (cold storage, physical )
• Key issuance
• Key transmitting
• Key Revocation
• Use of MultiSig
Caution: Keys have limited lifetime. Frequent usage means exposure.
22
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Security Operations – Monitoring
Consider the W’s (who, where, how) for these ongoing processes:
• Security Logs (Where are those and for how long)
• DoS Attacks
• Health of nodes (and Mempools monitoring)
• Transaction processing (detect availability issues)
• Master Nodes Changes
• Measure Centralization (network, miners, …)
Caution: Often the most invisible of components has the biggest effect on
security: mind network concentration.
23
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Compliance and Audit
Any hints of ownership (financial or operational) over a blockchain
system dealing with real assets usually ends with someone being on the
receiving end of Compliance and Audit. Eventually.
The best way to deal with Audit and Compliance is pro-actively self-audit
and having an independent party provide audit reports.
Caution: mind the jurisdiction of the owners, operators, management and
clients. Blockchain projects have a knack for crossing jurisdictions.
24
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Conclusion
• Requirements, Requirements, Requirements
• Avoid assumptions
• Document the design for:
• Infrastructure
• Data structures
• dApp
• Frontend App
Hint: Consult with qualified Security SMEs if you need help.
25
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Questions
26
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Thank You!
27
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
Backup Slides
28
Secunoid Systems Inc.
http://www.secunoid.com
Alto Azul Consulting Inc.
https://blocksec.ca
29
Three views
Node
• By necessity, most technologies share a similar
node structure
• The Peer to Peer network can use any protocols
• Key Management is done outside the node
• There could be specialized nodes, and
lightweight nodes
• Enterprise Blockchain could have pluggable
Consensus
• Current technologies don’t limit the size of the
Data Structure
• There are a number of components that reside
outside the node
Protocol
• Blockchain can be considered to be a “fat protocol”
• As a protocol, Blockchain moves “value” instead of
“information”
• Unlike internet protocols where the value is in applications
• Blockchain protocols create value directly (participation and
investment)
• The protocol value drives adoption and standardization
• The notion applies to public Blockchain, but could cross
over
Platform (Web 3.0, Distributed Applications)
• Blockchain proposes an platform (internet of money)
• This stack includes a number of natively distributed
components
• The model promotes decentralization and
disintermediation
• It is based on Cryptoeconomic designs (consensus,
incentive/penalty driven)
• Is driving Interoperability across the landscape
• Lacks Command and Control points (nobody is in charge)
• This notion is present in Enterprise Blockchain
(Distributed Applications Marketplace)
API
Consensus Mechanism
Computation (smart
Contract)
Peer to Peer network
Blockchain Data
Structure
Application
Layer
Protocol
Layer
Application
Layer
Protocol
Layer
Internet Blockchain
Distributed Apps
User
Applications
System
Integration
Node Node
Network

More Related Content

What's hot

Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation101 Blockchains
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationZied GUESMI
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101BirthVenue
 
Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)Trevor Owens
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work Blockchain Council
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for BusinessAhmad Gohar
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyAlpnaSingh5
 
Challenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the EnterpriseChallenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the EnterpriseEugene Aseev
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Edureka!
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain101 Blockchains
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsGokul Alex
 
Comparison Blockchain Developer vs. Blockchain Expert
Comparison  Blockchain Developer vs. Blockchain Expert Comparison  Blockchain Developer vs. Blockchain Expert
Comparison Blockchain Developer vs. Blockchain Expert Blockchain Council
 
Governance in the Blockchain Economy: A Framework and Research Agenda. Roman...
Governance in the Blockchain Economy: A Framework and Research Agenda.  Roman...Governance in the Blockchain Economy: A Framework and Research Agenda.  Roman...
Governance in the Blockchain Economy: A Framework and Research Agenda. Roman...eraser Juan José Calderón
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceJuarez Junior
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainIT Strategy Group
 
How BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryHow BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryPromptCloud
 
Delloite custodian whitepaper
Delloite custodian whitepaperDelloite custodian whitepaper
Delloite custodian whitepaperIT Strategy Group
 
Blockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life InsuranceBlockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life InsuranceCognizant
 

What's hot (20)

Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)Stacks 2.0 Introduction ($STX)
Stacks 2.0 Introduction ($STX)
 
How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work How does hyperledger fabric blockchain work
How does hyperledger fabric blockchain work
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Challenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the EnterpriseChallenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the Enterprise
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
 
Introduction to Blockchain Governance Models
Introduction to Blockchain Governance ModelsIntroduction to Blockchain Governance Models
Introduction to Blockchain Governance Models
 
Comparison Blockchain Developer vs. Blockchain Expert
Comparison  Blockchain Developer vs. Blockchain Expert Comparison  Blockchain Developer vs. Blockchain Expert
Comparison Blockchain Developer vs. Blockchain Expert
 
Governance in the Blockchain Economy: A Framework and Research Agenda. Roman...
Governance in the Blockchain Economy: A Framework and Research Agenda.  Roman...Governance in the Blockchain Economy: A Framework and Research Agenda.  Roman...
Governance in the Blockchain Economy: A Framework and Research Agenda. Roman...
 
Enterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain ServiceEnterprise Blockchain Application Development using Azure Blockchain Service
Enterprise Blockchain Application Development using Azure Blockchain Service
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
How BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing IndustryHow BlockChain Technology Will Transform The Publishing Industry
How BlockChain Technology Will Transform The Publishing Industry
 
Blockchain: Promise, reality or fiction
Blockchain: Promise, reality or fictionBlockchain: Promise, reality or fiction
Blockchain: Promise, reality or fiction
 
Delloite custodian whitepaper
Delloite custodian whitepaperDelloite custodian whitepaper
Delloite custodian whitepaper
 
Blockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life InsuranceBlockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life Insurance
 

Similar to A Different Perspective on Blockchain Security

Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Zeeve
 
Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”
Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”
Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”Zeeve
 
Five best practices for a certified blockchain architect
Five best practices for a certified blockchain architectFive best practices for a certified blockchain architect
Five best practices for a certified blockchain architectBlockchain Council
 
Blockchain App Development Company.pdf
Blockchain App Development Company.pdfBlockchain App Development Company.pdf
Blockchain App Development Company.pdfSarahLehmann11
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Lancope, Inc.
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Floyd DCosta
 
Become a blockchain expert and join the blockchain revolution
Become a blockchain expert and join the blockchain revolutionBecome a blockchain expert and join the blockchain revolution
Become a blockchain expert and join the blockchain revolutionBlockchain Council
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to RealityPriyanka Aash
 
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...Vidal Chriqui
 
5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps5 top techniques for testing blockchain apps
5 top techniques for testing blockchain appsCigniti Technologies Ltd
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architectureDenise Bailey
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicSecunoid Systems Inc
 
Comprehensive Guide regarding Blockchain Technology - Develop Blockchain App
Comprehensive Guide regarding Blockchain Technology - Develop Blockchain AppComprehensive Guide regarding Blockchain Technology - Develop Blockchain App
Comprehensive Guide regarding Blockchain Technology - Develop Blockchain AppBlocktech Brew
 
Blockchain Security Tips Businesses Should Follow 
Blockchain Security Tips Businesses Should Follow Blockchain Security Tips Businesses Should Follow 
Blockchain Security Tips Businesses Should Follow Flexsin
 
Aleksandr Shevchenko ITEM 2018
Aleksandr Shevchenko ITEM 2018Aleksandr Shevchenko ITEM 2018
Aleksandr Shevchenko ITEM 2018ITEM
 
Blockchain - a platform for Digital Transformation
Blockchain - a platform for Digital TransformationBlockchain - a platform for Digital Transformation
Blockchain - a platform for Digital TransformationFloyd DCosta
 
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdfCustom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdfJPLoft Solutions
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureEC-Council
 

Similar to A Different Perspective on Blockchain Security (20)

Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”
Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”
Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”
 
Five best practices for a certified blockchain architect
Five best practices for a certified blockchain architectFive best practices for a certified blockchain architect
Five best practices for a certified blockchain architect
 
Blockchain App Development Company.pdf
Blockchain App Development Company.pdfBlockchain App Development Company.pdf
Blockchain App Development Company.pdf
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
 
GRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing Cloud
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
 
Become a blockchain expert and join the blockchain revolution
Become a blockchain expert and join the blockchain revolutionBecome a blockchain expert and join the blockchain revolution
Become a blockchain expert and join the blockchain revolution
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
 
5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Comprehensive Guide regarding Blockchain Technology - Develop Blockchain App
Comprehensive Guide regarding Blockchain Technology - Develop Blockchain AppComprehensive Guide regarding Blockchain Technology - Develop Blockchain App
Comprehensive Guide regarding Blockchain Technology - Develop Blockchain App
 
Blockchain Security Tips Businesses Should Follow 
Blockchain Security Tips Businesses Should Follow Blockchain Security Tips Businesses Should Follow 
Blockchain Security Tips Businesses Should Follow 
 
Aleksandr Shevchenko ITEM 2018
Aleksandr Shevchenko ITEM 2018Aleksandr Shevchenko ITEM 2018
Aleksandr Shevchenko ITEM 2018
 
Blockchain - a platform for Digital Transformation
Blockchain - a platform for Digital TransformationBlockchain - a platform for Digital Transformation
Blockchain - a platform for Digital Transformation
 
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdfCustom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
Custom Blockchain App Development_ A Comprehensive Guide for 2024.pdf
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

A Different Perspective on Blockchain Security

  • 1. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Shahid Sharif Blockchain Security A Different Perspective Carlos Dominguez
  • 2. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Disclaimer & License Disclaimer The views and opinions expressed in this presentation are those of the authors. They do not purport to reflect the policies, views, opinions or positions of any other agency, entity, organization, employer or company. License This presentation is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). You are free to: • Share , copy and redistribute the material in any medium or format • Adapt , remix, transform, and build upon the material for any purpose, even commercially • Under the following terms of Attribution: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. License details: https://creativecommons.org/licenses/by/4.0/legalcode 2
  • 3. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Topics • Intro • Cyber Security Considerations • Design • Architecture • Application Security • Identity and Access Management • Privacy & Confidentiality • Data Governance • Security Operations • Compliance and Audit • Conclusions 3
  • 4. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca BIO’s Shahid Sharif CCSK, CISA, CISSP, CRISC, CSSP, PCIP, PMP IT Security professional with over 20 years of experience in various industries in different roles. Some of the highlights include: • Application Security Assessments • Security Architecture advisory pertaining to Mobile Devices, Networks, Applications, & Systems • Extensive experience in managing and supporting audits related to PCI-DSS, SSAE16. CSAE3416, 5025, SOC2, and SOX • In-depth knowledge and experience on implementing Governance, Risk, & Compliance and supporting frameworks like COBIT 5, NIST, ISO, etc • Extensive experience in creating procedures, policies and standards • In-depth knowledge of Business Continuity Management which includes BCP, DRP, and Crisis Management. • Private/Public Blockchain technologies LinkedIn: https://www.linkedin.com/in/shahidsharif/ Carlos Dominguez CISSP, CISA, CCBP, CBPro Security professional with over 20 years of IT experience across several industries including financial and technology firms, performing as a subject matter expert in Security Architecture, Information Risk and Security Governance. Currently researching Blockchain and Distributed Ledger Technologies, and their Cybersecurity impacts. Highlights • Information Security Threat and Risk Assessments. • Information Risk Management. • Security Governance • Security Architecture, Enterprise Security Architecture • Information Security Policies, Standards and Procedures • Blockchain and Distributed Ledger Technologies LinkedIn: https://www.linkedin.com/in/carlos-l-dominguez/ 4
  • 5. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Intro - Audience Q:Target Audience? A:Anybody who designs and implements: • New blockchain technology • dApps • Oracles • Exchanges • Enterprise Applications • Public Facing Applications • Mining Farms • Blockchain Technology Integrations 5
  • 6. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Intro – The Basics Types of blockchains: ● Public ● Permissioned ● Hybrid Note: This presentation is focusing on Public Blockchains 6
  • 7. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Intro – The Basics Inherent Security Attributes (CIA-R): • Confidentiality: Assurance that information is disclosed only to authorized parties. • Integrity: Assurance for the accuracy and completeness of data • Availability: Assurance that the system will be available for use when required • Non-Repudiation: Assurance on parties not being able to deny having participated in a transaction. 7
  • 8. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Intro – Role of Cyber Despite its inherent security attributes, even properly designed and implemented blockchain technology is still susceptible to other factors that could compromise its security Also, trust-less operation of a blockchain does not extend to components residing outside the consensus network. Those out-of-chain components don’t benefit from any of the inherent or emergent blockchain attributes and can be susceptible to STRIDE threats (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of service and Elevation of privilege) Caution: Designers and Implementers can be held accountable for assurances on the Cyber Security of the system, its design and operation 8
  • 9. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Design – Security Architecture Security Architecture is the collection of design artifacts that describe how the security controls work and the system CIA-R attributes. Considerations: • System Architecture (DApp vs Traditional) • Layers and Tiers • Components (on-chain, off-chain) • Type of blockchain (public/permissioned) • Actors/Threats Caution: Control design by Cryptoeconomics is a new field still being developed 9
  • 10. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Security Architectural View Blockchain technology could be described by the type or architecture under consideration: ● Primary Architecture (Business): the business capabilities being fulfilled, as per the inclusion of specific business roles, business processes and business functions being addressed by the blockchain. It could also include the business cases and business requirements. This is the architecture that exposes the blockchain to high level legal or requirements ● Secondary Architecture (Application): the blockchain as a business application that support the primary architecture. Includes the role and function of the layers, the logical components involved, the interfaces and their static and dynamic behaviors. This architecture also includes the cryptographic techniques as logical components of the implementation. It clearly defines what is “on-chain” vs “off-chain” ● Tertiary Architecture (Infrastructure): The IT systems that support the blockchain as an application, and described in terms of infrastructure. Also includes the IT systems that provide operational support, including security operations, as well as the off-chain components that interact with the blockchain 10
  • 11. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Crypto Economics ● Cryptographic primitives and techniques have a unique attribute among all other security controls in the technical domain: is it cheaper for the defender to apply them than for an attacker to defeat the controls. ● This cost asymmetry is an inherent property of current algorithms, and is supported by formal proofs and mathematical analysis of the techniques leading to adoption as technical standards. ● Open financial instruments that rely on Blockchain Technology are making use of cryptographic techniques to drive economic incentives, implemented as design mechanisms in those instruments. This usage has been branded “Cryptoeconomics”. ● Cryptoeconomics can be defined as the application of game theory costs models to cryptographic techniques to determine economic incentives in decentralized systems that is assumed to have adversarial actors, with the objective of leverage cryptography cost asymmetry to provide a level of fault tolerance and resolve conflicts. This field is not exclusive to blockchains but is a built-in property for blockchains. ● Cryptoeconomics plays a role in Blockchain Technology Threat Modeling as the functions that inhabit the boundary between on-chain and off-chain could upset the design balance of the system. ● While security controls costs are usually consider during their design, the application of game theory for developing security controls in the form of incentives by levering cryptography is a novel approach. 11
  • 12. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Threat Modeling Considerations Given the diversity of potential configurations and applications for blockchains it is not possible to build a generic threat model that applies to all circumstances. Threat modeling can still be applied, but with special consideration for the blockchain specific architecture as a distributed system. When performing a threat model for a blockchain implementation the practitioner should pay special attention to: • Functions that rely on data and transactions recorded in the blockchain (on-chain) and benefit from its inherent attributes • Functions that are executed outside the blockchain (off-chain) and therefore do not inherit any of the blockchain inherent attributes • Functions that cross the boundary between on-chain and off-chain processing. While the blockchain may be able to provide transaction trust among untrusted parties by means of a consensus mechanism, parties that are not participating in the consensus mechanism (off-chain) can not be said to be part of the transaction trust • Layering effect due to encapsulation of protocols that could result on expected attributes from one layer not to be present in the layers above 12
  • 13. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Off-chain components vulnerabilities The trust-less operation of a blockchain does not extend to components residing outside the consensus network. Those out-of-chain components don’t benefit from any of the inherent or emergent blockchain attributes and can be susceptible to STRIDE threats (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service and Elevation of privilege). These are examples of functions that are executed off-chain: • Oracles acting as an appointed trusted source providing real world data to a blockchain • Applications that connect to the blockchain via APIs • IoT devices feeding data to an Oracle or an application • Inter-node messages that are not recorded in the ledger • Third parties such as Wallets and exchanges acting on behalf of a user that does not interact directly with the blockchain via a node participating in the consensus 13
  • 14. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Application Security – Smart Contracts Smart Contract Pitfalls • Designing with Immutability in mind (kill switch, ownership) • Versioning • Coding Language • Frameworks (external dependencies) • Run-away processes protection Caution: there is a lot code out there that is neither smart nor contracts 14
  • 15. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Smart Contract Security Tools • Various organizations are now bringing out blockchain security tools to address this void. Here is the list: • A platform should support conventional programming languages to ensure existing secure coding practices can be leveraged. • OpenZeppelin has created an open framework of reusable and secure smart contracts in the Solidity language. • Trailofbits has created following tools: • A repository that contains examples of common Ethereum smart contract vulnerabilities, including real code. • "Slither combines a set of proprietary static analyses on Solidity that detect common mistakes such as bugs in reentrancy, constructors, method access, and more. Run Slither as you develop, on every new checkin of code." • "Echidna applies next-generation smart fuzzing to EVM bytecode. Write Echidna tests for your code after you complete new features. It provides simple, high coverage unit tests that discover security bugs. Until your app has 80+% coverage with Echidna, don’t consider it complete". • "Manticore uses symbolic execution to simulate complex multi-contract and multi-transaction attacks against EVM bytecode. Once your app is functional, write Manticore tests to discover hidden, unexpected, or dangerous states that it can enter. Manticore enumerates the execution states of your contract and verifies critical functionality". • They have also created some reversing tools just like Porosity below which converts bytecode to solidity code. • NCC Group had compiled a DASP (Decentralized Application Security Project) Top10 list • Porosity, a decompiler and smart contract auditing tool for Ethereum smart-contracts. 15
  • 16. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Application Security – Best Practices Recommended Best Practices • Code Management (Code supply chain security: Github, CVS) • Code Sources: Open Source, Proprietary • Security Testing: Environment Isolation, DevSecOps pipeline) • Code assurances: Signing, fingerprint, distribution, packaging • Tools: DAST, SAST, Smart Contract proofing, Test Driven Development • Industry Standard Cryptographic primitives Caution: Open Blockchain and Open Source are not the same thing. 16
  • 17. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Identity and Access Management Consider who has access, how and why: • End user • Developers • Administrative Access • MFA/2FA • Segregation of Duties/Roles in Conflict Identity Sources: • Centralized & Decentralized • Identity Providers, Trust, and Consumption Caution: Identity underpins Access. Bad Identity results on Bad Access 17
  • 18. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Privacy & Confidentiality Considerations 1/2 • Due to its inherent security attributes, blockchain technology would seem to be a good fit for data security solutions where high integrity and availability are required. • A review of use cases, either in public or consortium domains, would reveal that Database technology is not challenged by blockchain technology when considering transaction performance, confidentiality and data retention requirements. • Use of blockchain technology for data security, or to store or manage data, requires to pay attention to the data security requirements. Not doing so could lead to miss-applications of blockchain technology. 18
  • 19. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Privacy & Confidentiality Considerations 2/2 The first consideration would be regarding the classification of the data, specifically around the inclusion of data elements that require High Confidentiality. A subset of this would include Personal Identifiable Information (PII). Public and Consortium Blockchains may not suitable for sharing data across parties, when the data needs to remain confidential to those parties. Consortiums could rely on off-chain compensating controls to address Confidentiality issues, as part of Consortium Governance. Public blockchains currently lack the controls required to provide forward looking Confidentiality requirements, and any data stored in a public blockchain could be considered to be at risk and potentially exposed in the future. Use of blockchain technology for storing PII is strongly not recommended, as it is not likely to comply with privacy legislation: • Once the data is shared, it can not be unshared • Data encryption, as a confidentiality control, is exposed to technology obsolesce • Data that has been shared, and protected with current encryption standards, could be exposed in the future • Current technologies don’t address data retention requirements • Data stored in a blockchain is immutable and cant be updated as per new encryption standards 19
  • 20. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Immutability & Data Retention • While it may seem that blockchain immutability is an all-around positive attribute, it does creates some challenges with data management. Data that has been stored in a blockchain, specially public ones, is not susceptible to data retention policies. Once recorded, the data would remain as is for the lifetime of the blockchain. • The Immutability security attribute of blockchain technology creates additional challenges for Confidentiality, as it makes it virtually impossible to address legacy data protection controls: it can neither be deleted or re-encrypted. 20
  • 21. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Security Operations - Processes Consider “who, where, when & how” for these processes • Blockchain initiation Ceremony (genesis block) • Incident Response (before it becomes a crisis) • Crisis Management (when things go really bad) • Third party validations and assessment (trust no one) • Vulnerability Management (and Remediation) • Capacity Management • Disaster Recovery • Physical Security 21
  • 22. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Security Operations – Key Management The complexity of Key Management is usually underestimated up front. • Type of Wallet supported (HD Wallets recommended) • Type of Key (do not invent, follow) • Safe key storage (cold storage, physical ) • Key issuance • Key transmitting • Key Revocation • Use of MultiSig Caution: Keys have limited lifetime. Frequent usage means exposure. 22
  • 23. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Security Operations – Monitoring Consider the W’s (who, where, how) for these ongoing processes: • Security Logs (Where are those and for how long) • DoS Attacks • Health of nodes (and Mempools monitoring) • Transaction processing (detect availability issues) • Master Nodes Changes • Measure Centralization (network, miners, …) Caution: Often the most invisible of components has the biggest effect on security: mind network concentration. 23
  • 24. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Compliance and Audit Any hints of ownership (financial or operational) over a blockchain system dealing with real assets usually ends with someone being on the receiving end of Compliance and Audit. Eventually. The best way to deal with Audit and Compliance is pro-actively self-audit and having an independent party provide audit reports. Caution: mind the jurisdiction of the owners, operators, management and clients. Blockchain projects have a knack for crossing jurisdictions. 24
  • 25. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Conclusion • Requirements, Requirements, Requirements • Avoid assumptions • Document the design for: • Infrastructure • Data structures • dApp • Frontend App Hint: Consult with qualified Security SMEs if you need help. 25
  • 26. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Questions 26
  • 27. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Thank You! 27
  • 28. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca Backup Slides 28
  • 29. Secunoid Systems Inc. http://www.secunoid.com Alto Azul Consulting Inc. https://blocksec.ca 29 Three views Node • By necessity, most technologies share a similar node structure • The Peer to Peer network can use any protocols • Key Management is done outside the node • There could be specialized nodes, and lightweight nodes • Enterprise Blockchain could have pluggable Consensus • Current technologies don’t limit the size of the Data Structure • There are a number of components that reside outside the node Protocol • Blockchain can be considered to be a “fat protocol” • As a protocol, Blockchain moves “value” instead of “information” • Unlike internet protocols where the value is in applications • Blockchain protocols create value directly (participation and investment) • The protocol value drives adoption and standardization • The notion applies to public Blockchain, but could cross over Platform (Web 3.0, Distributed Applications) • Blockchain proposes an platform (internet of money) • This stack includes a number of natively distributed components • The model promotes decentralization and disintermediation • It is based on Cryptoeconomic designs (consensus, incentive/penalty driven) • Is driving Interoperability across the landscape • Lacks Command and Control points (nobody is in charge) • This notion is present in Enterprise Blockchain (Distributed Applications Marketplace) API Consensus Mechanism Computation (smart Contract) Peer to Peer network Blockchain Data Structure Application Layer Protocol Layer Application Layer Protocol Layer Internet Blockchain Distributed Apps User Applications System Integration Node Node Network