SlideShare a Scribd company logo
1 of 17
Security & compliances
Ghan Vashishtha
Episode 4
What will this webinar teach us?
Blockchain Investment
CAGR (2019-27)
Enterprise blockchain security and compliance norms, risks to weigh in
before enterprise blockchain adoption
Monitoring and security tools required to configure and manage your
infrastructure.
Technical showcase of the major new risks for enterprise blockchain and
smart contract deployments
Resources required to monitor for security vulnerabilities and updates in the
blockchain and smart contract software
Importance of a secure blockchain infrastructure management platform, its
benefits, how these work, and the deployment patterns when considering
secure communications for blockchain interactions
Explore the web3 security tools
Key examples of how enterprise-grade security offered by Zeeve for
deployment and web3 infrastructure management can benefit businesses
Confidentiality Data Integrity Availability
1 2 3
Key pillars of blockchain security
5
Security Differs by Blockchain Types:
When building a blockchain application, it’s critical to assess which type of network will best
suit your enterprise goals. Private and permissioned networks can be tightly controlled and
preferable for compliance and regulatory reasons. However, public and permissionless
networks can achieve greater decentralization and distribution.
5
Zeeve Football World Cup
Contest
Contest open till 18th December, 2022, 6:30
PM IST Click this link to participate NOW and
SPREAD the word.
5
1. Phishing
2. Routing
3. Sybil and
4. 51% attacks.
How fraudsters attack blockchain technology
Hackers and fraudsters threaten blockchains in four primary ways:
5
1. Identity and access management
2. Key management
3. Data privacy
4. Secure communication
5. Smart contract security
6. Transaction endorsement
A comprehensive security strategy for an enterprise blockchain solution includes
using traditional security controls and technology-unique controls. Some of the
security controls specific to enterprise blockchain solutions include:
5
1. Standard risk considerations
2. Smart contract risk considerations
3. Value transfer risk considerations
Risk considerations that you should consider
Standard risk considerations
Strategic
Business
continuity
Reputational
Information
security
Regulatory Ops and IT Contractual Supplier
Smart contract risk considerations
Business and regulatory Legal liability
Enforcement of contract Information security
Value transfer risk considerations
Consensus protocol Data confidentiality
Key management Liquidity
10 Enterprise Blockchain Implementation Risks to Consider
1. Improper Logging & Monitoring
2. Insecure Deserialization
3. Sensitive Data Exposure
4. Cross-Site Scripting(XSS)
5. Injection
6. Security Misconfiguration
7. XML External Entities(XXE)
8. Broken Access Control
9. Using components with vulnerabilities
10. Broken Authentication
Risk considerations that you should consider
Growth / innovation Client experience Cost reduction
Improved time to
market
Risk and compliance
management
Information
technology
Human resources Compliance Finance Other
Standard risk considerations Standard risk considerations Standard risk considerations
Governance and
oversight
Policies and
standards
Management
processes
Tools and
technology
Risk metrics and
reporting
Risk culture
Strategic Reputational Business
continuity
Security
Regulatory Ops and IT Contractual Supplier
Consensus protocol Data Confidentiality
Key Management Liquidity
Business and
regulatory
Legal Liability
Enforcement of
contracts
Governance
Business
objectives
Core processes,
supporting functions
Risk considerations
Operating model
components
Components of an effective blockchain risk management framework
5
1. What is the governance model for participating organizations or members?
2. What data will be captured in each block?
3. What are the relevant regulatory requirements, and how can they be met?
4. How are the details of identity managed? Are block payloads encrypted? How are the keys
managed and revoked?
5. What is the disaster recovery plan for the blockchain participants?
6. What is the minimal security posture for blockchain clients for participation?
7. What is the logic for resolving blockchain block collisions?
Blockchain Security tips and best practices
When designing a blockchain solution, consider these key questions:
5
1. Develop a risk model that can address all business, governance, technology and
process risks.
2. Enforce security controls that are unique to blockchain
3. Apply conventional security controls
4. Enforce business controls for blockchain
Solutions to resolving blockchain risks and ensuring
compliance
Administrators must define the security controls that mitigate the risks and threats
based on the following three categories:
USA Dubai India
Zeeve Deeptech Pvt Ltd
1283, ATS Greens, Sector-93A
Noida, India 201304
Zeeve Technologies Ltd.
2001, Regal Tower, Business Bay,
Dubai, UAE
Zeeve Inc.
395 Santa Monica Place, Unit 308,
Santa Monica, California - 90405
Address
Contact
http://www.zeeve.io
Email: success@zeeve.io

More Related Content

Similar to Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”

[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
Perforce
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
SIR SUCCESS PRINCE DUAH DUAH
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 

Similar to Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption” (20)

Enterprise Blockchain: Top Considerations Before You Deploy
 Enterprise Blockchain: Top Considerations Before You Deploy Enterprise Blockchain: Top Considerations Before You Deploy
Enterprise Blockchain: Top Considerations Before You Deploy
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...The implications of blockchain for the insurance industry - Eurapco Peer Semi...
The implications of blockchain for the insurance industry - Eurapco Peer Semi...
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
Blockchain App Development Company.pdf
Blockchain App Development Company.pdfBlockchain App Development Company.pdf
Blockchain App Development Company.pdf
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Webinar-Episode 6-Enterprise Blockchain Adoption-Scaling from Pilot to Produc...
Webinar-Episode 6-Enterprise Blockchain Adoption-Scaling from Pilot to Produc...Webinar-Episode 6-Enterprise Blockchain Adoption-Scaling from Pilot to Produc...
Webinar-Episode 6-Enterprise Blockchain Adoption-Scaling from Pilot to Produc...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Blockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfBlockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdf
 
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech..."Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 

More from Zeeve

More from Zeeve (12)

Launching a Rollup & Appchain: Everything from Idea to its Implementation
Launching a Rollup & Appchain: Everything from Idea to its ImplementationLaunching a Rollup & Appchain: Everything from Idea to its Implementation
Launching a Rollup & Appchain: Everything from Idea to its Implementation
 
Webinar – Blockchain, NFT, Crypto & DeFi – A Primer for these exciting develo...
Webinar – Blockchain, NFT, Crypto & DeFi – A Primer for these exciting develo...Webinar – Blockchain, NFT, Crypto & DeFi – A Primer for these exciting develo...
Webinar – Blockchain, NFT, Crypto & DeFi – A Primer for these exciting develo...
 
How to Start Building in Web3 – Smart Contract Design & Development Part 1
How to Start Building in Web3 – Smart Contract Design & Development Part 1How to Start Building in Web3 – Smart Contract Design & Development Part 1
How to Start Building in Web3 – Smart Contract Design & Development Part 1
 
The Anatomy of a DAO–Understanding the inner workings of decentralized organi...
The Anatomy of a DAO–Understanding the inner workings of decentralized organi...The Anatomy of a DAO–Understanding the inner workings of decentralized organi...
The Anatomy of a DAO–Understanding the inner workings of decentralized organi...
 
The Rise of App-chains: Driving Scalability, Security, and Performance with A...
The Rise of App-chains: Driving Scalability, Security, and Performance with A...The Rise of App-chains: Driving Scalability, Security, and Performance with A...
The Rise of App-chains: Driving Scalability, Security, and Performance with A...
 
Rolling with Rollups Exploring Optimistic & Zero Knowledge Solutions use case...
Rolling with Rollups Exploring Optimistic & Zero Knowledge Solutions use case...Rolling with Rollups Exploring Optimistic & Zero Knowledge Solutions use case...
Rolling with Rollups Exploring Optimistic & Zero Knowledge Solutions use case...
 
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
 
DeFi Series – Webinar 3 – The DeFi Use Cases (DEX, Lending)
DeFi Series – Webinar 3 – The DeFi Use Cases (DEX, Lending)DeFi Series – Webinar 3 – The DeFi Use Cases (DEX, Lending)
DeFi Series – Webinar 3 – The DeFi Use Cases (DEX, Lending)
 
DeFi Series – Webinar 2- DeFi Primitives
DeFi Series – Webinar 2- DeFi PrimitivesDeFi Series – Webinar 2- DeFi Primitives
DeFi Series – Webinar 2- DeFi Primitives
 
Webinar-Dubai DeFi Series-Webinar 1-The Basics of DeFi
Webinar-Dubai DeFi Series-Webinar 1-The Basics of DeFiWebinar-Dubai DeFi Series-Webinar 1-The Basics of DeFi
Webinar-Dubai DeFi Series-Webinar 1-The Basics of DeFi
 
Webinar- GBA-Enterprise Blockchain Adoption Episode 3-Use Case Analysis
Webinar- GBA-Enterprise Blockchain Adoption Episode 3-Use Case AnalysisWebinar- GBA-Enterprise Blockchain Adoption Episode 3-Use Case Analysis
Webinar- GBA-Enterprise Blockchain Adoption Episode 3-Use Case Analysis
 
GBA – Episode 1 “Enterprise Blockchain Adoption” – Cost of doing blockchain
GBA – Episode 1 “Enterprise Blockchain Adoption” – Cost of doing blockchainGBA – Episode 1 “Enterprise Blockchain Adoption” – Cost of doing blockchain
GBA – Episode 1 “Enterprise Blockchain Adoption” – Cost of doing blockchain
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Webinar- GBA Episode 4 – Enterprise Blockchain Adoption “Security & Adoption”

  • 1. Security & compliances Ghan Vashishtha Episode 4
  • 2. What will this webinar teach us? Blockchain Investment CAGR (2019-27) Enterprise blockchain security and compliance norms, risks to weigh in before enterprise blockchain adoption Monitoring and security tools required to configure and manage your infrastructure. Technical showcase of the major new risks for enterprise blockchain and smart contract deployments Resources required to monitor for security vulnerabilities and updates in the blockchain and smart contract software Importance of a secure blockchain infrastructure management platform, its benefits, how these work, and the deployment patterns when considering secure communications for blockchain interactions Explore the web3 security tools Key examples of how enterprise-grade security offered by Zeeve for deployment and web3 infrastructure management can benefit businesses
  • 3. Confidentiality Data Integrity Availability 1 2 3 Key pillars of blockchain security
  • 4. 5 Security Differs by Blockchain Types: When building a blockchain application, it’s critical to assess which type of network will best suit your enterprise goals. Private and permissioned networks can be tightly controlled and preferable for compliance and regulatory reasons. However, public and permissionless networks can achieve greater decentralization and distribution.
  • 5. 5
  • 6. Zeeve Football World Cup Contest Contest open till 18th December, 2022, 6:30 PM IST Click this link to participate NOW and SPREAD the word.
  • 7. 5 1. Phishing 2. Routing 3. Sybil and 4. 51% attacks. How fraudsters attack blockchain technology Hackers and fraudsters threaten blockchains in four primary ways:
  • 8. 5 1. Identity and access management 2. Key management 3. Data privacy 4. Secure communication 5. Smart contract security 6. Transaction endorsement A comprehensive security strategy for an enterprise blockchain solution includes using traditional security controls and technology-unique controls. Some of the security controls specific to enterprise blockchain solutions include:
  • 9. 5 1. Standard risk considerations 2. Smart contract risk considerations 3. Value transfer risk considerations Risk considerations that you should consider
  • 11. Smart contract risk considerations Business and regulatory Legal liability Enforcement of contract Information security
  • 12. Value transfer risk considerations Consensus protocol Data confidentiality Key management Liquidity
  • 13. 10 Enterprise Blockchain Implementation Risks to Consider 1. Improper Logging & Monitoring 2. Insecure Deserialization 3. Sensitive Data Exposure 4. Cross-Site Scripting(XSS) 5. Injection 6. Security Misconfiguration 7. XML External Entities(XXE) 8. Broken Access Control 9. Using components with vulnerabilities 10. Broken Authentication
  • 14. Risk considerations that you should consider Growth / innovation Client experience Cost reduction Improved time to market Risk and compliance management Information technology Human resources Compliance Finance Other Standard risk considerations Standard risk considerations Standard risk considerations Governance and oversight Policies and standards Management processes Tools and technology Risk metrics and reporting Risk culture Strategic Reputational Business continuity Security Regulatory Ops and IT Contractual Supplier Consensus protocol Data Confidentiality Key Management Liquidity Business and regulatory Legal Liability Enforcement of contracts Governance Business objectives Core processes, supporting functions Risk considerations Operating model components Components of an effective blockchain risk management framework
  • 15. 5 1. What is the governance model for participating organizations or members? 2. What data will be captured in each block? 3. What are the relevant regulatory requirements, and how can they be met? 4. How are the details of identity managed? Are block payloads encrypted? How are the keys managed and revoked? 5. What is the disaster recovery plan for the blockchain participants? 6. What is the minimal security posture for blockchain clients for participation? 7. What is the logic for resolving blockchain block collisions? Blockchain Security tips and best practices When designing a blockchain solution, consider these key questions:
  • 16. 5 1. Develop a risk model that can address all business, governance, technology and process risks. 2. Enforce security controls that are unique to blockchain 3. Apply conventional security controls 4. Enforce business controls for blockchain Solutions to resolving blockchain risks and ensuring compliance Administrators must define the security controls that mitigate the risks and threats based on the following three categories:
  • 17. USA Dubai India Zeeve Deeptech Pvt Ltd 1283, ATS Greens, Sector-93A Noida, India 201304 Zeeve Technologies Ltd. 2001, Regal Tower, Business Bay, Dubai, UAE Zeeve Inc. 395 Santa Monica Place, Unit 308, Santa Monica, California - 90405 Address Contact http://www.zeeve.io Email: success@zeeve.io