BSI PD ISO/TR 23576:2020
$167.15
Blockchain and distributed ledger technologies. Security management of digital asset custodians
Published By | Publication Date | Number of Pages |
BSI | 2020 | 44 |
This document discusses the threats, risks, and controls related to:
-
systems that provide digital asset custodian services and/or exchange services to their customers (consumers and businesses) and management of security when an incident occurs;
-
asset information (including the signature key of the digital asset) that a custodian of digital assets manages.
This document is addressed to digital asset custodians that manage signature keys associated with digital asset accounts. In such a case, certain specific recommendations apply.
The following is out of scope of this document:
-
core security controls of blockchain and DLT systems;
-
business risks of digital asset custodians;
-
segregation of customer’s assets;
-
governance and management issues.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative reference 3 Terms and definitions |
10 | 4 Abbreviated terms |
11 | 5 Basic description of a model of online system for digital asset custodianship 5.1 General 5.2 Example of a system for digital asset custodians and its functional components |
12 | 5.3 Examples of transactions |
13 | 5.4 Description of keys used for signature and encryption 5.4.1 Type of keys |
14 | 5.4.2 Flow for key generation and key usage |
16 | 5.4.3 Using multiple keys 5.4.4 Suspension of keys 5.5 Characteristics of digital assets held in DLT / blockchain systems 5.5.1 General 5.5.2 Importance of signature keys |
17 | 5.5.3 Diversity of implementations 5.5.4 Possibility of blockchain forks |
18 | 5.5.5 Risks for unapproved transactions 6 Basic objectives of security management for digital asset custodians |
19 | 7 Approaches to basic security controls |
20 | 8 Digital asset custodians’ risks 8.1 General 8.2 Risks related to the system / platform of the digital asset custodian 8.2.1 General |
21 | 8.2.2 Signature key risks |
24 | 8.2.3 Risks on asset data 8.2.4 Risks related to suspension of systems and operations |
25 | 8.3 Risks from external factors 8.3.1 General 8.3.2 Risks related to the internet infrastructure and authentication infrastructure |
26 | 8.3.3 Risks inherent to digital asset DLT systems / blockchains |
27 | 8.3.4 Risks arising from external reputation databases and anti-money-laundering regulations |
28 | 9 Consideration on security controls of digital asset custodians 9.1 General 9.2 Basis for considerations about security management |
29 | 9.3 Considerations about security controls on digital asset custodians 9.3.1 Guidelines for the information security management 9.3.2 Information security policies 9.3.3 Organization of information security 9.3.4 Human resource security 9.3.5 Asset management |
30 | 9.3.6 Access control |
31 | 9.3.7 Security controls on signature keys |
35 | 9.3.8 Physical and environmental security |
36 | 9.3.9 Operations security |
38 | 9.3.10 Communications security |
40 | 9.3.11 Supplier relationships 9.3.12 Information security incident management 9.3.13 Information security aspect of business continuity management |
41 | 9.3.14 Compliance 9.4 Other digital asset custodian system specific issues — Advance notice to user for maintenance |
43 | Bibliography |