SME REG No: 1391661

Smart Contract Auditing

Bitcoins and Ethereum fundamentally uses Blockchain as the underlying technology.

Cyber Security for Blockchain Technology

Blockchain Technology is set to revolutionize the way we conduct e-commerce and transactions
The technology itself is based on core principles of security
Blockchain Technology is set to revolutionize the way we conduct e-commerce and transactions

TRANSACTIONAL LEVEL

Transaction Validation
Transaction Signing
Transaction Auditing
Transaction Logging
Consensus Life-cycle
Consensus Algorithm
Consensus Code Development
Source Code Review
Auto-Update Life-cycle
Non-Repudiation
Keyless Security Infrastructure (KSI)
Application Security
Key Management
Immutability Protection
Data Integrity
Finality Protection
Multi-Signature Co-Signing
Policy and Security
Approval and Workflows
Permissioned and Permission-less
Hardware (HSM) Crypto

ACCOUNT LEVEL

User Account Management
User Account Security
Authentication Profiles
Two-Factor Authentication
Self-Managed Wallet Security
Exchange Hosted Account Security
Denial of Services (DoS)
Phishing Prevention and Security
Hosted Exchanges
Wallet Provider Security Controls
My Wallet Security Controls
Logging and Auditing
Application Security
Sessions and Cookie Management
Local Storage Security
Personal and Privacy Information
Policy and Security
Role Based Access Control
Multi-Tenancy
Privacy and Identity Management
Account Verification Process

CONTRACT LEVEL

Script Source Code Review
Contract Code Audit
Programming Security
Secure Development Life-cycle
Contract Threat Correlation
Threat Simulation Smart Rules
Contract Verification Workflow
Fallback function security
Bug Identification
Variable Limiting
Program function validation
Call stack limit vulnerability
Contract Data Classification
Proof of Work
Smart Contract Cryptography
Re-entrancy Protection
Contract Vulnerability Assessment
Check Effect Interaction Pattern
Function Wrapping
Compiler Bugs
Unbound Loops

DISTRIBUTED ORGANIZATION LEVEL

Organization Level Security and Conformity Requirements
Technical Security Requirements
Token Assignment
Token Authorization
Validators Security Control
Censorship Policy
Blockchain contract approval workflow
Entity Level Security Validation
Security Readiness Verification
HSM Crypto
Key Management
Application Security
Multi-Signature Co-Signing
Distributed Authorization Process

NETWORK AND APPLICATION LEVEL

Permissioned Network
Open or Hybrid Architecture
P2P Network Security Architecture
VPN and secure communication
Next Generation Firewalls
Security Zoning
Network Segmentation
Intrusion Prevention System
Web Application Security Controls
API Security Gateway
PKI Security Infrastructure
Virtual Machine Infrastructure
Data Center Switching
Data Center Routing
Protocol Security
In-band and Out of band Management
Threat intelligence
Phishing Security
Threat Hunting

GOVERNANCE LEVEL

Security Operations
Logging and Monitoring
Governance and Compliance
Risk Management
Data Security
Data Classification
Data Labelling
Transactional Records
Smart Contract Tagging
Security Approval Workflows
Information Security Policies
Security Processes and Procedures
Asset Management
Disaster Recovery
Backup and Restoration
Security Awareness and Training

Subscribe Our Newsletter

Sign up to our newsletter, so you can be the first to find out the latest news and tips about Cyber Security Programs, as well as general Chevening updates throughout the year.