DTCC spearheading cyber strategy for DLT adoption

With the adoption of distributed ledger technology (DLT) expected to grow in financial services, the Depository Trust & Clearing Corporation (DTCC) published a white paper, Security of DLT Networks, that recommends establishing a comprehensive industry-wide DLT Security Framework to review existing security guidelines, gaps in the approach to DLT security, and the need for increased standards. The paper also suggests the possible formation of an Industry Consortium to spearhead this topic.

According to the paper, the establishment of a DLT Security Framework would:

  • Assist in the completion of risk evaluations across an individual firm’s security assessments via best practices and tools, such as risk management & oversight, cybersecurity controls, third-party management, and incident & event management.
  • Address key aspects of the DLT key management lifecycle, including DLT-specific security considerations associated with the creation, maintenance, storage and disposal of sensitive information.
  • Provide security guidance and practices respective to account access with the use of cryptographic hash functions, standard authentication methods and bridging the security gap between DLT and traditional IT environments.

“With adoption of DLT across the financial services ecosystem likely to continue to increase in the coming years, we need to be certain that all DLT-related security risks are identified and addressed to maintain the safety and stability of the markets,” said Stephen Scharf, chief security officer at DTCC.

“DLT offers great potential, but as with any new technology, it also comes with certain risks. Traditional security measures may not be adequate, so it is critically important that this topic is top of mind for any DLT implementation.”

To move forward, DTCC calls for a coordinated strategy around the development of a principles-based framework to identify and address DLT- specific security risks, a conversation it wants to lead.

“As is common in IT security communities, frameworks must be widely available, generally agreed upon, and commonly adopted. As best practices mature, they can be adopted into a formal framework and used for financial industry participants and regulators alike,” added Scharf.

Read the white paper

Related Posts

Previous Post
FT: patents reveal extent of China’s digital currency plans
Next Post
CCP12 calls for harmonized reporting of collateral for uncleared derivatives

Fill out this field
Fill out this field
Please enter a valid email address.

X

Reset password

Create an account