Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of blockchain as a service security              
        6.1     Overview of BSP security         
        6.2     Overview of BSD security        
        6.3     Overview of BSC security         
 7     Security threats to blockchain as a service  
        7.1     Security threats to BSP             
        7.2     Security threats to BSD            
        7.3     Security threats to BSC             
 8     Security requirements of blockchain as a service      
        8.1     Security configuration of a customized blockchain network     
        8.2     Identity and access management        
        8.3     Key management       
        8.4     Privacy protection      
        8.5     Crypto engines security           
        8.6     Peer-to-peer connection security        
        8.7     Consensus mechanism security            
        8.8     Smart contract security            
        8.9     Resource monitoring
       8.10     Intrusion detection system   
       8.11     Security audit             
       8.12     Third-party functions management  
       8.13     Supply chain security               
Bibliography