Security assurance for distributed ledger technology |
 |
Recommendation ITU-T X.1404 defines three levels of security assurance for the distributed ledger technology (DLT) in order to facilitate design and development of security assurance mechanisms. It further defines ten security assurance components encompassing the security assurance and specifies criteria and guidelines for achieving each of the three levels of a security assurance component. Finally, it also provides a mapping between specific threats and security assurance components and a mapping between specific security capabilities and security assurance components.
Distributed ledger technology (DLT) is defined as a shared digital ledger, which is a continually updated list of all transactions. The assurance of DLT is defined as the degree of confidence that the process or deliverable meets defined characteristics or objectives. An assurance level could be considered as a quantitative expression of assurance agreed among the relevant parties.
There is a need for specifying criteria and guidelines for achieving each of the three levels of a security assurance component: data integrity, data confidentiality, credential management, identity proofing of users, entity authentication, authorization, data obfuscation, consensus mechanism strength, smart contract and personally identifiable information (PII) data protection. To facilitate the design and development of security assurance mechanisms, this Recommendation is based on three levels of security assurance.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14450 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1400-X.1429: Distributed ledger technology (DLT) security |
Approval date: |
2020-10-29 |
Provisional name: | X.sa-dlt |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1404 (10/2020)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|