Blockchain distributed-ledger technology is opening up new frontiers for financial services and other companies, but security specialists are pushing for early action on both blockchain and related account-management technologies to avoid the punishing security breaches being seen due to Internet of Things (IoT) shortcomings.
Despite its inherently secure design – blockchain is the core mathematical mechanism at the heart of the Bitcoin virtual currency – businesses seeking to employ the distributed-ledger tool for other uses need to tightly control access to those ledgers, CyberArk APJ senior director of presales Jeffrey Kok told CSO Australia.
“One of the key changes that people have overlooked is the protection of who gets to write to the ledger,” Kok explained, noting that writing to the ledgers is protected by a digital certificate or private key.
“If you don’t have the right protections around those, then the wrong people can get to the transactions and cause problems. The ledger is about the people who have the key to amend the ledger – but this is currently not well protected.”
Application access needs to be equally protected, since much of the activity in any blockchain deployment will be managed without human intervention. Yet businesses are struggling to apply the necessary discipline across their environments, with one study finding that 83 percent of businesses faced challenges in fixing http://www.cso.com.au/
Blockchain’s legitimacy as a business tool has grown quickly this year – particularly http://www.
With automated tools readily available for improving the account-management process, businesses hoping to tap into the potential of blockchain or IoT environments must first get on top of their access controls or risk endangering the integrity of the core financial processes they are seeking to revolutionise.
Gartner recently recognised the risks that the new technology creates, with research director Jonathan Care noting in http://www.gartner.com/
With privileged-account management practices still wanting within most organisations, Kok highlighted the potential role of behavioural analytics to complement security practices around blockchain and IoT. By simply detecting when a particular user accesses blockchain-related systems, he says, behaviour could be flagged as an anomaly and appropriate action taken before serious problems develop.
“You need to think about a new layer of defence,” Kok explains. “Predominantly, the IT security paradigm believes in blocking protection. But you need to assume that your perpetrator is inside the network and how else you can protect against this rather than the traditional ways. If some malicious criminal has gotten entry to a machine, someone should know about it.”