Distributed ledger tech implementations require refurbished approach to security, says DTCC paper

With the adoption of distributed ledger technology (DLT) expected to grow in financial services, The Depository Trust & Clearing Corporation (DTCC), has published a white paper, Security of DLT Networks, that recommends establishing a comprehensive industry-wide DLT Security Framework to review existing security guidelines, gaps in the approach to DLT security, and the need for increased standards. 

The paper also suggests the possible formation of an Industry Consortium to spearhead this topic.

 
According to the paper, the establishment of a DLT Security Framework would:  
 
• Assist in the completion of risk evaluations across an individual firm’s security assessments via best practices and tools, such as risk management & oversight, cybersecurity controls, third-party management, and incident & event management.

• Address key aspects of the DLT key management lifecycle, including DLT-specific security considerations associated with the creation, maintenance, storage and disposal of sensitive information.

• Provide security guidance and practices respective to account access with the use of cryptographic hash functions, standard authentication methods and bridging the security gap between DLT and traditional IT environments.

“With adoption of DLT across the financial services ecosystem likely to continue to increase in the coming years, we need to be certain that all DLT-related security risks are identified and addressed to maintain the safety and stability of the markets,” says Stephen Scharf, Chief Security Officer at DTCC. “DLT offers great potential, but as with any new technology, it also comes with certain risks. Traditional security measures may not be adequate, so it is critically important that this topic is top of mind for any DLT implementation.”
 
To move forward, DTCC calls for a coordinated strategy around the development of a principles-based framework to identify and address DLT- specific security risks. The firm will leverage its unique role within the financial services sector to begin the conversation across the industry.
 
“As is common in IT security communities, frameworks must be widely available, generally agreed upon, and commonly adopted. As best practices mature, they can be adopted into a formal framework and used for financial industry participants and regulators alike,” adds Scharf.