Summary
In this chapter, we first covered design goals of Hyperledger Fabric that are tied to security. All the sets of points which were described are considered to keep Fabric security in mind. We briefly studied the Hyperledger Fabric Security and understood how strong identities are at the heart of Fabric security. We also took a look at chaincode security.
Hyperledger, by itself, is adept at handling threats. We dove into the common Hyperledger security threats and how Fabric mitigates them.
We also briefly looked at the impact of quantum computing on Hyperledger Fabric.
We ended our discussion with regulation considerations. In the final chapter, we will be looking at the next steps in Hyperledger and where it is heading in the future.