Common threats and how Hyperledger Fabric mitigates them
Hyperledger Fabric provides protection against some of the most common security threats, and assumes a shared responsibility model for addressing others. In the following table, we will summarize the most common security threats, whether Hyperledger Fabric addresses them and how or whether it is the responsibility of a node/network operator to address them:
Threat | Description | Hyperledger Fabric | Network/Node Operator |
Spoofing | Use of a token or other credential to pretend to be an authorized user, or compromise a user's private key. | Fabric certificate authority generates X.509 certificates for its members. | Manage certificate revocation list distribution among network participants to ensure that revoked members can no longer access the system. |
Tampering | Modify information (for example, an entry in the database). | Use of cryptographic measures (SHA256, ECDSA) make tampering infeasible. | Derived from Fabric. |
Repudiation | An entity cannot deny who did what... |