Hey there 👋 Welcome to Ajuna Network, the ecosystem for gamers and creators. This site is the entry point for all creators building or integrating on top of Ajuna Network!
Here are some security recommendations to help the team minimize any possible attack vectors. This list is by no means an exhaustive list of guidelines and will evolve in the future.
We should ensure that MFA is used at all times, limiting any attack surface substantially.
As a team, we do not enforce a password schema, but passwords should be as secure as you deem so; some general guidelines are:
Sensitive data is anything that might risk the company if an external party sees it. This data could be:
If any company asset is downloaded to a local machine, it should serve its purpose and be deleted from the local machine or encrypted.
Data at rest is data when it is not moving. Such as:
There are many risks involved with data at rest:
In general, the key to mitigating this risk is to ensure that everything is encrypted and unnecessary data is removed when it is no longer needed.
The best-in-class solution for encrypting data at rest is to encrypt the entire drive using something like LUKS. This is not always feasible so you can use something like EcryptFS to encrypt individual folders/files. These tools are not exhaustive, there are variants in all operating systems.
Some great tools:
Data in transit is any time data is moving from one place to another.
Careful consideration should be taken about the data is sent across:
A note on chat apps:
While not generally insecure, chat apps still open an unnecessary risk of leaked data and open an attack vector of the respective companies’ access to our data.
Some tools that might aid secure messaging:
For example, you might encrypt a pgp message and share your keys somewhere else, so that messages can be secured on the fly.
Logging is an essential tool in the Development Process.
It does, however, carry some risk; Developers should take care to ensure that no sensitive data is logged. And any logs are redacted if passed on an insecure channel.
As a team, we need to be mindful of what we commit to the repository, that is, to ensure no secrets or sensitive data gets leaked in a commit. If this happens, you must ensure the data is not leaked. Usually, this would be rectifying the leakage and force pushing.
To mitigate this, always make sure you inspect your commits before pushing.
All commits should be verified and signed by the person who made the commit.
CI/CD pipelines potentially have the most access to a project’s data, so we should ensure that we are mindful of what we do with it.
Sometimes troubleshooting might print sensitive data; we should be mindful of:
Teams in the blockchain industry are increasingly subject to social engineering attacks. Be on the lookout for any such behavior like:
Generally, the tools used are federated, and we have limited risk as long as offboarding processes are taken promptly.
It’s still helpful to ensure we manage data responsibly and on a need-to-know basis due to several insider threat attacks simply by the attacker having too much access to too much data.
If an incident happens, we should notify the relevant team of the incident and consider how we might mitigate this in the future in a post-incident review.
The purpose of the review is not to point fingers but merely to learn what we can do to mitigate the incident.