Blockchain Security Standards Council (BSSC) Standards
Industry-led security standards for blockchain infrastructure, published May 2025. Four complementary standards: Node Operation Standard (NOS) for blockchain node security and resilience, Token Integration Standard (TIS) for digital asset integration and governance, Key Management Standard (KMS) for cryptographic key handling and wallet custody, and General Security & Privacy Standard (GSP) for baseline risk management. Founded by Anchorage Digital, Coinbase, Kraken, Fireblocks, Halborn, and OpenZeppelin.
Controls: 105
Total Mappings: 226
Publisher: Blockchain Security Standards Council (BSSC) Version: 1.0 (May 2025) AC (7) AT (4) AU (8) CA (6) CM (9) CP (8) IA (4) IR (6) MP (3) PE (6) PL (2) PM (3) PS (5) PT (4) RA (5) SA (5) SC (10) SI (4) SR (6)
AC Access Control
| Control | Name | BSSC Standards References |
|---|---|---|
| AC-01 | Access Control Policies and Procedures | GSP-11 |
| AC-02 | Account Management | NOS-05KMS-06GSP-11 |
| AC-03 | Access Enforcement | NOS-05TIS-07KMS-06KMS-09GSP-11 |
| AC-04 | Information Flow Enforcement | NOS-04TIS-04 |
| AC-05 | Separation Of Duties | KMS-04KMS-06GSP-11 |
| AC-06 | Least Privilege | NOS-05NOS-08TIS-07KMS-04KMS-05KMS-06KMS-09GSP-11 |
| AC-17 | Remote Access | NOS-05 |
AT Awareness and Training
AU Audit and Accountability
| Control | Name | BSSC Standards References |
|---|---|---|
| AU-01 | Audit And Accountability Policy And Procedures | GSP-12 |
| AU-02 | Auditable Events | NOS-06GSP-10GSP-12 |
| AU-03 | Content Of Audit Records | GSP-12 |
| AU-06 | Audit Monitoring, Analysis, And Reporting | NOS-06GSP-12 |
| AU-09 | Protection Of Audit Information | TIS-07KMS-09GSP-12 |
| AU-10 | Non-Repudiation | TIS-05KMS-08 |
| AU-11 | Audit Record Retention | GSP-12 |
| AU-12 | Audit Record Generation | NOS-06 |
CA Security Assessment and Authorization
| Control | Name | BSSC Standards References |
|---|---|---|
| CA-01 | Certification, Accreditation, And Security Assessment Policies And Procedures | NOS-01TIS-01KMS-01GSP-10 |
| CA-02 | Security Assessments | TIS-02TIS-06GSP-10GSP-15 |
| CA-05 | Plan Of Action And Milestones | KMS-07 |
| CA-06 | Security Accreditation | TIS-08GSP-01 |
| CA-07 | Continuous Monitoring | NOS-10GSP-15 |
| CA-08 | Penetration Testing | TIS-02GSP-08GSP-15 |
CM Configuration Management
| Control | Name | BSSC Standards References |
|---|---|---|
| CM-01 | Configuration Management Policy And Procedures | GSP-14 |
| CM-02 | Baseline Configuration | NOS-03GSP-14 |
| CM-03 | Configuration Change Control | NOS-10TIS-08KMS-07GSP-14 |
| CM-04 | Monitoring Configuration Changes | NOS-10 |
| CM-05 | Access Restrictions For Change | TIS-08GSP-14 |
| CM-06 | Configuration Settings | NOS-03TIS-03GSP-14 |
| CM-07 | Least Functionality | NOS-03TIS-03 |
| CM-08 | Information System Component Inventory | NOS-03GSP-14 |
| CM-14 | Signed Components | NOS-02 |
CP Contingency Planning
| Control | Name | BSSC Standards References |
|---|---|---|
| CP-01 | Contingency Planning Policy And Procedures | GSP-06 |
| CP-02 | Contingency Plan | NOS-07GSP-06 |
| CP-04 | Contingency Plan Testing And Exercises | GSP-06 |
| CP-07 | Alternate Processing Site | NOS-07 |
| CP-08 | Telecommunications Services | NOS-07 |
| CP-09 | Information System Backup | NOS-07KMS-10GSP-06 |
| CP-10 | Information System Recovery And Reconstitution | NOS-07KMS-10GSP-06 |
| CP-11 | Alternate Communications Protocols | GSP-06 |
IA Identification and Authentication
IR Incident Response
MP Media Protection
PE Physical and Environmental Protection
PL Planning
PM Program Management
PS Personnel Security
PT Personally Identifiable Information Processing and Transparency
RA Risk Assessment
SA System and Services Acquisition
| Control | Name | BSSC Standards References |
|---|---|---|
| SA-04 | Acquisitions | TIS-03TIS-06KMS-03GSP-07 |
| SA-08 | Security Engineering Principles | TIS-03KMS-02 |
| SA-09 | External Information System Services | GSP-07 |
| SA-10 | Developer Configuration Management | NOS-02TIS-08 |
| SA-11 | Developer Security Testing | NOS-02TIS-02TIS-04GSP-08GSP-15 |
SC System and Communications Protection
| Control | Name | BSSC Standards References |
|---|---|---|
| SC-05 | Denial Of Service Protection | NOS-04 |
| SC-07 | Boundary Protection | NOS-04TIS-04 |
| SC-08 | Transmission Integrity | NOS-04TIS-05GSP-13 |
| SC-12 | Cryptographic Key Establishment And Management | NOS-08TIS-07KMS-01KMS-02KMS-03KMS-04KMS-05KMS-07KMS-08KMS-09KMS-10GSP-13 |
| SC-13 | Use Of Cryptography | NOS-08KMS-01KMS-02KMS-03KMS-08GSP-13 |
| SC-17 | Public Key Infrastructure Certificates | KMS-01 |
| SC-20 | Secure Name / Address Resolution Service (Authoritative Source) | NOS-04 |
| SC-21 | Secure Name / Address Resolution Service (Recursive Or Caching Resolver) | NOS-04 |
| SC-23 | Session Authenticity | GSP-13 |
| SC-28 | Protection of Information at Rest | GSP-09GSP-13 |
SI System and Information Integrity
SR Supply Chain Risk Management
| Control | Name | BSSC Standards References |
|---|---|---|
| SR-01 | Policy and Procedures | GSP-07 |
| SR-02 | Supply Chain Risk Management Plan | GSP-07 |
| SR-03 | Supply Chain Controls and Processes | NOS-02GSP-07 |
| SR-04 | Provenance | NOS-02 |
| SR-05 | Acquisition Strategies, Tools, and Methods | TIS-06GSP-07 |
| SR-06 | Supplier Assessments and Reviews | TIS-02 |