CryptoCurrency Security Standard (CCSS) v9.0
Industry de facto standard for cryptocurrency exchange and custodian security. 47 control objectives across 10 security aspects covering key/seed generation, wallet creation, key storage, key usage, key compromise protocol, keyholder grant/revoke, third-party audits, data sanitization, proof of reserve, and log auditing. Three certification levels (Level 1-3) with increasing rigour. Published by the CryptoCurrency Certification Consortium (C4).
Clauses: 47
Avg Coverage: 54.3%
Publisher: CryptoCurrency Certification Consortium (C4) Version: 9.0 (2024) | Clause | Title | SP 800-53 Controls |
|---|---|---|
| 1.01.1 | Key Material Generation — Confidentiality of Key Generation Environment | |
| 1.01.2 | Key Material Generation — Entropy and Randomness Sources | |
| 1.01.3 | Key Material Generation — Software Validation and Integrity | |
| 1.01.4 | Key Material Generation — Automated Signing Agent Key Transfer | |
| 1.01.5 | Key Material Generation — Level 1 Documentation and Procedural Controls | |
| 1.01.6 | Key Material Generation — Level 2 Generation Methodology Validation | |
| 1.01.7 | Key Material Generation — Level 3 Advanced Ceremony Controls | |
| 1.02.1 | Wallet Creation — Single-Signer Wallet Architecture | |
| 1.02.2 | Wallet Creation — Multi-Signer Wallet Architecture | |
| 1.02.3 | Wallet Creation — Wallet Inventory and Address Management | |
| 1.02.4 | Wallet Creation — Address Verification and Integrity | |
| 1.02.5 | Wallet Creation — Level 2 Documented Custody Policy for Wallet Creation | |
| 1.02.6 | Wallet Creation — Level 2 Deterministic Wallet Controls | |
| 1.02.7 | Wallet Creation — Level 3 Smart Contract Wallet Auditing | |
| 1.02.8 | Wallet Creation — Level 3 Smart Contract State Monitoring | |
| 1.03.1 | Key Storage — Encryption of Keys at Rest | |
| 1.03.2 | Key Storage — Backup Existence and Accessibility | |
| 1.03.3 | Key Storage — Environmental Protection of Key Backups | |
| 1.03.4 | Key Storage — Level 2 Geographic Separation of Key Backups | |
| 1.03.5 | Key Storage — Level 2 Access Control for Key Material | |
| 1.03.6 | Key Storage — Level 3 Cold Storage and Hardware Security Controls | |
| 1.03.7 | Key Storage — Level 3 EMP-Resistant Backup Storage | |
| 1.04.1 | Key Material Access — Keyholder Onboarding and Access Grant Procedures | |
| 1.04.2 | Key Material Access — Keyholder Offboarding and Access Revocation | |
| 1.04.3 | Key Material Access — Level 2 Quorum-Based Keyholder Authorization | |
| 1.04.4 | Key Material Access — Level 2 Keyholder Identity Verification and Training | |
| 1.04.5 | Key Material Access — Level 3 Formal Keyholder Registry and Audit Trail | |
| 1.05.1 | Key Usage — Transaction Authorization and Signing Controls | |
| 1.05.2 | Key Usage — Key Usage Logging and Non-Repudiation | |
| 1.05.3 | Key Usage — Level 2 Multi-Party Authorization for High-Value Transactions | |
| 1.05.4 | Key Usage — Level 2 Destination Address Whitelisting and Verification | |
| 1.05.5 | Key Usage — Level 3 Hardware-Enforced Signing and Trusted Display | |
| 1.06.1 | Key Compromise Protocol — Documented Key Compromise Response Procedures | |
| 1.06.2 | Key Compromise Protocol — Compromised Keyholder Response and Access Revocation | |
| 1.06.3 | Key Compromise Protocol — Level 2 Tested and Rehearsed Response Procedures | |
| 1.06.4 | Key Compromise Protocol — Level 3 Out-of-Band Communication and Advanced Compromise Controls | |
| 2.01.1 | Security Audits — Level 1 Vulnerability Scans and Annual Security Review | |
| 2.01.2 | Security Audits — Level 2 Independent Penetration Testing | |
| 2.01.3 | Security Audits — Level 3 Full Independent CCSS Compliance Audit | |
| 2.02.1 | Data Sanitization — Level 1 Documented Sanitization Policy for Key Material | |
| 2.02.2 | Data Sanitization — Level 2 Verified Destruction with Evidence | |
| 2.02.3 | Data Sanitization — Level 3 Third-Party Verified Destruction | |
| 2.03.1 | Proof of Reserve — Level 1 Internal Reserve Verification and Reconciliation | |
| 2.03.2 | Proof of Reserve — Level 2 Independent Third-Party Reserve Attestation | |
| 2.04.1 | Audit Logs — Level 1 Logging Policy and Key Management Event Logging | |
| 2.04.2 | Audit Logs — Level 2 Tamper-Evident Log Storage and Alert Generation | |
| 2.04.3 | Audit Logs — Level 3 One-Year Retention, SIEM Integration, and Blockchain Event Monitoring |