Information Security Policy

Last updated: March 02, 2024

1. Introduction

This policy establishes the security requirements for BlackNodes' information systems, with a focus on protecting our validator infrastructure and cryptographic assets.

2. Key Management

2.1 Key Hierarchy

2.2 Key Generation

2.3 Key Storage and Backup

2.4 Key Rotation

3. Access Control

3.1 Access Hierarchy

3.2 Authentication Requirements

3.3 Least Privilege Principle

4. Network Security

4.1 Network Architecture

4.2 Firewall and Endpoint Protection

5. Incident Response

5.1 Detection and Reporting

5.2 Response Procedures

6. Employee Security

6.1 Personnel Requirements

6.2 Offboarding Procedures

7. Compliance and Audit

7.1 Internal Audits

7.2 Documentation

8. Policy Enforcement

Violation of this policy may result in disciplinary action up to and including termination of employment. BlackNodes reserves the right to notify appropriate law enforcement authorities of any unlawful activity and to cooperate in any investigation of such activity.

Contact Us

If you have any questions about this Information Security Policy, You can contact us: