π Security β How We Store Keys and Manage Access
Overview
Security of validator keys and node infrastructure is a top priority. We apply layered protection measures, combining hardware isolation, secure key management, and redundant backups to ensure reliability and resilience against potential failures or attacks.
Key Management Architecture
TMKMS (Tendermint Key Management System) Keys are never stored directly on validator nodes. Instead, the TMKMS service is used for remote signing β it securely holds the validator private key and signs blocks via a dedicated communication channel. This separation prevents key exposure even if the validator node is compromised.
Softsign or HSM (Hardware Security Module)
For development and testing:
softsignis used for software-based signing within TMKMS.For production environments: keys are stored inside HSMs β tamper-resistant hardware devices that protect against unauthorized extraction and guarantee secure signing operations.
Backup and Recovery
Encrypted Backups: All key material (mnemonics, TMKMS configs, HSM recovery keys) is stored in encrypted form using strong AES-256 encryption.
Redundant Storage: Backups are stored on multiple offline devices (e.g., encrypted USB or external drives) in geographically separate locations.
Access Control: Only authorized operators have access to key material, following a principle of least privilege.
Regular Verification: Backup integrity is tested periodically to ensure recoverability and consistency with the active configuration.
Secure Access Control
SSH Key Authentication Only: Password-based SSH login is disabled. Only authorized SSH keys are allowed.
Firewall and Network Isolation: Only required ports (e.g., Tendermint P2P, RPC, TMKMS connection) are open. Validators and TMKMS communicate over a dedicated private network or through VPN tunnels.
System Hardening:
Regular OS updates and security patches
Limited sudo access
2FA for remote management
Audit logs for all administrative actions
Summary
Our approach combines hardware-level protection, TMKMS-based isolation, and redundant encrypted backups to ensure validator key safety, operational continuity, and full compliance with best security practices for blockchain infrastructure.
Last updated