We decided to create a special cybersecurity Systematization of Knowledge for Solana applications and protocols. We call it the Solana Security Strategy: such a database would be hugely beneficial for anyone who wants to secure their product and learn security from the best-collected resources.
If you are looking to get a personalized security strategy developed for your Solana application- schedule a meeting with Rektoff today: https://app.reclaim.ai/m/gregory-makodzeba/flexible-meeting
-
Protocol Documentation
- Document the system’s Access Control / Privileges / Roles
- Document all external services, contracts and oracles your application relies on
- Document all of the potential attack vectors on your system
-
Organizational security
- ALWAYS conduct identity verification + background checks on all of your employees
- Define a team member who will be responsible for security operations
- Conduct Social Engineering training and tests (remember, humans are often one the most vulnerable parts of any system)
-
DevSecOps pipeline + Operational Security
- Hardware keys for production systems
- Secure your system against sim-swap attacks:
- Multi-person integrity security policy (MPC / Multisig) to eliminate single point of failure:
- Solana Assets Security:
-
Internal security testing
- Automated Scanning
- Solana Fuzz testing
- other SAST / DAST on every commit
The pre-deployment stage is one of the most critical phases, during which teams often start to involve security partners, such as Rektoff, in their processes before launching. This stage requires intensive security practices, including multi-layered reviews, penetration & stress testing, and formal verification, to ensure everything is thoroughly solid for the mainnet and interactions with users.
We recommend contacting us if you are looking to make security foundational and integrate it into every development stage. We provide full engineering lifecycle support with the best cybersecurity specialists from our distributed network. By efficiently managing your security procedures and leveraging our extensive experience, we alleviate your protocol challenges, allowing you to focus on building and accelerating your project.
-
External Security Testing
- Choosing security providers & scheduling security review
- Passing audit Readiness Checklist
- Fuzzing as a service
- Passing an audit contest
- Web app audit / pentesting
- Stress Testing
- Formal Verification
-
Security Review
- The most expert companies for Solana-based security reviews:
- Rektoff
- Sec3
- Zellic
- Ackee Blockchain
- OtterSec
- Hexens
- Trail of Bits
- Kudelski Security
- The most expert companies for Solana-based security reviews:
The post-deployment stage is the time to improve, analyze, and prepare for emergent situations. It’s critically important to understand that no defensive solution can guarantee 100% protection of your blockchain software against hacker activities. Your team should be prepared to respond reactively to prevent disasters swiftly. Developing an Incident Response Plan (IRP), launching bug bounty (BB), and integrating advanced on-chain monitoring technology with supportive SOC analysts can significantly improve outcomes in the event of malicious incidents.
You should never stop thinking about security. It is essentially a repetitive process. Even if your project has significantly evolved in reputational and operational maturity, continuous 24/7 analysis and monitoring remain mandatory.
- Launching a bug bounty program
- Incident Response Plan development
- Onchain Monitoring integration + SOC center 24/7 support
- On-going security reviews and verifications for each new update/integration
As a result of the behaviour previously discussed, we deeply believe that security systems can enhance any blockchain, protocol, or application at any stage of its development roadmap. The primary value Rektoff focuses on is bringing accessible security knowledge, practices, and support to everyone in the market through a distributed network of engineers and security talents, which are integral to our company and its key solutions.
In the case of Solana, we have the opportunity to redefine DevOps processes and evolve them into a more advanced DevSecOps type of operation. By learning from existing attack vectors and shared experiences in DeFi, we are confident that our customized hybrid strategy will significantly improve the performance of engineering teams in the market.
DM us to schedule an Onboarding Security Test and consultation, and refer to the information provided below for more details about our solutions:
Stay Rektoff!