1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of blockchain as a service security
6.1 Overview of BSP security
6.2 Overview of BSD security
6.3 Overview of BSC security
7 Security threats to blockchain as a service
7.1 Security threats to BSP
7.2 Security threats to BSD
7.3 Security threats to BSC
8 Security requirements of blockchain as a service
8.1 Security configuration of a customized blockchain network
8.2 Identity and access management
8.3 Key management
8.4 Privacy protection
8.5 Crypto engines security
8.6 Peer-to-peer connection security
8.7 Consensus mechanism security
8.8 Smart contract security
8.9 Resource monitoring
8.10 Intrusion detection system
8.11 Security audit
8.12 Third-party functions management
8.13 Supply chain security
Bibliography