Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

best practices added #36

Merged
merged 8 commits into from
Oct 9, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions docs/sui/_category_.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
{
"label": "Sui",
"position": 6
}
14 changes: 14 additions & 0 deletions docs/sui/endpoints.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
---
sidebar_position: 1
description: Endpoints
---

import Tabs from '@theme/Tabs';
import TabItem from '@theme/TabItem';

# Endpoints — RPC / API

> The RPC endpoint enables users to interact with Sui's nodes, querying the node's state and transmitting transactions within the Sui Network.

> An API endpoint refers to a specific URL or URI that facilitates external interactions with the blockchain network.

Binary file added docs/sui/img/sui.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
19 changes: 19 additions & 0 deletions docs/sui/index.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# Sui

import MainpageMetrics from '@site/src/components/MainpageMetrics';

🌐 Network: Sui Mainnet | 📟 Binary Name: suid

[Sui](https://sui.io/) is an innovative, decentralized Layer 1 blockchain that redefines asset ownership.

To differentiate itself from other blockchains like Ethereum, Solana, and Polkadot, Sui introduces several architectural designs to increase its speed and scalability without sacrificing the blockchain’s security. These include the Sui consensus engine, parallel transaction execution and Sui’s Move smart contract programming language.

![sui](./img/sui.jpg)

[Website](https://sui.io/) | [Blog](https://blog.sui.io/) | [GitHub](https://github.com/MystenLabs) | [Twitter](https://twitter.com/SuiNetwork) | [Discord](https://discord.gg/sui) | [Docs](https://docs.sui.io/)

```mdx-code-block
import DocCardList from '@theme/DocCardList';

<DocCardList />
```
2 changes: 1 addition & 1 deletion docs/zetachain/_category_.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{
"label": "Zetachain",
"position": 6
"position": 7
}
53 changes: 53 additions & 0 deletions docs/zetachain/best-practices.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
---
sidebar_position: 4
description: Best-practices
---

# Security Best Practices

> Securing blockchain nodes and validation is crucial to maintaining the integrity, security, and reliability of a blockchain network. Here are some best practices to enhance the security of ZetaChain blockchain nodes and validation.

### Use Secure Hardware:
Utilize hardware security modules (HSMs) to protect sensitive cryptographic keys and operations. HSMs provide a high level of security against unauthorized access to keys and data.

### Regular Security Audits:
Conduct regular security audits of the blockchain node infrastructure, smart contracts, and related applications. Third-party security audits can help identify vulnerabilities and weaknesses that could be exploited by attackers.

### Patch and Update Regularly:
Stay updated with the latest security patches and updates for both the operating system and blockchain software. Apply patches promptly to address any known vulnerabilities and maintain a secure environment.

### Implement Firewalls and Access Controls:
Configure firewalls to restrict access to the blockchain nodes and validation systems. Implement proper access controls to limit access to authorized personnel only, using strong authentication mechanisms.

### Data Encryption:
Encrypt sensitive data at rest and in transit to protect it from unauthorized access. Use strong encryption algorithms and key management practices to secure data.

### Use Multi-Factor Authentication (MFA):
Implement MFA for all user accounts accessing the blockchain nodes and related systems. Require at least two forms of authentication, such as a password and a one-time code from a mobile app.

### Regular Backups and Disaster Recovery:
Maintain regular backups of critical data, including blockchain data and configuration files. Implement a robust disaster recovery plan to quickly restore operations in case of a security incident or data loss.

### Isolation and Segmentation:
Isolate blockchain nodes from other critical infrastructure components to limit the potential attack surface. Segment the network to contain any potential breaches and prevent lateral movement of attackers.

### Consensus Algorithm Security:
Ensure the consensus algorithm being used is secure and resilient against attacks. Understand the specific security measures and assumptions associated with the chosen consensus mechanism (e.g., proof of work, proof of stake).

### Secure Smart Contracts:
Review and audit smart contracts thoroughly for potential vulnerabilities, such as reentrancy attacks, overflow/underflow, and unauthorized access. Follow best practices for secure smart contract development.

### Regular Monitoring and Intrusion Detection:
Implement robust monitoring solutions to continuously monitor the health, performance, and security of the blockchain nodes. Utilize intrusion detection systems (IDS) to identify and respond to potential security threats.

### Incident Response Plan:
Develop a comprehensive incident response plan to effectively handle security incidents, including procedures for reporting, analysis, containment, eradication, and recovery.

### Education and Training:
Educate and train all team members and stakeholders about security best practices and potential threats to blockchain nodes. Foster a security-conscious culture within the organization.

### Compliance and Legal Considerations:
Ensure compliance with relevant legal and regulatory requirements, including data protection laws and regulations related to cryptocurrencies and blockchain technology.

### Regularly Reassess Security Measures:
Security is an evolving landscape, so regularly reassess and update security measures based on the latest threats, vulnerabilities, and best practices in the blockchain and cybersecurity domains.
2 changes: 1 addition & 1 deletion src/components/SelectPaste/stateSync.ts
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,4 @@ sed -i 's|^trust_hash *=.*|trust_hash = "'$TRUST_HASH'"|' $HOME/.{{home}}/config
mv $HOME/.{{home}}/priv_validator_state.json.backup $HOME/.{{home}}/data/priv_validator_state.json

sudo systemctl restart {{binary}}
sudo journalctl -u {{binary}} -f --no-hostname -o cat`;
sudo journalctl -u {{binary}} -f -o cat`;