Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Finance
    3. >Six Steps to Secure Cryptographic Keys
    Finance

    Six Steps to Secure Cryptographic Keys

    Published by Gbaf News

    Posted on August 22, 2018

    9 min read

    Last updated: January 21, 2026

    Add as preferred source on Google
    The image illustrates a downward trend in European stock markets as fears of an energy crisis loom and ECB's hawkish stance influences investors. This captures the essence of the article discussing the worst day for European stocks in over a month.
    European stocks decline amid energy crisis concerns - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Tags:Cryptographic Keyscyber-criminalsDecentralised currencyDigital wallet

    Corey O’Connor, Product Marketing Manager, CyberArk

    Cryptocurrency seems to bring out the best effort from cyber criminals.

    From nation states to traditional attackers, the rise in crypto-related attacks is gathering serious momentum.

    2018 has certainly been dominated by major multi-million dollar heists related to crypto-currencies. The motivation is clear: crypto crime is a lucrative business. Despite the recent drop, cryptocurrency values have skyrocketed over the past couple of years incentivising attackers to create malicious code and sophisticated hacking tools to harvest cryptocurrency coins. One quick way to a massive pay out is achieved by compromising a digital wallet and stealing the wallet’s private key. When attackers get their hands on a digital wallet, they can take full control of any funds.

    Many online outlets have started to accept cryptocurrency right alongside good old-fashioned cash and credit. This trend is commercialising decentralised currency and forcing the hand of many big banks to get on board. The leg up criminals have, in many of these attacks, is the anonymity involved in crypto-transactions. As this form of currency gains more credibility, organisations across all sectors will need to implement security controls to mitigate risk against crypto-credentials being exploited.

    So, what are digital wallets?

    There are two types of digital wallets: hot wallets and cold wallets. It’s easier to think of these wallets as bank accounts, where hot wallets would be the checking account and cold wallets would be the savings account. Typically, hot wallets are used by end users and organisations to store smaller amounts of currency, adding the need to be more fluid in nature for quick transfers and exchanges. Hot wallets are usually always connected to the Internet to be ready to use and ensuring the fluidity of transactions. There are many cryptocurrency services such as Coinbase and Bittrex that manage and store the wallet’s private key and provide users with easy access. In most cases, this type of managed service is password protected.

    Conversely, cold wallets, used by organisations and security-savvy individuals, typically hold much larger amounts of digital currency. This type of wallet keeps its associated private key off the internet completely (for obvious reasons) and often stores it on an offline computer. Yet, as demonstrated by some of the recent hacks, if the network becomes compromised, then the keys will follow suit shortly thereafter.

    There are solutions out there that store private keys on a USB stick-like device that does not allow the extraction of the private key. The device is simply inserted into a computer to prove the user has access to the key (using cryptographic functionality zero trust algorithms). This solution provides sound security on the private keys; however, this is not suitable for larger organisations that need to control who has access to the device and its associated credentials.

    How to avoid a ‘digital mugging’

    Cryptocurrency private keys are not always used just by human users. There are many automated processes that perform cryptocurrency transactions as well. Securing private keys for all users (both human and machine) is a critical first step, swiftly followed by authenticating and identifying who has access to the keys, controlling the access and monitoring its usage.

    What’s imperative is that we start to view cryptocurrency private keys as another type of a privileged credential, and take steps to manage and protect them, with the appropriate workflows and access controls.

    Here are six key (excuse the pun) considerations to help secure and protect cryptographic keys:

    1. Store cryptographic keys in a secure digital vault – Move keys into a digital vault with multiple layers of security wrapped around it, enforce multi-factor authentication to all users who have access to the vault.
    2. Introduce role segregation – Control individual access to stored keys, preventing even the most privileged administrators from getting to them unless explicit permissions have been granted.
    3. Enable secure application access – Enable access to stored keys for authorised applications and verify that the applications are legitimate.
    4. Audit and review access key activity – Audit all activity related to key access and implement trigger events to alert the necessary individuals of any key activity.
    5. Enforce workflow approvals – Enforce workflow approvals for anything considered to be highly sensitive and the same goes for accessing the keys.
    6. Monitor cryptocurrency administrator activities – Facilitate connections – similar to an automated secure proxy/jump host – to target systems that are used to perform cryptocurrency administrator activities (e.g. the system hosting the wallet).

    Cybercriminals will continue to look at this technology as another opportunity to line their pockets and it is increasingly hard to stay one step ahead of these savvy hackers. But with organisations needing to respond to demand for this type of currency, it’s essential to put in place safeguards, rather than just jumping in on the trend.  Protecting critical systems from key harvesting and many other types of advanced attacks will be key in ensuring they don’t find themselves caught out.

    Corey O’Connor, Product Marketing Manager, CyberArk

    Cryptocurrency seems to bring out the best effort from cyber criminals.

    From nation states to traditional attackers, the rise in crypto-related attacks is gathering serious momentum.

    2018 has certainly been dominated by major multi-million dollar heists related to crypto-currencies. The motivation is clear: crypto crime is a lucrative business. Despite the recent drop, cryptocurrency values have skyrocketed over the past couple of years incentivising attackers to create malicious code and sophisticated hacking tools to harvest cryptocurrency coins. One quick way to a massive pay out is achieved by compromising a digital wallet and stealing the wallet’s private key. When attackers get their hands on a digital wallet, they can take full control of any funds.

    Many online outlets have started to accept cryptocurrency right alongside good old-fashioned cash and credit. This trend is commercialising decentralised currency and forcing the hand of many big banks to get on board. The leg up criminals have, in many of these attacks, is the anonymity involved in crypto-transactions. As this form of currency gains more credibility, organisations across all sectors will need to implement security controls to mitigate risk against crypto-credentials being exploited.

    So, what are digital wallets?

    There are two types of digital wallets: hot wallets and cold wallets. It’s easier to think of these wallets as bank accounts, where hot wallets would be the checking account and cold wallets would be the savings account. Typically, hot wallets are used by end users and organisations to store smaller amounts of currency, adding the need to be more fluid in nature for quick transfers and exchanges. Hot wallets are usually always connected to the Internet to be ready to use and ensuring the fluidity of transactions. There are many cryptocurrency services such as Coinbase and Bittrex that manage and store the wallet’s private key and provide users with easy access. In most cases, this type of managed service is password protected.

    Conversely, cold wallets, used by organisations and security-savvy individuals, typically hold much larger amounts of digital currency. This type of wallet keeps its associated private key off the internet completely (for obvious reasons) and often stores it on an offline computer. Yet, as demonstrated by some of the recent hacks, if the network becomes compromised, then the keys will follow suit shortly thereafter.

    There are solutions out there that store private keys on a USB stick-like device that does not allow the extraction of the private key. The device is simply inserted into a computer to prove the user has access to the key (using cryptographic functionality zero trust algorithms). This solution provides sound security on the private keys; however, this is not suitable for larger organisations that need to control who has access to the device and its associated credentials.

    How to avoid a ‘digital mugging’

    Cryptocurrency private keys are not always used just by human users. There are many automated processes that perform cryptocurrency transactions as well. Securing private keys for all users (both human and machine) is a critical first step, swiftly followed by authenticating and identifying who has access to the keys, controlling the access and monitoring its usage.

    What’s imperative is that we start to view cryptocurrency private keys as another type of a privileged credential, and take steps to manage and protect them, with the appropriate workflows and access controls.

    Here are six key (excuse the pun) considerations to help secure and protect cryptographic keys:

    1. Store cryptographic keys in a secure digital vault – Move keys into a digital vault with multiple layers of security wrapped around it, enforce multi-factor authentication to all users who have access to the vault.
    2. Introduce role segregation – Control individual access to stored keys, preventing even the most privileged administrators from getting to them unless explicit permissions have been granted.
    3. Enable secure application access – Enable access to stored keys for authorised applications and verify that the applications are legitimate.
    4. Audit and review access key activity – Audit all activity related to key access and implement trigger events to alert the necessary individuals of any key activity.
    5. Enforce workflow approvals – Enforce workflow approvals for anything considered to be highly sensitive and the same goes for accessing the keys.
    6. Monitor cryptocurrency administrator activities – Facilitate connections – similar to an automated secure proxy/jump host – to target systems that are used to perform cryptocurrency administrator activities (e.g. the system hosting the wallet).

    Cybercriminals will continue to look at this technology as another opportunity to line their pockets and it is increasingly hard to stay one step ahead of these savvy hackers. But with organisations needing to respond to demand for this type of currency, it’s essential to put in place safeguards, rather than just jumping in on the trend.  Protecting critical systems from key harvesting and many other types of advanced attacks will be key in ensuring they don’t find themselves caught out.

    More from Finance

    Explore more articles in the Finance category

    Image for Equinor CEO says EU unlikely to increase Russian gas imports
    Equinor CEO Says EU Unlikely to Increase Russian Gas Imports
    Image for Openreach taps Google AI to speed fibre rollout, cut emissions
    Openreach Taps Google AI to Speed Fibre Rollout, Cut Emissions
    Image for UK consumer sentiment falls as Iran war rages, KPMG says
    UK Consumer Sentiment Falls as Iran War Rages, Kpmg Says
    Image for US oil prices fall on prospect of Middle East ceasefire easing supply disruption
    US Oil Prices Fall on Prospect of Middle East Ceasefire Easing Supply Disruption
    Image for Lamborghinis stranded in Sri Lanka as war disrupts Asia's used-car trade 
    Lamborghinis Stranded in Sri Lanka as War Disrupts Asia's Used-Car Trade 
    Image for Britain pilots social media bans, time limits and curfews for children
    Britain Pilots Social Media Bans, Time Limits and Curfews for Children
    Image for UK's Starmer, Saudi crown prince discussed ongoing Middle East conflict, Downing Street says
    UK's Starmer, Saudi Crown Prince Discussed Ongoing Middle East Conflict, Downing Street Says
    Image for Grifols approves IPO of its US biopharma business
    Grifols Approves IPO of Its US Biopharma Business
    Image for Moldovan parliament backs energy state of emergency after power line knocked out of service
    Moldovan Parliament Backs Energy State of Emergency After Power Line Knocked Out of Service
    Image for Iran says 'non-hostile' ships can transit Strait of Hormuz, FT reports
    Iran Says 'non-Hostile' Ships Can Transit Strait of Hormuz, Ft Reports
    Image for French tycoon Bolloré denies political war against public broadcaster
    French Tycoon Bolloré Denies Political War Against Public Broadcaster
    Image for Arm unveils new AI chip, expects it to add billions in annual revenue
    Arm Unveils New AI Chip, Expects It to Add Billions in Annual Revenue
    View All Finance Posts
    Previous Finance PostAlipay Launches World’s First Paperless Tax Refund Service in South Korea
    Next Finance PostUK’s Annual Household Bills Could Be Slashed by Over £8 Billion