Overview of Each Framework
Important Disclaimer: The frameworks presented in this documentation are living documents that evolve with the Web3 security landscape. They may undergo restructuring, updates, or modifications in the future to reflect emerging threats, new best practices, and community feedback. We recommend regularly checking for updates to ensure you're working with the most current security guidelines.
This document provides an overview of the various frameworks covered in the Security Frameworks by SEAL. Each framework addresses a specific aspect of Web3 security, providing best practices and guidelines to help secure your projects.
Community Management
This framework explores best practices for securing and managing online communities associated with Web3 projects, covering platforms like Discord, Twitter, Telegram, and Google. It focuses on establishing secure communication channels and community guidelines.
Go to the Community Management framework →
Awareness
This section covers strategies for fostering security awareness among team members and users of Web3 projects, including understanding threat vectors, cultivating a security-aware mindset, and staying informed about security developments.
Read more about the Awareness framework →
Operational Security (OpSec)
This comprehensive framework addresses day-to-day security practices for Web3 teams, covering fundamentals, governance, risk management, control domains, lifecycle management, monitoring, incident response, and continuous improvement.
Wallet Security
This section delves into the crucial aspect of managing cryptographic keys in Web3 projects, discussing various wallet types (cold vs hot, custodial vs non-custodial), hardware wallets, signing schemes, and software wallets.
Go to the Wallet Security framework →
Multisig for Protocols
This comprehensive framework provides security guidelines for managing multisig wallets in protocols, covering planning and classification, setup and configuration, signer onboarding, hardware wallet setup, transaction verification, emergency procedures, and incident reporting.
Read more about the Multisig for Protocols framework →
External Security Reviews
This framework provides guidance on conducting and preparing for external security audits and reviews, including setting expectations, preparation, security policies, and vendor selection.
Explore the External Security Reviews framework →
Vulnerability Disclosure
This section discusses best practices for handling and disclosing vulnerabilities in Web3 projects, including establishing security contacts and managing bug bounty programs.
Go to the Vulnerability Disclosure framework →
Infrastructure
This section covers the fundamental aspects of securing the underlying infrastructure of Web3 projects, including asset inventory, cloud infrastructure, DDoS protection, DNS security, IAM, network security, and zero-trust principles.
Read more about the Infrastructure framework →
Monitoring
This framework discusses the importance of continuous monitoring in Web3 projects, focusing on setting up effective monitoring systems and defining appropriate thresholds for alerts.
Explore the Monitoring framework →
Front-End/Web Application
This section addresses security considerations specific to the user-facing components of Web3 projects, including both web and mobile application security, common vulnerabilities, and security tools.
Go to the Front-End/Web Application framework →
Incident Management
This section outlines protocols for handling security incidents, including communication strategies, detection and response procedures, lessons learned, and playbooks, including specific guidelines for SEAL 911 War Room.
Read more about the Incident Management framework →
Threat Modeling
This framework provides guidance on creating and maintaining threat models, as well as identifying and mitigating potential threats to Web3 projects.
Explore the Threat Modeling framework →
Insider Threats (DPRK IT Workers)
This framework addresses the organizational and personal risks related to insider threats, most commonly associated with North Korean hacker-freelancers. It covers identifying, recognizing, and mitigating risks from insider threat actors, including hardening hiring processes and organizational defenses.
Go to the DPRK IT Workers framework →
Governance
This section covers best practices for implementing governance in Web3 projects, including setting clear policies, establishing accountability, compliance with regulatory requirements, risk management, and security metrics and KPIs.
Read more about the Governance framework →
DevSecOps
This framework focuses on integrating security practices into the development and operations processes, covering code signing, CI/CD, IDE security, repository hardening, and security testing.
Explore the DevSecOps framework →
Privacy
This section explores tools and practices for maintaining privacy in the Web3 ecosystem, including secure browsing, data removal, digital footprint management, encrypted communication, and privacy-focused operating systems.
Supply Chain
This framework addresses the security implications of dependencies and third-party components in Web3 projects, including dependency awareness and supply chain levels for software artifacts.
Read more about the Supply Chain framework →
Security Automation
This framework focuses on using technology to perform security tasks with minimal human intervention, covering compliance checks, infrastructure as code, and threat detection and response to improve efficiency and reduce human error.
Explore the Security Automation framework →
Identity and Access Management (IAM)
This framework covers best practices for managing user identities and access control in Web3 projects, including role-based access control and secure authentication.
Secure Software Development
This section focuses on integrating security practices throughout the software development lifecycle, including secure coding standards, code reviews, and secure design principles.
Read more about the Secure Software Development framework →
Security Testing
This framework explores various methods of testing Web3 projects for security vulnerabilities, including dynamic and static application security testing, fuzz testing, and security regression testing.
Explore the Security Testing framework →
ENS
This section covers Ethereum Name Service security considerations, including data integrity, cross-chain compatibility, smart contract integration, interface compliance, and name handling.
Safe Harbor
This framework provides guidance on establishing safe harbor protocols for security researchers, including key terms, protocols, technical outlines, and whitehat guidelines.
Read more about the Safe Harbor framework →
Encryption
This comprehensive section covers various encryption methods and their applications in protecting data, including cloud data encryption, communication encryption, database encryption, and various types of storage encryption.
Explore the Encryption framework →
Treasury Operations
This section provides institutional-grade security frameworks for managing custodial treasury accounts and large cryptocurrency transfers, including account classification, registration documentation, enhanced controls, and transaction verification protocols.
Go to the Treasury Operations framework →
SEAL Certifications
This framework provides a certification system developed by SEAL with standardized guidelines and evaluation criteria for assessing the security of DeFi protocols. It includes modular certifications for specific areas such as DevOps & Infrastructure, DNS Security, Incident Response, Multisig Ops, Treasury Ops, and Workspace Security.
Read more about SEAL Certifications →