Skip to main content
Version: v1

Validator Security Checklist

This checklist provides baseline security and operational guidance for validators running on a Linux system. It is intended as a starting point for self-assessment and does not replace a full security audit.


1. System & Host Security

CheckDescription
Non-root operationValidator process runs as a dedicated, unprivileged user.
OS updatesOperating system and kernel are kept up to date.
Automatic security updatesAutomatic installation of security patches is enabled where appropriate.
Minimal servicesUnnecessary services and packages are removed or disabled.
Mandatory access controlSELinux, AppArmor, or equivalent is enabled and enforced.
Secure bootloaderBootloader access is protected (e.g., GRUB password).
File permissionsValidator configuration and data directories are readable only by the validator user.

2. Account & Remote Access Hardening

CheckDescription
SSH key authentication onlyPassword authentication over SSH is disabled.
SSH key protectionSSH private keys are encrypted with a strong passphrase.
Root login disabledDirect SSH access as root is disabled.
Restricted SSH accessSSH access limited to specific users and/or IP ranges.
Brute-force protectionIntrusion prevention tools (e.g., Fail2Ban) are enabled.

3. Key & Signing Security

CheckDescription
External signerValidator signing keys are not stored on the validator node (e.g., TMKMS or remote signer).
Hardware-backed keysSigning keys are stored in HSMs or hardware wallets where possible.
No key duplicationThe same validator key is never used on multiple validator instances.
Double-sign protectiondouble_sign_check_height or equivalent protection is enabled.
Secure backupsEncrypted backups of critical keys are stored offline.

4. Networking & Firewall

CheckDescription
Firewall enabledHost-level or cloud firewall rules are enforced.
Restricted portsOnly required ports are open (e.g., 26656 for P2P, 26660 for monitoring access from monitoring infrastructure).
RPC protectionRPC / gRPC endpoints are not publicly exposed.
Peer restrictionsValidator node only accepts traffic from trusted sentry nodes.
Outgoing traffic controlsEgress traffic is restricted and/or monitored to detect unexpected outbound connections.
Rate limitingNetwork-level protections against abuse or DoS are applied where possible.

5. Sentry Node Architecture

CheckDescription
Validator isolationValidator node is not directly exposed to the public internet.
Sentry nodes deployedOne or more sentry nodes handle public P2P traffic.
Geographic diversitySentry nodes are deployed across different regions or providers.
Firewall enforcementValidator firewall allows inbound connections only from sentry nodes.

6. Monitoring & Alerting

CheckDescription
Node metricsValidator and host metrics are collected (CPU, disk, memory, consensus).
Alerting configuredAlerts exist for downtime, missed blocks, disk exhaustion, and peer count.
External uptime checksIndependent uptime monitoring is in place.
Alert deliveryAlerts are delivered via reliable channels (e.g., PagerDuty, Slack).

7. Redundancy & High Availability

CheckDescription
Standby nodeA standby or backup node is prepared for rapid failover.
Snapshot backupsRegular snapshots are taken to enable fast recovery.
Infrastructure diversityValidator and sentries are not all hosted on the same provider.

8. Updates, Upgrades & Configuration Management

CheckDescription
Non-breaking upgradesTendermint / Cosmos SDK binaries are kept current for non-state-breaking upgrades.
State-breaking upgradesValidator binaries are upgraded in advance of state-breaking network upgrades.
Config managementConfiguration files are versioned and reproducible (e.g., Git, IaC).
Upgrade testingUpgrades are tested on non-validator nodes before production rollout.

9. Communication & Governance Awareness

CheckDescription
Validator communication channelsOfficial validator communication channels are known and accessible.
Regular monitoringInstant messaging channels (e.g., Discord, Telegram) are regularly checked for urgent notices.
Governance awarenessGovernance proposals and upgrade announcements are actively monitored.

10. Cloud Provider Security (if applicable)

CheckDescription
Root account protectionCloud root account access is tightly restricted and protected with MFA.
Least-privilege IAMAdministrative roles follow the principle of least privilege.
Network segmentationUse of security groups, VPCs, and network ACLs to isolate validator infrastructure.
Audit loggingCloud audit logs (e.g., AWS CloudTrail) are enabled and monitored.

11. Physical & Infrastructure Security

CheckDescription
Data center securityHosting provider enforces physical access controls.
Redundant powerPower redundancy (UPS, generators) is available.
Network reliabilityMinimum required bandwidth and low-latency connectivity are guaranteed.
Hardware reliabilityStorage and hardware are suitable for continuous operation.
Environmental protectionsProtection against overheating, fire, and hardware failure is in place.

12. Incident Response

CheckDescription
Node breach planA documented response plan exists for a node compromise.
Sentry failure responseClear steps exist for responding to sentry node outages.
Validator breach planA response plan exists for validator key or host compromise.
Validator downtime responseClear procedures exist for restoring validator operation after downtime.
Roles & escalationResponsibilities and escalation paths are clearly defined.

Notes

  • This checklist is intended as baseline guidance for validators.
  • Operators should adapt it to their scale, threat model, and hosting environment.
  • Completing all checks does not guarantee security but significantly reduces common risks.