Skip to content

Security and Access

Security practice in Iroha should be based on narrow authority, controlled key custody, explicit network exposure, and auditable changes.

Key Custody

  • Generate production keys with production-grade entropy and store private keys outside repositories, issue trackers, prompts, chat logs, and CI output.
  • Use separate key material for clients, peers, genesis signing, validators, fee sponsors, and technical accounts.
  • Rotate keys according to a written process and rehearse recovery before a live incident.
  • Use hardware-backed or operating-system-backed storage for high-value signing keys when the deployment risk justifies it.

See Generating Cryptographic Keys and Storing Cryptographic Keys.

Permissions

  • Grant the smallest permission token or role that supports the workflow.
  • Prefer dedicated technical accounts for services, triggers, agents, and automation. Avoid running long-lived automation through a personal operator account.
  • Review permissions for peer management, metadata mutation, minting, burning, trigger registration, executor changes, and SORA/Nexus governance before production launch.
  • Revoke temporary permissions after the maintenance window or migration that required them.

See Permissions and Permission Tokens.

Network Exposure

  • Restrict peer-to-peer, Torii, telemetry, and operator routes according to the environment. Public read access does not imply public write or operator access.
  • Use VPNs, firewalls, reverse proxies, TLS termination, and rate limits where appropriate for the deployment.
  • Keep basic-auth credentials, proxy tokens, and forwarded headers out of committed config.
  • Test that unauthorized clients cannot reach restricted routes.

See Virtual Private Networks and Torii Endpoints.

Fraud and Abuse Monitoring

  • Monitor ledger events and operational signals for unexpected asset movement, permission grants, trigger changes, peer changes, and repeated rejected transactions.
  • Preserve evidence with transaction hashes, block heights, event records, logs, and status snapshots.
  • Route alerts to the security, operations, and business owners responsible for the affected assets or workflows.

See Fraud Monitoring.

Agent and Automation Guardrails

  • Start automation with read-only permissions and add write authority only after the workflow is reviewed.
  • Require explicit human approval for live-network mutations unless the automation is a deliberately deployed production service.
  • Do not expose private keys to agent prompts. Use local code that loads secrets from environment variables, keychains, hardware signers, or ignored config files.
  • Log automation decisions in a way that supports audits without leaking secret material.