Aspect Objective: This aspect defines the criteria for applying single-signer and multi-signer mechanisms to wallets. This ensures that the signing configuration aligns with the criticality of the wallet, risk exposure, and operation requirements.
Single-signer mechanisms will consider the following factors:
Multi-signer mechanisms are considered best practice for enhancing security. However, multi-signer mechanisms can potentially impact transaction speed and operational efficiency, therefore single-signer mechanisms can align with the CCSS only if the criteria in 1.02.1.1 is met. Single-signer configurations may be adopted by full-custody providers to allow rapid fund management. To ensure strong protection and distributed control, multi-signer mechanisms are implemented in wallets that hold the majority of customer funds.
Aspect Objective: This aspect ensures the availability of funds, even if a signing key becomes inaccessible, by requiring redundancy in multi-signer configurations.
For wallets that implement a multi-signer mechanism, they must include at minimum one redundant key for recovery purposes. This redundancy guarantees that funds remain accessible if one operational key is lost, compromised, or unavailable.
One common method that is considered best practice is creating a wallet that requires 2-of-3 signatures to authorize transactions for flexibility and recovery assurance.
Aspect Objective: This aspect mitigates risks by separating key material geographically for multi-signer wallets. The risks that come with localized disruptions, including floods and break-ins, are minimized with key material separated across multiple locations.
Although locations can reside within the same region or country, risk assessments evaluate the potential consequences of storing all key materials within a single geographic area. Distribution across multiple, secure regions enhances overall resilience.
Aspect Objective: This aspect ensures that control of key material is decentralized across separate business units and legal entities, reducing organizational and legal risks.
For wallets implementing multi-signer mechanisms, key material must be stored by distinct operators within the same entity or by separate, trusted entities. These entities can be legal, accounting, or custody partners. This separation prevents a single organizational or legal disruption from affecting key material and disrupting fund availability.
Importantly, this distribution approach does not violate requirement 1.01.1.1, because separate entities do not meet the definition of an actor.
Aspect Objective: This aspect focuses on creating a documented policy to ensure consistency and compliance regarding wallet generation processes.
This policy document includes details of the company’s internal policies and procedures to provide transparency. It will also cover all relevant areas of wallet generation to limit errors. A documented policy ensures standardization and provides clear operation guidelines for users.
Click to learn more about the CCSS.
This article was written by Shreya Patel.
This aspect requires that the individual or system using key material is also the one generating it. The intent is to maintain confidentiality of the key material by preventing exposure to any party who is not the intended actor. Confidentiality is prioritized where access is strictly given to the actor generating the key material, and randomness ensures that keys must be unpredictable to maintain secure systems.
Additionally, digital signatures confirm the key material generation process has not been altered. The Level II requirement allows a digital signature for an extra measure of security. The digital signature for the key material is generated, published, and validated before each execution. This confirms that the key material generation process has not been compromised.
This aspect focuses on verifying the integrity and reliability of key generation methodology before it is used. The purpose is to validate that the process produces secure and unpredictable key material.
Validation of the methodology must happen prior to usage to confirm that the features will not restrict entropy, leak data, or create weaknesses. Unless security is being enhanced, software used in key generation must not restrict the values produced or store key material. A feature that would enhance security would be using Deterministic Random Bit Generators (DRBG).
By validating the integrity of the generation process, this aspect maintains the confidentiality and entropy needed for cryptographic protection.
This aspect focuses on key material adhering to the NIST SP 800-90A. NIST SP 800-90A ensures that DRBGs produce numbers that are statistically random. The goal is to ensure strong randomness is maintained, even though the generation process is deterministic.
The NIST SP 800-90A generation mechanism confirms that key material generation allows for high entropy and unpredictable outputs to minimize risks. The security and integrity of the key generation environment must be maintained.
Key generation must take place in a controlled and protected environment. The physical location should be inspected to ensure there is:
All hardware and software involved must be up-to-date, verified, and functioning correctly. Portable devices must be secured, and every actor involved must follow a documented runbook so the process is consistent and accountable. Each actor generates their own key material independently to prevent any one person from influencing or exposing another participant’s key.
This aspect helps ensure that key material is generated using a Key Management System (KMS) with a strong, reliable entropy pool. Sufficient entropy is required for secure randomness. This prevents bias in key generation, reduced variability, or other properties that would allow for predictability or reproduction.
A robust entropy pool helps ensure that keys are unguessable, unique, and resistant to reproduction. Even strong algorithms fail without sufficient entropy, so this requirement reinforces one of the fundamental protections in secure key generation.
This article was written by Shreya Patel.
As digital assets become more mainstream, traditional security standards alone are not enough. Traditional frameworks such as ISO 27001 and SOC 2 Type II audits have long been considered the gold standard for information security and organizational controls. Although these frameworks are valuable, they were designed for general IT systems and enterprise data instead of cryptographic assets.
This is why the CryptoCurrency Security Standard (CCSS) was developed. It introduces a crypto-specific framework focused on one of the critical elements in digital asset security: key material management.
Most organizations lean on traditional security standards because of their universal recognition and the broad assurance they provide to regulators, partners, and customers. These standards establish trust which demonstrates credibility in a wide range of industries.
While these frameworks are valuable for general IT environments, they leave a critical gap when it comes to safeguarding digital assets.
The CryptoCurrency Security Standard (CCSS) addresses risks unique to the cryptographic key material used with blockchain-based systems. It establishes the conditions that must be met to ensure the secure generation of key material. It outlines the parameters for securely generating, storing, and using key material.
The CCSS covers several aspects regarding key material including:
Traditional frameworks measure how organizations secure their systems broadly, while the CCSS focuses on safeguarding the key material protecting digital assets.
Organizations securing digital assets should consider layering these standards, as each covers a different scope. Achieving ISO 270001 or SOC 2 certification establishes baseline trust with traditional partners and regulators, while CCSS certification demonstrates cryptographic key security to customers, exchanges, and custodians. Traditional security frames are broad and valuable, but the CCSS fills a critical gap by addressing key management practices that maintain trust in cryptographic systems. Together, they form a comprehensive defense that combines broad organizational security with specialized protection for digital assets.
This article was written by Shreya Patel.
We’re pleased to announce that Fireblocks is the first organization ever to have a system certified under Version 9.0 of the CryptoCurrency Security Standard (CCSS), the most current version of the standard, released in December 2024.
The certified system includes:
Fireblocks‘ system attained Level 3 certification as a Qualified Service Provider (QSP) – the highest attainable level – after undergoing a rigorous audit.
Why this matters: This certification shows that Fireblocks has implemented strong controls for managing and securing key material across its system, in line with the latest CCSS requirements.
Version 9.0 includes several important updates to the standard, and it builds on the strong foundation of earlier versions. Systems certified under v8.1 remain valid and have also demonstrated a high level of security through independent audit.
Shoutout to CCSSA Marc Krisjanous for another successful audit, CCSSA Phillip Moran, CFA for a successful peer review, and the Fireblocks team for setting the bar for what secure, independently-audited key management should look like under the version 9.0 of the CCSS.
As a reminder, this does not verify that another system which uses Fireblocks is CCSS certified at any level. Any third party who uses Fireblocks’ system must be audited for compliance in the areas where Fireblocks does not have control and certified (or not) in an audit for their cryptocurrency system.
Congratulations to the Fireblocks team on this industry-leading achievement!
👉 You can verify Fireblocks’ certification at: https://cryptoconsortium.org/completed-ccss-audits/
When CCSS v9.0 was released on December 17, 2024, it introduced major updates to requirements and audit expectations. While this version marks a strong step forward, the transition has impacted timelines for some teams already preparing for certification under v8.1.
To support those efforts, new system certifications may still be conducted under CCSS v8.1 if the Intent to Audit form is submitted by December 17, 2025.
This extension, based on auditor and community feedback, gives organizations:
With the draft of v9.0 available three months before publication, this updated timeline provides a full year of visibility into the changes.
We appreciate the community’s input in shaping this decision and look forward to continued collaboration as we raise the bar for crypto security.
To learn more or begin a CCSS audit, visit https://cryptoconsortium.org/ccss