Security Architecture and Threat Model
Learning Objectives
Identify the threat actors and attack vectors targeting CBDCs
Describe defense-in-depth security architecture principles
Explain key security controls at each system layer
Analyze incident response and recovery requirements
Evaluate the security trade-offs in CBDC design decisions
This lesson begins Phase 3, which examines how CBDCs operate in the real world—security, privacy, resilience, cross-border considerations, and lessons from actual implementations.
A CBDC system is arguably the most attractive target a nation's digital infrastructure can offer. It processes the country's money. It holds data on financial activity. It touches millions or billions of users. Success in attacking it could destabilize an economy, fund criminal enterprises, or provide intelligence goldmines.
This is not theoretical. Central banks already face sophisticated attacks. Payment systems are constant targets. A CBDC combines these targets into one system, raising the stakes enormously.
Security cannot be an afterthought—it must be foundational to every design decision.
CBDC THREAT ACTORS
TIER 1: NATION-STATE ACTORS
┌────────────────────────────────────────────────┐
│ Capabilities: Extremely high │
│ Resources: Unlimited │
│ Sophistication: Most advanced │
│ │
│ Motivations: │
│ - Economic warfare │
│ - Intelligence gathering │
│ - Destabilization │
│ - Sanctions evasion │
│ │
│ Examples: APT groups, intelligence agencies │
└────────────────────────────────────────────────┘
TIER 2: ORGANIZED CRIME
┌────────────────────────────────────────────────┐
│ Capabilities: High │
│ Resources: Substantial │
│ Sophistication: Advanced │
│ │
│ Motivations: │
│ - Financial theft │
│ - Money laundering │
│ - Ransomware/extortion │
│ │
│ Examples: Ransomware groups, fraud networks │
└────────────────────────────────────────────────┘
TIER 3: HACKTIVISTS/TERRORISTS
┌────────────────────────────────────────────────┐
│ Capabilities: Medium-High │
│ Resources: Moderate │
│ Sophistication: Variable │
│ │
│ Motivations: │
│ - Disruption │
│ - Political statement │
│ - Ideological opposition │
└────────────────────────────────────────────────┘
TIER 4: INSIDER THREATS
┌────────────────────────────────────────────────┐
│ Capabilities: High (privileged access) │
│ Resources: Access > external resources │
│ Sophistication: Variable │
│ │
│ Motivations: │
│ - Financial gain │
│ - Coercion │
│ - Ideology │
│ - Disgruntlement │
└────────────────────────────────────────────────┘
TIER 5: OPPORTUNISTIC ATTACKERS
┌────────────────────────────────────────────────┐
│ Capabilities: Low-Medium │
│ Resources: Limited │
│ Sophistication: Basic │
│ │
│ Motivations: │
│ - Easy money │
│ - User account theft │
│ - Phishing │
└────────────────────────────────────────────────┘
```
CBDC ATTACK VECTORS
INFRASTRUCTURE ATTACKS:
┌────────────────────────────────────────────────┐
│ Target: Core CBDC systems │
│ │
│ Methods: │
│ - Network intrusion │
│ - Supply chain compromise │
│ - Zero-day exploits │
│ - DDoS attacks │
│ │
│ Impact: System-wide, catastrophic │
└────────────────────────────────────────────────┘
APPLICATION ATTACKS:
┌────────────────────────────────────────────────┐
│ Target: CBDC software │
│ │
│ Methods: │
│ - Code vulnerabilities │
│ - API exploitation │
│ - Logic flaws │
│ - Smart contract bugs │
│ │
│ Impact: Transaction manipulation, theft │
└────────────────────────────────────────────────┘
USER-LEVEL ATTACKS:
┌────────────────────────────────────────────────┐
│ Target: Individual users │
│ │
│ Methods: │
│ - Phishing │
│ - Social engineering │
│ - Malware on devices │
│ - SIM swapping │
│ │
│ Impact: Individual account compromise │
└────────────────────────────────────────────────┘
CRYPTOGRAPHIC ATTACKS:
┌────────────────────────────────────────────────┐
│ Target: Cryptographic foundations │
│ │
│ Methods: │
│ - Key theft │
│ - Algorithm weakness exploitation │
│ - Quantum computing (future) │
│ │
│ Impact: Potentially catastrophic │
└────────────────────────────────────────────────┘
INSIDER ATTACKS:
┌────────────────────────────────────────────────┐
│ Target: Privileged access │
│ │
│ Methods: │
│ - Abuse of legitimate access │
│ - Collusion │
│ - Data exfiltration │
│ │
│ Impact: Trust destruction, major breach │
└────────────────────────────────────────────────┘
```
THREATS UNIQUE TO CBDC
- Digital token forgery
- Unauthorized issuance
- Balance manipulation
- Potentially unlimited scale
- Perfect copies possible
- No physical detection
- Spending same value twice
- Exploiting offline gaps
- Race conditions
Critical for token models
Requires strong prevention
- Unauthorized money creation
- Destruction of value
- Inflation attack
Could destabilize economy
Existential threat
- Altering transaction details
- Redirecting payments
- Blocking transactions
Undermines trust in system
- Mass surveillance data theft
- Transaction pattern exposure
- Deanonymization
Intelligence goldmine
Political implications
```
DEFENSE-IN-DEPTH PRINCIPLE
CONCEPT:
Multiple independent security layers
Breach of one layer doesn't compromise system
Attacker must breach ALL layers
CBDC SECURITY LAYERS:
Layer 7: USER LAYER
├─ Authentication
├─ Device security
├─ User education
└─ Fraud detection
Layer 6: APPLICATION LAYER
├─ Secure coding
├─ Input validation
├─ Session management
└─ API security
Layer 5: DATA LAYER
├─ Encryption at rest
├─ Encryption in transit
├─ Access controls
└─ Data integrity
Layer 4: PLATFORM LAYER
├─ OS hardening
├─ Container security
├─ Patch management
└─ Configuration management
Layer 3: NETWORK LAYER
├─ Firewalls
├─ Segmentation
├─ Intrusion detection
└─ DDoS protection
Layer 2: PHYSICAL LAYER
├─ Data center security
├─ Hardware security modules
├─ Physical access controls
└─ Environmental controls
Layer 1: GOVERNANCE LAYER
├─ Policies and procedures
├─ Personnel security
├─ Audit and compliance
└─ Incident response
```
CBDC SECURITY ARCHITECTURE
EXTERNAL USERS
│
▼
┌─────────────────────────────────────────────────┐
│ PERIMETER SECURITY │
│ ┌─────────┐ ┌─────────┐ ┌─────────┐ │
│ │ WAF │ │ DDoS │ │ API │ │
│ │ │ │ Protect │ │ Gateway │ │
│ └─────────┘ └─────────┘ └─────────┘ │
└─────────────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────┐
│ DMZ / EDGE ZONE │
│ ┌─────────────────────────────────────────┐ │
│ │ Load Balancers, Reverse Proxies │ │
│ │ Authentication Services │ │
│ └─────────────────────────────────────────┘ │
└─────────────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────┐
│ APPLICATION ZONE │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ │
│ │ App │ │ App │ │ App │ │
│ │ Server 1 │ │ Server 2 │ │ Server 3 │ │
│ └──────────┘ └──────────┘ └──────────┘ │
└─────────────────────────────────────────────────┘
│
▼
┌─────────────────────────────────────────────────┐
│ DATA ZONE (Most Protected) │
│ ┌──────────────────────────────────────────┐ │
│ │ CORE LEDGER DATABASE │ │
│ │ │ │
│ │ ┌─────────┐ ┌─────────┐ │ │
│ │ │ HSMs │ │ Backup │ │ │
│ │ │ │ │ │ │ │
│ │ └─────────┘ └─────────┘ │ │
│ └──────────────────────────────────────────┘ │
└─────────────────────────────────────────────────┘
```
ZERO TRUST FOR CBDC
PRINCIPLE: Never trust, always verify
TRADITIONAL APPROACH:
"Inside the perimeter = trusted"
"Outside = untrusted"
Problem: Perimeter can be breached
Once inside, attacker has free access
ZERO TRUST APPROACH:
"Trust nothing by default"
"Verify every request"
"Least privilege always"
IMPLEMENTATION:
Every request authenticated
Multi-factor required
Continuous validation
Session limits
Minimum access needed
Time-limited access
Task-specific permissions
No standing privileges
Network divided into small zones
Movement between zones controlled
Lateral movement prevented
Breach contained
All activity logged
Anomaly detection
Real-time alerting
Behavioral analysis
CRYPTOGRAPHIC CONTROLS
KEY MANAGEMENT:
┌────────────────────────────────────────────────┐
│ HARDWARE SECURITY MODULES (HSMs) │
│ │
│ Purpose: │
│ - Protect cryptographic keys │
│ - Perform crypto operations │
│ - Tamper-resistant hardware │
│ │
│ Requirements: │
│ - FIPS 140-2 Level 3+ certification │
│ - Dual control for sensitive operations │
│ - Key ceremony procedures │
│ - Secure key backup │
└────────────────────────────────────────────────┘
- At rest: AES-256 or equivalent
- In transit: TLS 1.3
- End-to-end where applicable
- Transaction signing
- Code signing
- Certificate management
- Non-repudiation
- Monitor quantum computing progress
- Plan for post-quantum cryptography
- Crypto agility (ability to switch algorithms)
ACCESS CONTROL MODEL
IDENTITY AND ACCESS MANAGEMENT (IAM):
┌────────────────────────────────────────────────┐
│ │
│ USERS: │
│ - Strong authentication │
│ - Multi-factor required │
│ - Device binding │
│ - Session management │
│ │
│ ADMINISTRATORS: │
│ - Privileged access management (PAM) │
│ - Just-in-time access │
│ - Session recording │
│ - Break-glass procedures │
│ │
│ SYSTEMS: │
│ - Service accounts controlled │
│ - API authentication │
│ - Certificate-based auth │
│ - Secrets management │
│ │
└────────────────────────────────────────────────┘
- Create and approve transactions
- Develop and deploy code
- Administer and audit systems
- Access data and modify controls
- Key generation
- Large value transactions
- System configuration changes
- Emergency procedures
SECURITY MONITORING
SECURITY OPERATIONS CENTER (SOC):
┌────────────────────────────────────────────────┐
│ │
│ 24/7 monitoring │
│ Dedicated security analysts │
│ Threat intelligence integration │
│ Incident response capability │
│ │
└────────────────────────────────────────────────┘
DETECTION CAPABILITIES:
All systems log centrally
Tamper-proof log storage
Long retention periods
Correlation and analysis
Network-based (NIDS)
Host-based (HIDS)
Application-level
Behavioral analysis
ML-based pattern recognition
Unusual transaction patterns
Abnormal access patterns
Deviation from baseline
Industry threat feeds
Government sharing (CERT)
Dark web monitoring
Vulnerability tracking
SECURE DEVELOPMENT LIFECYCLE
- Security requirements defined
- Threat modeling
- Risk assessment
- Compliance requirements
- Security architecture review
- Cryptographic design review
- Data flow analysis
- Attack surface analysis
- Secure coding standards
- Code review requirements
- Static analysis (SAST)
- Dependency scanning
- Security testing
- Dynamic analysis (DAST)
- Penetration testing
- Vulnerability assessment
- Secure configuration
- Infrastructure as code
- Deployment verification
- Change management
- Continuous monitoring
- Patch management
- Incident response
- Regular assessments
SUPPLY CHAIN SECURITY
- Security due diligence
- Compliance verification
- Penetration test results
- Incident history
- Security obligations
- Audit rights
- Breach notification
- Data handling requirements
- Vendor security posture
- Service level agreements
- Regular reassessment
- Right to audit
- Dependency verification
- Software bill of materials
- Signed packages only
- Vulnerability scanning
- Trusted vendors
- Hardware verification
- Tamper detection
- Chain of custody
INSIDER THREAT MITIGATION
PREVENTION:
┌────────────────────────────────────────────────┐
│ Background checks │
│ Security clearances (where appropriate) │
│ Least privilege access │
│ Separation of duties │
│ Security awareness training │
└────────────────────────────────────────────────┘
DETECTION:
┌────────────────────────────────────────────────┐
│ User behavior analytics │
│ Data loss prevention │
│ Access pattern monitoring │
│ Privileged user monitoring │
│ Anomaly detection │
└────────────────────────────────────────────────┘
RESPONSE:
┌────────────────────────────────────────────────┐
│ Investigation procedures │
│ Access revocation │
│ Evidence preservation │
│ Legal/HR coordination │
│ Post-incident analysis │
└────────────────────────────────────────────────┘
```
INCIDENT RESPONSE PHASES
- Incident response plan documented
- Team trained and ready
- Tools and playbooks prepared
- Communication channels established
- Alert triggered
- Initial triage
- Severity classification
- Escalation decision
- Isolate affected systems
- Prevent spread
- Preserve evidence
- Maintain operations where possible
- Remove threat
- Patch vulnerabilities
- Clean compromised systems
- Verify removal complete
- Restore systems
- Verify integrity
- Monitor for recurrence
- Gradual return to normal
- Post-incident review
- Root cause analysis
- Process improvement
- Update defenses
CBDC INCIDENT SCENARIOS
SCENARIO 1: MASS FRAUD DETECTED
┌────────────────────────────────────────────────┐
│ Situation: Large-scale unauthorized │
│ transactions detected │
│ │
│ Response: │
│ - Freeze affected accounts │
│ - Identify attack vector │
│ - Reverse fraudulent transactions │
│ - Notify affected users │
│ - Coordinate with law enforcement │
└────────────────────────────────────────────────┘
SCENARIO 2: CORE SYSTEM BREACH
┌────────────────────────────────────────────────┐
│ Situation: Attacker has accessed │
│ core ledger systems │
│ │
│ Response: │
│ - Isolate compromised systems │
│ - Activate backup systems │
│ - Verify ledger integrity │
│ - Full forensic investigation │
│ - Consider system pause if needed │
└────────────────────────────────────────────────┘
SCENARIO 3: KEY COMPROMISE
┌────────────────────────────────────────────────┐
│ Situation: Cryptographic keys │
│ potentially exposed │
│ │
│ Response: │
│ - Key rotation immediately │
│ - Assess what was signed with old keys │
│ - Invalidate compromised credentials │
│ - Root cause analysis │
└────────────────────────────────────────────────┘
```
BUSINESS CONTINUITY FOR CBDC
- 99.99%+ uptime target
- Maximum planned downtime minimal
- Recovery time objective (RTO): Minutes
- Recovery point objective (RPO): Near-zero
- Active-active data centers
- Geographic distribution
- Automatic failover
- No single points of failure
- Real-time replication
- Point-in-time recovery
- Regular backup testing
- Immutable backup copies
- Data center loss
- Regional outage
- Cyber attack
- Natural disaster
Each scenario has documented
response and recovery procedures
```
✅ CBDCs face nation-state level threats—security must be commensurate.
✅ Defense-in-depth is essential—no single control is sufficient.
✅ Insider threats are significant—privileged access must be controlled.
⚠️ Actual attack patterns—limited real-world CBDC attacks to study.
⚠️ Quantum computing timeline—when will current crypto be vulnerable?
⚠️ Novel attack vectors—new systems create new attack surfaces.
📌 Underestimating adversary capability—nation-states are sophisticated.
📌 Security theater vs. real security—compliance ≠ security.
📌 Speed vs. security trade-offs—pressure to launch can compromise security.
CBDC security is a nation-state-level challenge requiring nation-state-level defenses. Defense-in-depth, zero trust, and continuous monitoring are essential. The threat landscape includes sophisticated actors with unlimited resources. Security must be foundational, not an afterthought.
Assignment: Conduct a high-level security assessment for a hypothetical CBDC, identifying key threats, required controls, and gaps.
Time Investment: 3-4 hours
End of Lesson 15
Course 58: CBDC Architecture & Design
Lesson 15 of 20
Key Takeaways
CBDCs are the highest-value targets
: Nation-states, organized crime, and insiders all have motivation and capability to attack.
Defense-in-depth is non-negotiable
: Multiple independent security layers ensure breach of one doesn't compromise the system.
Zero trust applies internally
: Never trust, always verify—even inside the network.
Insider threats require specific controls
: Privileged access management, separation of duties, and monitoring are essential.
Incident response must be prepared
: When (not if) incidents occur, rapid, practiced response limits damage. ---