Summary
The Node Operation Standard (NOS) is a set of requirements that defines the baseline security criteria expected of a blockchain node operator with the goal of enabling clients and third-parties to perform safe and confident integrations. Certification against the NOS signifies that a node operator adheres to industry best practices and has had their security practices rigorously tested and measured.
The goals of the NOS are as follows:
- Present a clear set of security requirements for node operators that ensure a robust level of safety in fulfilling node responsibilities.
- Establish a set of requirements that are common across multiple blockchain ecosystems and protocols.
- Boost the confidence of consumer and business clients in engaging with node operators for blockchain-related services.
- Establish a certification process for the Node Operation Standard that is consistent with many existing network and security audit practices.
- Define a process for recurring re-certification which can be achieved through self-attestation as long as certain conditions did not change.
Table of Contents
Conformance
The key terms "MUST", "MUST NOT", "SHOULD", and "MAY" in this document MUST be interpreted as described in [RFC2119] as modified by [RFC8174] when they appear in all capitals, as shown here.
This document depends on guidance in two other documents. To conform to these requirements a Node Operator MUST comply with the requirements in the BSSC Key Management Standard, and follow the guidance in the BSSC General Security and Privacy Guidelines.
Taxonomy
A full taxonomy of node types is beyond the scope of this document. However, for the purposes of standardization, we categorize node types as follows. Note that controls have been written broadly to cover a wide variety of different node types. Fitting into this taxonomy exactly is not an explicit requirement for conformance, as this section is informational.
- Consensus Nodes. Nodes that actively participate in the blockchain’s consensus mechanism to propose, validate, or finalize blocks.
This includes: Validator nodes, Mining nodes, Proof-of-Authority nodes, Masternodes, etc - Full and Verification Nodes. Nodes that maintain the state of the blockchain by storing either the full or partial blockchain ledger and verifying transactions and blocks.
This includes: Full nodes, Light nodes, Archive nodes, Observer nodes, etc - Interoperability & Communication Nodes. Nodes that enable interaction between multiple blockchains or provide off-chain data to the blockchain.
This includes: Relay nodes, Bridge nodes, Oracle nodes, Relayer nodes, etc - Utility Nodes. Nodes that provide auxiliary services such as decentralized storage, data indexing, or serving as gateways to the blockchain network
This includes: Storage nodes, Indexer nodes, etc
Some nodes, in particular Oracles, can be used by other on-chain nodes, while having additional connections outside the blockchain. Such nodes can face additional threats of manipulation and other vulnerabilities, as they are not governed by the same set of incentives. Future versions of this specification or other work from the BSSC MAY provide additional, more specific guidance for operating these node types.
Requirement Domains
The Node Operation Standard will cover the following requirement domains. Currently these domains only outline the outcomes of the standard, not the specifics of how each requirement would be audited.
1. Protocol Onboarding
This domain ensures that node operators possess comprehensive technical expertise in any new protocol, including a clear understanding of the operational responsibilities, security considerations, and associated risks involved. Additionally, it requires that operators evaluate the maturity of the blockchain project and implement appropriate risk mitigation strategies to ensure a secure and stable deployment.
- A process for protocol selection and risk analysis MUST be documented and followed prior to operating nodes for a new protocol
- Software supply chains for all node-related components MUST be assessed, documented, and risk-managed, and follow official sources of software
- Procedures MUST be documented and followed for assessing the security of new software packages related to the protocol
- The operator MUST understand and document the technical and non-technical responsibilities it has with respect to the protocol
- The operator MUST understand and document the intricacies of the protocol such as mechanisms for network upgrades, governance (on-chain, off-chain, or both), voting procedures, killswitches, etc
- The operator MUST implement a process that continuously monitors changes to the network and adjusts risk accordingly
- The node operator MUST adhere to applicable anti-money laundering and national security address blacklists, or locally established equivalent guidelines, whenever such measures are available
- Prior to mainnet deployment, if a protocol testnet is available, the operator SHOULD conduct pilot testing on it; otherwise, the operator MUST use a controlled test network environment to validate the protocol's performance, interoperability, and security posture.
2. Network Participation
This domain requires that nodes strictly adhere to established best practices and network regulations. It emphasizes proactive measures to prevent issues such as slashing and to uphold the overall integrity and reliability of the blockchain network.
- Nodes MUST perform all standard activities - including attesting, executing, proposing, and any other responsibilities - in strict accordance with the documented best practices of their respective network
- Nodes MUST remain on the most recent accepted chain
- Nodes that are eligible for rewards MUST receive any form of incentive in accordance with the specific chain’s established protocols, and MUST maintain a verifiable log of all reward or incentive events
- Controls to prevent double signing MUST be documented and strictly followed
- Controls to prevent slashing or other penalties for non-participation in network duties MUST be documented and strictly followed
- The operator MUST maintain boot peers lists to protect against network fragmentation
- When discoverability is appropriate, nodes intended to be discoverable SHOULD be configured to allow discovery by other peers, and the operator SHOULD verify and confirm this configuration. Nodes not intended for external discovery MAY be configured to restrict peer discovery
- Node operators MUST implement and enforce controls that guarantee the decentralization of the protocol. These controls SHOULD be automated wherever possible and MUST be subject to regular audits and documented reviews to ensure ongoing compliance and effectiveness.
- In proof-of-work systems, a single entity or group of colluding entities MUST NOT control more than 50% of the network’s total hash power
- In proof-of-stake systems, a single entity or group of colluding entities MUST NOT control more than 33% of the total stake
- For components such as bridge validators or analogous critical functions, equivalent decentralization controls MUST be applied
3. Resilience and Performance
This domain requires that nodes be designed and managed to quickly recover from failures and adapt to evolving threats. By implementing robust fault-tolerance strategies, documenting and following continuity and failover procedures, and ensuring diverse and distributed deployments, operators can significantly enhance the overall stability and security of the network, thereby reinforcing trust among participants.
- Node operators SHOULD strive to deploy a diverse set of client software implementations within their blockchain ecosystem to enhance resilience and mitigate centralization risks. In cases where operational or performance considerations lead to the exclusive use of a particular client, operators SHOULD document the rationale for this decision and periodically assess the impact on overall ecosystem diversity
- Continuity and failover procedures MUST be documented and strictly followed to ensure the seamless transition of node operations during downtime events
- Processes for monitoring node uptime and remediating detected issues MUST be documented and strictly followed. All remediation actions MUST be recorded to facilitate subsequent audits and ensure compliance with established procedures.
- Node operators MUST document and adopt fault-tolerance strategies. Nodes SHOULD be distributed among multiple hosting providers, data centers, and geographic regions.
- Protocol-specific procedures for the deployment, recovery, and updating of nodes MUST be thoroughly documented and consistently followed. Any deviations from these documented procedures MUST be promptly reported and remediated.
- Node operators MUST provision nodes with sufficient hardware and network resources-including, but not limited to, disk space, disk speed, network speed, and bandwidth-to effectively perform their designated duties.
- Nodes MUST be configured to remain resilient to spikes in activity. Measures implemented to ensure such resilience MUST be documented and subject to periodic audit.
4. Security and Access Control
This domain defines critical measures to protect nodes from unauthorized access and mitigate potential security threats. It also requires the maintenance of comprehensive audit logs to support effective threat hunting and facilitate thorough security investigations.
- When supported, remote signers SHOULD be employed to eliminate the need for storing sensitive key material on network-connected nodes. In instances where remote signer support is unavailable, operators MUST implement alternative security controls to safeguard key material
- Cross-node communications SHOULD be secured, preferably through encryption or equivalent measures, to mitigate the risk of man-in-the-middle (MITM) and denial-of-service (DoS) attacks. In instances where encryption adversely impacts performance, operators MUST document and conduct a risk assessment
- Node logs MUST be recorded and SHOULD be aggregated where feasible. These logs MUST be retained for a period sufficient to enable timely investigation and response to unexpected behaviors, as defined by documented retention policies and procedures.
- Logs containing sensitive information, such as cryptographic keys or personally identifiable information (PII), MUST be suppressed, sanitized, or otherwise secured to prevent unauthorized access. Logging systems MUST enforce strict access controls to ensure that any sensitive data is adequately protected
- Access to node control planes MUST be restricted to authorized personnel only. Additionally, all access events MUST be comprehensively logged and subject to regular audits to ensure compliance with security policies and detect unauthorized activity.
- The network exposure of node clients MUST be minimized to include only the services essential for effective network operation
- Security incident response procedures MUST be documented and strictly followed. In the event of a security incident, these procedures MUST be executed to ensure node availability and to facilitate a secure and safe return to operations. Additionally, all incident response activities MUST be logged and audited for compliance with established protocols
5. Transparency
This domain mandates that node operators provide clear and accessible disclosures regarding their operational practices and risk mitigation measures.
- Node operators MUST clearly disclose, in an accessible and auditable manner, the scope and terms of any insurance coverage they provide. Such disclosures MUST specifically detail the protections afforded against losses resulting from slashing, downtime, and compromise
- Node operators that support pre-signed exit transactions MUST deliver these transactions to clients using a cryptographically secure and confidential communication method. The method SHOULD adhere to industry-standard encryption protocols and ensure that transaction data is protected from unauthorized access or modification
Alignment with other Standards
The Network Participation domain is aligned with other similar node operation standard proposals such as Liquid Collective's Node Operator Risk Standard [NORS], and Lido's Distributed Utilization of Configurations and Knowledge [DUCK] project.
Additionally, some concepts within the Resilience, Performance, and Security and Access Control align with common risk management standards such as [SOC 2] and [ISO 27001].