skip to Main Content
bitcoin
Bitcoin (BTC) $ 94,173.23 1.61%
ethereum
Ethereum (ETH) $ 3,327.40 0.20%
tether
Tether (USDT) $ 0.998416 0.06%
xrp
XRP (XRP) $ 2.14 0.65%
bnb
BNB (BNB) $ 690.23 0.14%
solana
Solana (SOL) $ 183.65 2.56%
dogecoin
Dogecoin (DOGE) $ 0.311027 0.62%
usd-coin
USDC (USDC) $ 0.99987 0.05%
staked-ether
Lido Staked Ether (STETH) $ 3,327.77 0.01%
cardano
Cardano (ADA) $ 0.87435 1.32%

Ledger’s recent security audit was unconnected to their data breach in June

It seems the review was already in process before the attack ever occured.

689 Total views

12 Total shares

Ledger’s recent security audit was unconnected to their data breach in June

Popular hardware wallet company Ledger recently announced that they had passed a notable security evaluation, known as SOC 2 Type 1. This certification came following a significant data breach the company suffered in June. Ledger did not, however, decide to conduct its security audit because of the breach, according to comments from a Ledger representative. 

“Ledger is always seeking to raise the security standards and has been working on getting the attestation prior to the data breach,” the representative told Cointelegraph. 

News of Ledger’s completed SOC 2 Type 1 audit came in October, essentially giving the market a level of confidence based on a trusted mainstream security benchmark.

“The SOC II attestation refers both to the System, in this case, Ledger Vault only, and the Organization: Ledger as a whole,” the representative explained. “Hence, if the SOC 2 Type 1 only applies to Ledger Vault, the Ledger organization as a whole has been audited (onboarding of collaborators, third party interactions, etc.).”

Ledger was made aware of a database weakness in July, which they quickly patched. The company, however, also uncovered a previous large data breach that occurred in June, which leaked thousands customers’ names, addresses, and other potentially sensitive information. 

Kristy-Leigh Minehan, Former CTO of Core Scientific, told Cointelegraph “SOC2 Type 1 is about assessing the design of a security process (or processes) at a specific point in time (or, as of a specified date).” She clarified:

“They would only be evaluated up until the point when they executed it, not necessarily when they were awarded it.”

Loading data ...
Comparison
View chart compare
View table compare
Back To Top