Skip to main content

Security Guidelines

To ensure the stability and security of your Axon chain, please adhere to the following security assumptions:

  • Validator Trustworthiness: Assume the absence of any malicious entities within the validator list. A secure Axon chain relies on trustworthy validators.
  • High Availability: To maintain a robust network, it's crucial that at least (n/3 + 1) nodes remain online at all times. This level of availability helps safeguard the chain's continuous operation and resilience against potential disruptions.