[

]

[

]

[

]

Validator Security
& Operations Policy

Validator Security
& Operations Policy

Validator Security
& Operations Policy

At Noders, we take validator security and operational integrity seriously.

Below is an overview of our current practices:

1. Infrastructure Security

  • We operate on trusted infrastructure providers such as Hetzner and AWS.

  • All validator and sentry nodes are protected by firewalls, private networking, and IP whitelisting.

  • Redundant architecture is implemented using sentry nodes and backup validators to ensure high availability.

2. Updates & Monitoring

  • We apply security updates and patches promptly.

  • Monitoring includes block production, missed slots, peer connectivity, and validator health.

  • We use alerting systems (e.g., Prometheus + Alertmanager, Telegram bots) to detect anomalies in real time.

3. Key Management

  • All validator keys are generated offline and stored in secure, isolated environments (air-gapped or hardware-based).

  • We enforce strict access controls and regular integrity checks.

  • Key rotation procedures are in place if needed.

4. Recovery & Backups

  • We maintain automated and encrypted backups of node state and configurations.

  • A clearly documented disaster recovery plan ensures minimal downtime in the event of failure.

5. Access Control

  • Node access is limited to a small, trusted team with role-based privileges.

  • All access is logged and audited.

6. Software Policy

  • We run official client software only.

  • No third-party modifications or custom consensus changes are applied.

7. Incident Reporting

If you observe a potential issue with our validator node, please contact us at security@noders.team