HashSphere FAQs
Common questions about HashSphere Managed Service. This covers scope, operations, and shared ownership.
Go deeper here:
Service basics
What is HashSphere Managed Service?
HashSphere Managed Service is a fully-managed, enterprise-grade private ledger offering operated by the HashSphere engineering team on AWS or GCP. It allows organizations to run a permissioned network aligned with Hedera technology without needing to manage nodes, upgrades, or infrastructure operations themselves.
HashSphere Managed Service provides:
Managed network operations with defined SLAs
Proactive monitoring and maintenance
Backup and recovery
Structured support and escalation policies
Clear operational boundaries between HashSphere and the customer
Who is HashSphere Managed Service designed for?
HashSphere Managed Service is designed for organizations that need:
Production-grade reliability and uptime guarantees
Predictable operations rather than ad-hoc support
Enterprise-grade security and compliance alignment
This includes regulated industries, financial services, payments, supply chain, and enterprise application teams, to name a few.
What does “fully managed” mean?
Fully managed means:
HashSphere engineers deploy, operate, monitor, and maintain the HashSphere network
The HashSphere team handles node health, upgrades, backups, and incident response
Customers do not require blockchain infrastructure expertise
Customers can instead focus on building applications and integrations, not running nodes.
What cloud providers are supported?
HashSphere runs on AWS or GCP. Deployments are single-region and multiple Availability Zones by default.
Operations
What uptime and reliability guarantees are provided?
HashSphere Managed Service includes the following:
Published uptime SLAs (≥ 99.9%).
Defined maintenance windows.
Clear definitions of what services are included in uptime calculations.
Planned maintenance is communicated in advance and accounted for as part of the SLA agreements.
How are incidents handled?
Incidents are managed through our support portal, with tickets serving as the primary source of truth. HashSphere Managed Service employs a tiered support and escalation model:
Ticket Submission: Customers submit tickets via ZenDesk.
Guaranteed Response Times: Response times are guaranteed based on the customer’s support contract.
Clear Escalation Paths: Incidents can be escalated to Solution Architects, engineers, or product teams as needed.
Structured Communication: We ensure systematic communication throughout the incident lifecycle.
Start here:
What monitoring and visibility do customers get?
Every network includes the HashSphere Console. It integrates with your SSO provider.
You can view node health, endpoint availability, and network status. This helps you validate issues before opening a ticket.
How does backup and recovery work?
HashSphere provides automated backups and restore capability. Backup scope and recovery objectives depend on your service contract.
Security & access
What is the shared responsibility model?
HashSphere operate the managed platform. This includes nodes, upgrades, monitoring, backups, and platform incidents.
Customers operate the customer environment and application. This includes app deployment, access policies, and signing keys.
Use Architecture Overview for boundary details.
Who owns keys, certificates, and infrastructure?
Ownership depends on how the key is used. HashSphere runs the infrastructure. Customers own transaction signing keys.
Consensus node keys
Node identity keys, gossip/TLS material
Hashgraph
Mirror / RPC / explorer service certificates
Ingress TLS certs, internal mTLS certs
Hashgraph
Infrastructure access credentials
Cloud account/project, Kubernetes control plane, CI for platform components
Hashgraph
Platform/admin secrets
Monitoring credentials, service-to-service secrets, platform admin accounts
Hashgraph
Customer ledger account keys (transaction signing)
Operator keys used by apps, treasury keys for customer-issued tokens, contract admin keys
Customer
Customer auth/identity configuration
SSO/IdP config, user access policies in the customer environment
Customer
HashSphere can bootstrap initial accounts during onboarding. Customer-owned keys are transferred using secure mechanisms.
Integrations & development
Can customers integrate wallets, custody providers, or partners?
Yes. HashSphere supports integrations with wallets, custody, and third-party tooling.
Customers provision partner access. HashSphere provides required network identifiers and endpoints.
Can customers deploy applications automatically?
Yes. Use standard enterprise CI/CD for customer applications.
HashSphere provides stable environment details for automation. Your team owns pipelines and releases.
Data & privacy
Is customer data private?
HashSphere is permissioned. Access is restricted to approved participants.
Connectivity is typically private. Examples include AWS PrivateLink and GCP Private Service Connect.
Data is encrypted in transit and at rest. Your application still controls what you publish on-ledger.
HashSphere APIs do not enforce your app auth model by default. Use a customer-managed proxy or gateway for fine-grained control.
Advanced privacy features may ship in future releases. Treat them as roadmap until contracted.
Last updated

