Vulnerability Disclosure Policy Templates for Receivers
This collection of policy statement templates describe expectations for organizations receiving vulnerability reports. Report Receivers might include Vendors, Coordinators, Deployers, or other organizations that receive vulnerability reports.
Tips and Usage Notes
How To Use These Templates
Organizations will likely find that some expectations do not apply to their situation based on the kind of stakeholder they are. In particular we anticipate that product vendors, service providers, and coordinators will have related but distinct needs. Inclusion or exclusion of items from these templates into your organization's policy should be based on which combination of stakeholder roles you expect to play.
Here's a checklist of tasks you should complete in order to make use of these templates.
- Review the content of the Disclosure Policy Style Guide.
- Review the content of the Reporters and Receivers files.
- Select the policy expectation items you want to use.
- Adjust the recommendation strength (e.g., change some of the SHOULDs to MUSTs or MAYs to SHOULD NOTs etc.).
- Adjust the wording of the items to fit your organization's style or needs.
- Replace any KEYWORDS with an appropriate substitution (e.g., "45 days"
instead of
SLC"). - Construct a single policy document from the collected items.
- Add any needed introduction, boilerplate, or legal info to the document.
- Review the entire document for internal consistency and fix any contradictions.
- Review the document for external consistency with other organization policies, applicable laws, regulations, etc.
- Get approval for the policy and to publish the document from necessary decision makers
- Establish sufficient operational capability in order to provide the service(s) the policy commits you to offer.
- Publish the policy
Disclaimer
We are not lawyers, and this is not legal advice. You are encouraged to consult your own legal counsel in the process of creating your disclosure policy.
Terminology Notes
Terms from RFC 2119 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.
Terms from ISO, CERT The terms Researcher or Reporter is intended to be consistent with the terms Finder and/or Reporter as used in ISO/IEC 29147:2014(E) and the CERT® Guide to Coordinated Vulnerability Disclosure.
Other Terms
ORGANIZATION- the name of an organization or entity, specifically the one creating this policy.
SYSTEM SCOPE- A defined set of systems covered by this policy. E.g., "
ORGANIZATION's information systems", "ORGANIZATION's public web sites", "PRODUCTversions X through Y", "Critical infrastructure information systems", or any other similar scope. JURISDICTION- the territorial, political, or governmental scope of a regulatory authority
SLC- Service Level Commitment, typically expressed in terms of the minimum or maximum time until some event trigger. For example: at least 45 days, not more than 90 days, within 2 business days, etc.
PUBLICATION CHANNEL- A specific medium through which information is conveyed, e.g., a web site, mailing list, Twitter, RSS or Atom Feed, or database.
BUG BOUNTY- A type of Vulnerability Disclosure Program in which the
ORGANIZATIONcompensates reporters for reports meeting specific criteria. REPORTING CHANNEL- A specific medium through which vulnerability reports are communicated from a Reporter to the
ORGANIZATION. Examples include: an email address, a web form, or a bug tracking platform.
These examples are not internally consistent
Because these policy statements are meant to be remixed and adapted for different organizations and contexts, some of the policy points could conflict with or mutually exclude others. It's up to you to edit them into whatever you want your policy to say. Our hope is that this collection has enough breadth of coverage across issues that the words address most of what you might want a policy to cover.
Template Policy Statements
ORGANIZATION SHALL deal in good faith with Reporters who discover, test, and report vulnerabilities or indicators of vulnerabilities in accordance with these guidelines.
General
-
ORGANIZATIONMAY modify the terms of this policy or terminate the policy at any time. -
ORGANIZATIONSHALL use information reported to this program for defensive purposes only; to mitigate or remediate vulnerabilities in our networks or applications, or the applications of our vendors.
Case handling
-
ORGANIZATIONMAY, at our discretion, decline to coordinate or publish a vulnerability report. This decision is generally based on the scope and severity of the vulnerability and our ability to add value to the coordination and disclosure process. -
In the event that
ORGANIZATIONdeclines to coordinate a vulnerability report, the Reporter SHOULD proceed to coordinate with any other affected vendor(s). Additionally, the Reporter MAY proceed with public disclosure at their discretion. -
ORGANIZATIONSHALL investigate every reported vulnerability and strive to ensure that appropriate steps are taken to mitigate risk and remediate reported vulnerabilities. -
ORGANIZATIONSHALL, to the best of our ability, validate the existence of the vulnerability -
ORGANIZATIONSHALL determine an appropriate timeframe for mitigation development and deployment for vulnerabilities reported in systems it controls.
Coordination with reporters
-
ORGANIZATIONSHALL acknowledge receipt of vulnerability reports via email withinSLC. -
ORGANIZATIONMAY contact the Reporter for further information. -
ORGANIZATIONSHALL inform the Reporter of the results of our validation, as appropriate, and accordingly provide status updates as remediation of the vulnerability is underway. -
ORGANIZATIONSHALL include credit to the reporter in any published vulnerability report unless otherwise requested by the reporter. -
In the event that
ORGANIZATIONchooses to publicly disclose the reported vulnerability,ORGANIZATIONSHALL recognize your contribution to improving our security if you are the first to report a unique vulnerability, and your report triggers a code or configuration change. -
ORGANIZATIONMAY forward the name and contact information of the Reporter to any affected vendors unless otherwise requested by the reporter. -
ORGANIZATIONSHALL forward the name and contact information of the reporter to the affected vendors unless otherwise requested by the reporter. -
ORGANIZATIONSHALL advise the reporter of significant changes in the status of any vulnerability he or she reported to the extent possible without revealing information provided to us in confidence. -
ORGANIZATIONMAY adjust its publication timeframe to accommodate reporter constraints if that timing is otherwise compatible with this policy. In most cases such an adjustment would be expected to represent a delay rather than an acceleration of the publication schedule. Examples include delaying publication to coincide with conference presentations. -
ORGANIZATIONSHALL NOT require Reporters to enter into a customer relationship, non-disclosure agreement (NDA) or any other contractual or financial obligation as a condition of receiving or coordinating vulnerability reports.
Coordination with vendors
-
In the event that
ORGANIZATIONdetermines the reported vulnerability is consequent to a vulnerability in a generally available product or service,ORGANIZATIONMAY report the vulnerability to the affected vendor(s), service provider(s), or third party vulnerability coordination service(s) in order to enable the product or service to be fixed. -
ORGANIZATIONSHALL make a good faith effort to inform vendors of reported vulnerabilities prior to public disclosure. -
ORGANIZATIONSHALL forward vulnerability reports to the affected vendor(s) as soon as practical after we receive the report. -
ORGANIZATIONSHALL apprise any affected vendors of our publication plans and negotiate alternate publication schedules with the affected vendors when required. -
ORGANIZATIONSHALL provide the vendor the opportunity to include a vendor statement within our public disclosure document. -
ORGANIZATIONSHALL NOT withhold vendor-supplied information simply because it disagrees with our assessment of the problem. -
ORGANIZATIONSHALL notify affected vendors of any public disclosure plans. -
ORGANIZATIONSHALL NOT reveal information provided in confidence by any vendor. -
ORGANIZATIONSHALL act in accordance with the expectations of Reporters set forth in this policy when acting as a Reporter to other organizations (vendors, coordinators, etc.).
Coordination with others
-
ORGANIZATIONMAY engage the services of a third party coordination service (e.g., CERT/CC, DHS CISA) to assist in resolving any conflicts that cannot be resolved between the Reporter andORGANIZATION. -
ORGANIZATIONMAY, at our discretion, provide reported vulnerability information to anyone who can contribute to the solution and with whom we have a trusted relationship, including vendors (often including vendors whose products are not vulnerable), service providers, community experts, sponsors, and sites that are part of a national critical infrastructure, if we believe those sites to be at risk.
Public disclosure
-
ORGANIZATIONSHALL determine the type and schedule of our public disclosure of the vulnerability. -
ORGANIZATIONMAY disclose reported vulnerabilities reported to the public N days after the initial report, regardless of the existence or availability of patches or workarounds from affected vendors. -
ORGANIZATIONMAY disclose vulnerabilities to the public earlier or later than N days due to extenuating circumstances, including but not limited to active exploitation, threats of an especially serious (or trivial) nature, or situations that require changes to an established standard. -
ORGANIZATIONMAY consult with the Reporter and any affected vendor(s) to determine the appropriate public disclosure timing and details. -
ORGANIZATIONSHALL balance the need of the public to be informed of security vulnerabilities with vendors' need for time to respond effectively. -
ORGANIZATION's final determination of a publication schedule SHALL be based on the best interests of the community overall. -
ORGANIZATIONSHALL publish public disclosures viaPUBLICATION CHANNEL. -
ORGANIZATIONMAY disclose to the public the prior existence of vulnerabilities already fixed byORGANIZATION, including potentially details of the vulnerability, indicators of vulnerability, or the nature (but not content) of information rendered available by the vulnerability. -
ORGANIZATIONSHALL make our disclosure determinations based on relevant factors such as but not limited to: whether the vulnerability has already been publicly disclosed, the severity of the vulnerability, potential impact to critical infrastructure, possible threat to public health and safety, immediate mitigations available, vendor responsiveness and feasibility for creating an upgrade or patch, and vendor estimate of time required for customers to obtain, test, and apply the patch. Active exploitation, threats of an especially serious nature, or situations that require changes to an established standard may result in earlier or later disclosure. -
ORGANIZATIONMAY disclose product vulnerabilitiesSLCafter the initial contact is made, regardless of the existence or availability of patches or workarounds from affected vendors in cases where a product is affected and the vendor is unresponsive, or fails to establish a reasonable timeframe for remediation.