ISO/IEC 29147:2018 Crosswalk
This page is not normative
This page is not considered a core part of the Vultron Protocol as proposed in the main documentation. Although within the page we might provide guidance in terms of SHOULD, MUST, etc., the content here is not normative.
ISO/IEC 29147:2018 Information technology — Security techniques — Vulnerability disclosure also overlaps with the Vultron Protocol.
Perhaps unsurprisingly, clauses 5 through 9 of ISO/IEC 29147:2018 overlap significantly with the Vultron Protocol.
Consistent Terminology
Our use of the following terms is consistent with ISO/IEC 29147:2018 §5.4 Systems, components, and services: Systems, Components, Products, Services, Vulnerability, and Product interdependency.
ISO/IEC 29147:2018 §5.5 Stakeholder Roles includes User, Vendor, Reporter, and Coordinator. We generally use Deployer instead of User, but the rest are consistent.
See the table below for a thorough cross-reference.
ISO/IEC 29147:2018 Clause |
Sub-Clause | Vultron Protocol Mapping |
---|---|---|
5.6 Vulnerability Handling Process Summary | 5.6.1 General 5.6.2 Preparation 5.6.3 Receipt 5.6.4 Verification 5.6.5 Remediation development 5.6.6 Release 5.6.7 Post-release |
The first few subsections of ISO/IEC 29147:2018 §5.6 are recapitulated in ISO/IEC 30111:2019. Accordingly, see the corresponding rows on that page |
5.6.8 Embargo period | EM Discussion | |
5.7 Information exchange during vulnerability disclosure | send-report-to | Message Types Reporting Behavior \(q^{rm} \in A + RS\) sender \(q^{rm} \in S \xrightarrow{r} R + RS\) receiver |
release-advisory-to | Message Types Prepare Publication Behavior \(q^{rm} \in A + GI\) sender \(q^{rm} \in \{R,V,A,D\} + GI\) receiver |
|
5.8 Confidentiality | Embargo Management Model Transport Protocol |
|
5.9 Vulnerability advisories | the Public Awareness substate Publication Behavior |
|
5.10 Vulnerability exploitation | the Exploit Public substate the Attacks Observed substate Monitor Threats Behavior |
|
5.11 Vulnerabilities and risk | Interactions between the Vultron Protocol and SSVC | |
6 Receiving vulnerability reports | 6.1 General | the Report Management Model the Vendor Awareness substate Process RM Messages Behavior |
6.2 Vulnerability reports | 6.2.1 General | the Report Management Model Reporting Behavior |
6.2.2 Capability to receive reports | the Received state Process RM Messages Behavior |
|
6.2.3 Monitoring | Receiving and Processing Messages Behavior | |
6.2.4 Report Tracking | the Report Management Model Reporting Behavior Case Object |
|
6.2.5 Report Acknowledgement | RM Message Types Process RM Messages Behavior |
|
6.3 Initial assessment | RM Message Types Report Prioritization Behavior |
|
6.4 Further investigation | RM Message Types Do Work Behavior |
|
6.5 On-going communication | Message Types | |
6.6 Coordinator involvement | - | RM Interactions Between CVD Participants Inviting Others to and Embargoed Case Coordination with a Coordinator Notify Others Behavior |
6.7 Operational security | - | Transport Protocol |
7 Publishing vulnerability advisories | all | Publication Behavior CVD Case Substates |
7.3 Advisory publication timing | Embargo Principles | |
7.4 Advisory elements | Message Formats | |
7.5 Advisory communication | Publication Behavior | |
7.6 Advisory format | Message Formats | |
7.7 Advisory authenticity | Identity Management | |
7.8 Remediations | Deployment Behavior | |
8 Coordination | 8.1 General | the Received state the Accepted state RM Interactions Between CVD Participants Inviting Others to an Embargoed Case Modeling an MPCVD AI Using Behavior Trees |
8.2 Vendors playing multiple roles | the Received state the Accepted state the Fix Readiness Substate Reporting Behavior |
|
9 Vulnerability disclosure policy | 9.2.2 Preferred contact mechanism | Receiving and Processing Messages Behavior |
9.3.2 Vulnerability report contents | Case Object | |
9.3.3 Secure communication options | Transport Protocol | |
9.3.4 Setting communication expectations | Default Embargoes Transition Functions Report Management Behavior Tree |
|
9.3.6 Publication | Publication Behavior | |
9.4.3 Disclosure timeline | Embargo Management Model |