[ISM] Security information:

A ‘security.txt’ file is hosted for all internet-facing organisational domains to assist in the responsible disclosure of vulnerabilities in an organisation’s products and services.

[SSDF] Develop a security response playbook and host a security.txt (SSS-04-04-01)

Develop and maintain a security response playbook to complement the hosting of a security.txt file for responsible vulnerability disclosure. The playbook should provide detailed procedures for handling vulnerabilities reported through the security.txt contact information. This includes managing generic vulnerability reports, zero-day vulnerabilities, active exploitations, and complex incidents involving multiple parties or open-source components. Integrate the playbook with the processes defined by the security.txt framework to ensure efficient communication, prioritization, and resolution of vulnerabilities. Regularly update the playbook to address emerging threats and maintain alignment with the responsible disclosure principles supported by the security.txt file.

[SAMM] Establish and document a structured incident response process (SSS-04-04-01-01)

Define and document a formal security incident response process to handle diverse incident scenarios effectively. This process should outline common security threats, high-level resolution steps, and references to public knowledge about relevant third-party incidents. Include clear triaging rules, timelines for stakeholder involvement, and designated responsibilities for senior management, public relations, legal, privacy teams, and external authorities. Establish a framework for performing root-cause analysis and securely documenting results. Ensure the incident response team is well-trained and available 24/7 to handle emergencies, supported by a defined "war room" and updated tools. Regularly maintain and review the playbook to address evolving threats, ensuring alignment with security best practices and the security.txt framework to promote effective vulnerability management and disclosure.

Operations

ID Operation Description Phase Agent
SSS-04-04-01-01-01 Host and maintain a Security.txt file Publish and regularly update a security.txt file for all internet-facing organizational domains. Include contact information and responsible disclosure guidelines to facilitate vulnerability reporting by external researchers. Preparation Incident Response Leads
SSS-04-04-01-01-02 Develop a security response playbook Create and maintain a comprehensive security response playbook to handle reports received via the security.txt file. Define detailed procedures for managing various scenarios, including generic vulnerability reports, zero-day vulnerabilities, and multi-party incidents. Development Security Policy Team
SSS-04-04-01-01-03 Integrate the playbook with incident response processes Align the playbook with the security incident response framework, ensuring smooth coordination between vulnerability handling and broader incident management. Include triaging rules, escalation procedures, and clear roles for senior management, public relations, and external authorities. Deployment Incident Response Team
SSS-04-04-01-01-04 Establish and train a 24/7 incident response team Form a trained, continuously available incident response team equipped to handle diverse scenarios. Provide the team with access to a dedicated "war room" and updated tools for efficient response. Conduct regular training and simulations to ensure readiness. Post-deployment Security Operations Team
SSS-04-04-01-01-05 Perform root-cause analysis and continuous improvement Define a framework for conducting root-cause analyses of incidents and securely documenting findings. Use insights to update the playbook and align it with emerging threats, responsible disclosure principles, and best practices supported by the  Post-deployment Security Analysts

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1717)
NIST Secure Software Development Framework (RC.1.3 Example3)
OWASP SAMM: Software Assurance Maturity Model (O-IM-2-B)