[ISM] Vulnerability disclosure:

Vulnerabilities identified in applications are publicly disclosed (where appropriate to do so) by software developers in a timely manner.

[CISA] Manage responsible reporting processes effectively (SSS-04-05-01)

Establish a central, organization-wide Product Security Incident Response Team (PSIRT) to manage vulnerability disclosures and remediation efforts. Make PSIRT contact information accessible to external researchers, such as through a dedicated webpage, to encourage responsible vulnerability reporting. The PSIRT team should collaborate with researchers to acknowledge receipt of reports, gather essential details, and prioritize remediation of reported vulnerabilities. Ensure a responsible disclosure process is followed for all vulnerabilities, allowing for public disclosure when appropriate to protect users and promote transparency. This approach fosters trust, supports security improvements, and enables the organization to address vulnerabilities in a timely, coordinated manner.

[CISA] Identify, Analyze, and Remediate Vulnerabilities on a Continuous Basis (SSS-04-05-01-01)

To mitigate vulinerability risks, organizations should make every effort to ensure that publicly known or easily identified vulnerabilities are not in any software provided to customers. Additionally, testing for, understanding, and removing vulnerabilities in software is required to help prevent supplying code that can be readily compromised before delivering software to customers.

Operations

ID Operation Description Phase Agent
SSS-04-05-01-01-01 Establish a central product security incident response team (PSIRT) Create a company-wide PSIRT with public-facing information (e.g., a webpage) to facilitate external vulnerability reporting. The PSIRT team should work with external researchers to acknowledge, triage, and resolve reported vulnerabilities, ensuring responsible disclosure. Preparation Security Teams
SSS-04-05-01-01-02 Define and implement vulnerability assessment processes Create a vulnerability assessment team consisting of architects, developers, and security experts. Establish processes for analyzing software capabilities and components, including known environment analysis, fuzz testing, and the use of tools like binary composition analysis for vulnerability detection. Development Security Analysts
SSS-04-05-01-01-03 Deploy state-of-the-art evaluation tools Invest in static and dynamic analysis tools to detect vulnerabilities throughout the software lifecycle. Ensure these tools are kept updated according to supplier documentation to maintain their effectiveness against evolving threats. Development QA and Testing Teams
SSS-04-05-01-01-04 Track, remediate, and document vulnerabilities Track all identified vulnerabilities as product defects in a secure defect tracking tool. Include CVSS scores, impact assessments, and other supporting data. Ensure vulnerabilities are remediated promptly, and document all findings for audits and continuous improvement. Deployment Compliance Teams
SSS-04-05-01-01-05 Publicly disclose vulnerabilities responsibly For vulnerabilities that warrant public disclosure, communicate them in a timely manner through appropriate channels, ensuring customers and stakeholders are informed about risks and mitigations. Use the SBOM to evaluate the impact of third-party and open-source components on vulnerabilities. Post-deployment PSIRT Team

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1908)
CISA Securing the Software Supply Chain Part2 (2.4)
CISA (2.4.1 Identify, Analyze, and Remediate Vulnerabilities on a Continuous Basis-- Recommended mitigations- 1.)