<section title="5.9. Vulnerability Disclosure Policy (VDP)"><subsection title="Objective"><paragraph
    title="5.9.1."


><![CDATA[<p class="NormS5C9">Agencies implement a Vulnerability Disclosure Policy (VDP) to enable members of the public to report vulnerabilities in the agency’s public-facing systems and applications and receive feedback on such reports.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="5.9.2."


><![CDATA[<p class="NormS5C9">This section provides information on vulnerability disclosure for all externally-facing agency systems, including public-facing systems.&nbsp; Vulnerability disclosure relating to internal systems is covered in <a title="Product security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="5.9.3."


><![CDATA[<p class="NormS5C9">When selecting which systems, applications and data are within scope of a VDP, agencies may consider:</p>
<ol style="list-style-type: lower-alpha;">
<li>The sensitivity of information on the agency’s systems, including financial data, medical information, proprietary information, customer data or other personal information.</li>
<li>Security safeguards that are already in place on the system, such as encryption of data at rest.</li>
<li>The agency’s ability to segment its network or otherwise segregate sensitive information stored on its systems.</li>
<li>Regulatory, contractual, privacy or other restrictions placed on disclosure of protected classes of information (such as within the New Zealand Classification System).</li>
</ol>]]></paragraph>
<paragraph
    title="5.9.4."


><![CDATA[<p class="NormS5C9">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="System certification and accreditation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>;</li>
<li><a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>;</li>
<li><a title="Vulnerability analysis" href="http://nzism.gcsb.govt.nz/ism-document#Section-13027">Section 6.2 - Vulnerability Analysis</a>;</li>
<li><a title="Change management" href="http://nzism.gcsb.govt.nz/ism-document#Section-13048">Section 6.3 - Change Management;</a></li>
<li><a title="Information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents;</a></li>
<li><a title="Product patching and updating" href="http://nzism.gcsb.govt.nz/ism-document#Section-14530">Section 12.4 – Product Patching and Updating</a>;</li>
<li><a title="Software security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15005">Chapter 14 - Software Security</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Agencies must expect vulnerabilities"><paragraph
    title="5.9.5."


><![CDATA[<p class="NormS5C9">Invariably all software, operating systems and applications have the potential to house exploitable vulnerabilities.  Many vulnerabilities are identified by users and other third parties. Some vulnerabilities may be undiscovered or inherent in the application or software.  Others may be introduced during upgrades, patches, configuration or other changes. </p>]]></paragraph>
<paragraph
    title="5.9.6."


><![CDATA[<p class="NormS5C9">It is essential that agencies establish a policy and processes to identify and remediate such vulnerabilities.</p>]]></paragraph>
</block>
<block title="Agencies must establish a vulnerability reporting mechanism"><paragraph
    title="5.9.7."


><![CDATA[<p class="NormS5C9">Published VDPs demonstrate that an agency has a mature and constructive approach when they receive a vulnerability report and also demonstrates openness and transparency in the management of agency systems.</p>]]></paragraph>
<paragraph
    title="5.9.8."


><![CDATA[<p class="NormS5C9">Agencies should establish a process to allow any user (whether a member of the public, business partners, other agencies or agency staff), to report potential vulnerabilities.&nbsp; Any such reporting is on a “no blame” basis, without fear of repercussion or penalty, provided the agency’s disclosure policy is followed and no illegal activity is undertaken.</p>]]></paragraph>
<paragraph
    title="5.9.9."


><![CDATA[<p class="NormS5C9">The VDP must clearly state the conditions under which reports are received.  In general terms this also includes a “no bug bounty” clause as well as limits on web site, system or application probing.</p>]]></paragraph>
<paragraph
    title="5.9.10."


><![CDATA[<p class="NormS5C9">An agency’s VDP will necessarily reflect that they may not control or own all of the software they use or the maintenance and development of underlying software (such as compilers, programming or scripting languages and so on).  The VDP should clearly state that while the agency can receive reports about software, systems or services run on their behalf by third parties, providers or vendors, they may have to work with the reporting party to report the vulnerability to the relevant vendor.</p>]]></paragraph>
<paragraph
    title="5.9.11."


><![CDATA[<p class="NormS5C9">Where specific legislation applies, for example a reported vulnerability may breach the Privacy Act, agencies must adhere to the legislation.  This may change how reports are managed and action communicated to the finder or reporter.  This does not change the requirement to maintain communication with the reporter/finder.</p>]]></paragraph>
</block>
<block title="Agencies are expected to find and remediate vulnerabilities"><paragraph
    title="5.9.12."


><![CDATA[<p class="NormS5C9">The Protective Security Requirements places clear expectations on agencies to maintain awareness of vulnerabilities (see <a title="PSR Mandatory requirements" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security#infosec4" target="_blank">mandatory requirement INFOSEC4</a>).</p>]]></paragraph>
<paragraph
    title="5.9.13."


><![CDATA[<p>The NZISM <a title="Product patching and updating" rel="noopener noreferrer" href="http://nzism.gcsb.govt.nz/ism-document#Section-14530" target="_blank">section 12.4 - Patching &amp; updating</a>&nbsp;sets out expectations and controls to ensure security patches are applied in a timely manner.</p>]]></paragraph>
<paragraph
    title="5.9.14."


><![CDATA[<p class="NormS5C9">The disclosure period commonly used by many vendors, manufacturers and government agencies is 90 days.  Vulnerabilities will be either patched, mitigated or managed within this period.  In some cases earlier notification is provided to allow users to take mitigating actions until a patch or other solution is available.</p>]]></paragraph>
<paragraph
    title="5.9.15."


><![CDATA[<p>VDPs are expected to include a timeframe within which patches will be applied or remedial action taken when a vulnerability is reported to the agency.</p>]]></paragraph>
</block>
<block title="Agencies to create a vulnerability reporting point"><paragraph
    title="5.9.16."


><![CDATA[<p class="NormS5C9">When security risks in agency services are discovered and reported to the agency, it is vital that a robust communication channel is available to receive the report.</p>]]></paragraph>
<paragraph
    title="5.9.17."


><![CDATA[<p>This is commonly described as a “security.txt”.  A draft standard has been published (see References below) to help agencies (and other organisations) outline a process for security researchers to securely report security vulnerabilities.</p>]]></paragraph>
</block>
<block title="Vulnerability disclosure policies are a normal part of learning about and patching vulnerabilities"><paragraph
    title="5.9.18."


><![CDATA[<p class="NormS5C9">Vulnerability disclosure (sometimes also referred to as responsible disclosure or coordinated vulnerability disclosure) is now an internationally accepted practice for technology organisations.  The practice of vulnerability disclosure in modern computing dates to the late 1980s.  There are related examples (non-computing) which appeared in the mid-1800s when locksmiths exchanged vulnerability information.</p>]]></paragraph>
</block>
<block title="Bug Bounties"><paragraph
    title="5.9.19."


><![CDATA[<p class="NormS5C9">“Bug bounties” are a monetary reward to security researchers for the discovery and reporting of software and other information system vulnerabilities to the agency.  Bug Bounties are separate to VDPs and should only be covered if the agency has a bug bounty programme in place.</p>]]></paragraph>
</block>
<block title="Vulnerability disclosure policy (VDP) Content"><paragraph
    title="5.9.20."


><![CDATA[<p class="NormS5C9">A VDP will typically include:</p><ul>
<li>A scoping statement setting out which systems the policy applies to (e.g. the agency’s website and other public-facing systems);</li>
<li>Details of how finders can contact the agency’s security team (including any public keys for encrypting reports);</li>
<li>Permitted activities;</li>
<li>Acknowledgement of reports and a response time (typically 60 or 90 days) for corrections, adjustments, or other “fixes”;</li>
<li>Reporters/finders agreeing to not share information about the vulnerability until the end of the disclosure period, to let the organisation fix the issues before it becomes public;</li>
<li>Illegal activities are not permitted (specifying any relevant legislation, such as the Crimes Act, the Privacy Act etc.); and</li>
<li>Either a statement that bug bounties will not be paid for any discoveries, or information about the agency’s bug bounty programme.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="5.9.21."


><![CDATA[<p class="NormS5C9">Additional information relating to system auditing is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;ISO 29147</strong></td>
<td>Information technology — Security techniques — Vulnerability disclosure</td>
<td style="text-align: center;">ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/72311.html" target="_blank">https://www.iso.org/standard/72311.html</a></td>
</tr>
<tr>
<td><strong>ISO 30111</strong></td>
<td>Information technology — Security techniques — Vulnerability handling processes</td>
<td style="text-align: center;">ISO</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/69725.html" target="_blank">https://www.iso.org/standard/69725.html</a></td>
</tr>
<tr>
<td><strong>IEFT draft protocol for Security.txt</strong></td>
<td>A File Format to Aid in Security Vulnerability Disclosure</td>
<td style="text-align: center;">ITEF</td>
<td><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/draft-foudil-securitytxt" target="_blank">https://datatracker.ietf.org/doc/draft-foudil-securitytxt</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>A proposed standard which allows websites to define security policies</td>
<td>
<p align="center">security.txt</p>
</td>
<td><a rel="noopener noreferrer" href="https://securitytxt.org/" target="_blank">https://securitytxt.org/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CERT NZ coordinated vulnerability disclosure policy</td>
<td style="text-align: center;">CERT NZ</td>
<td><a rel="noopener noreferrer" href="https://www.cert.govt.nz/it-specialists/guides/reporting-a-vulnerability/cert-nz-coordinated-vulnerability-disclosure-policy/" target="_blank">https://www.cert.govt.nz/it-specialists/guides/reporting-a-vulnerability/cert-nz-coordinated-vulnerability-disclosure-policy/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>NZITF Coordinated Disclosure guidelines</td>
<td style="text-align: center;">NZITF</td>
<td><a rel="noopener noreferrer" href="https://nzitf.org.nz/coordinated-disclosure" target="_blank">https://nzitf.org.nz/coordinated-disclosure</a></td>
</tr>
<tr>
<td>&nbsp;<strong>BOD 20-01</strong></td>
<td>Binding Operational Directive 20-01: Develop and Publish a Vulnerability Disclosure Policy</td>
<td style="text-align: center;">US Department of Homeland Security</td>
<td><a rel="noopener noreferrer" href="https://cyber.dhs.gov/bod/20-01/" target="_blank">https://cyber.dhs.gov/bod/20-01/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Vulnerability Disclosure Policy Template</span></td>
<td style="text-align: center;"><span>US Department of Homeland Security</span></td>
<td><a rel="noopener noreferrer" href="https://cyber.dhs.gov/bod/20-01/vdp-template/" target="_blank">https://cyber.dhs.gov/bod/20-01/vdp-template/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CISA announces new vulnerability disclosure policy (VDP) platform, July 2021</td>
<td style="text-align: center;">US Cybersecurity &amp; Infrastructure Security Agency</td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/blog/2021/07/29/cisa-announces-new-vulnerability-disclosure-policy-vdp-platform" target="_blank">https://www.cisa.gov/blog/2021/07/29/cisa-announces-new-vulnerability-disclosure-policy-vdp-platform</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CISA Coordinated Vulnerability Disclosure (CVD) Process</td>
<td style="text-align: center;">US Cybersecurity &amp; Infrastructure Security Agency</td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/coordinated-vulnerability-disclosure-process" target="_blank">https://www.cisa.gov/coordinated-vulnerability-disclosure-process</a></td>
</tr>
<tr>
<td><strong>List of US Federal agencies VDPs</strong></td>
<td>VDPs in the US Government's executive branch</td>
<td style="text-align: center;">CISA</td>
<td><a rel="noopener noreferrer" href="https://github.com/cisagov/vdp-in-fceb" target="_blank">https://github.com/cisagov/vdp-in-fceb</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>A Framework for a Vulnerability Disclosure Program for Online Systems1 Version 1.0 (July 2017)</td>
<td style="text-align: center;">Cybersecurity Unit Computer Crime &amp; Intellectual Property Section Criminal Division U.S. Department of Justice</td>
<td><a rel="noopener noreferrer" href="https://www.justice.gov/criminal-ccips/page/file/983996/download" target="_blank">https://www.justice.gov/criminal-ccips/page/file/983996/download</a><a href="https://github.com/cisagov/vdp-in-fceb"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability Disclosure Toolkit</td>
<td style="text-align: center;">&nbsp;NCSC UK</td>
<td><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/information/vulnerability-disclosure-toolkit" target="_blank">https://www.ncsc.gov.uk/information/vulnerability-disclosure-toolkit</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>See Something, Say Something - Coordinating the Disclosure of Security Vulnerabilities in Canada</td>
<td style="text-align: center;">Canada – Cybersecure policy exchange</td>
<td><a rel="noopener noreferrer" href="https://www.cybersecurepolicy.ca/vulnerability-disclosure" target="_blank">https://www.cybersecurepolicy.ca/vulnerability-disclosure</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability Disclosure Cheat Sheet</td>
<td style="text-align: center;">&nbsp;OWASP</td>
<td><a rel="noopener noreferrer" href="https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html" target="_blank">https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Responsible Disclosure Policy Example</td>
<td style="text-align: center;">Dutch National Cyber Security Centre (NCSC)</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://responsibledisclosure.nl/en/" target="_blank">https://responsibledisclosure.nl/en/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy&nbsp;</td>
<td style="text-align: center;">Incibe Cert (Spain)</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.incibe-cert.es/en/what-is-incibe-cert/vulnerability-disclosure-policy" target="_blank">https://www.incibe-cert.es/en/what-is-incibe-cert/vulnerability-disclosure-policy</a> &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy</td>
<td style="text-align: center;">Office of the Privacy Commissioner New Zealand</td>
<td>https://www.privacy.org.nz/assets/New-order/About-us/Transparency-and-accountability-/Vulnerability-Disclosure-Policy-December-2015.pdf</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Responsible disclosure guidelines</td>
<td style="text-align: center;">NZ – The Ministry of Social Development</td>
<td><a rel="noopener noreferrer" href="https://www.msd.govt.nz/about-msd-and-our-work/tools/responsible-disclosure-guidelines.html" target="_blank">https://www.msd.govt.nz/about-msd-and-our-work/tools/responsible-disclosure-guidelines.html</a><a href="https://www.privacy.org.nz/assets/New-order/About-us/Transparency-and-accountability-/Vulnerability-Disclosure-Policy-December-2015.pdf"></a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Ministry of Health Responsible disclosure guidelines</td>
<td style="text-align: center;">NZ – Ministry of Health</td>
<td><a rel="noopener noreferrer" href="https://www.health.govt.nz/our-work/digital-health/digital-health-sector-architecture-standards-and-governance/responsible-disclosure-guidelines" target="_blank">https://www.health.govt.nz/our-work/digital-health/digital-health-sector-architecture-standards-and-governance/responsible-disclosure-guidelines</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy</td>
<td style="text-align: center;">Bank of England</td>
<td><a rel="noopener noreferrer" href="https://www.bankofengland.co.uk/vulnerability-disclosure-policy&nbsp;&nbsp;" target="_blank">https://www.bankofengland.co.uk/vulnerability-disclosure-policy&nbsp;&nbsp;</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability disclosure policy</td>
<td style="text-align: center;">Crown Commercial Service (UK)</td>
<td><a rel="noopener noreferrer" href="https://www.crowncommercial.gov.uk/about-ccs/vulnerability-disclosure-policy/" target="_blank">https://www.crowncommercial.gov.uk/about-ccs/vulnerability-disclosure-policy/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Vulnerability Disclosure Policy</td>
<td style="text-align: center;">Met Office (UK)</td>
<td><a rel="noopener noreferrer" href="https://www.metoffice.gov.uk/about-us/legal/vulnerability-disclosure-policy" target="_blank">https://www.metoffice.gov.uk/about-us/legal/vulnerability-disclosure-policy</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>History of Vulnerability Disclosure, 3 August 2015</td>
<td style="text-align: center;">Duo</td>
<td><a rel="noopener noreferrer" href="https://duo.com/labs/research/history-of-vulnerability-disclosure" target="_blank">https://duo.com/labs/research/history-of-vulnerability-disclosure</a></td>
</tr>
</tbody>
</table><p class="NormS5C9">&nbsp;</p><p class="NormS5C9">&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="5.9.22."


><![CDATA[<p class="NormS5C9">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR Mandatory Requirements</strong></td>
<td>GOV3, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</td>
<td>
<p><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz" target="_blank">Home | Protective Security Requirements<br></a></p>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title=" Vulnerability disclosure policy (VDP) Risk Assessment"><paragraph
    title="5.9.23.R.01."

    tags="Governance,Information Security Documentation,Risk Assessment"


><![CDATA[<p class="NormS5C7b">Selection of public-facing systems and services included in any VDP will be based on a risk assessment undertaken by the agency. Considerations for such selection are discussed in the Context section above.</p>]]></paragraph>
<paragraph
    title="5.9.23.C.01."

    tags="Governance,Information Security Documentation,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="7130"
><![CDATA[<p class="Normal-nonumbering">An agency MUST undertake a risk assessment to determine which systems and services to include in the agency’s VDP.</p>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Essential Content"><paragraph
    title="5.9.24.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>In order to demonstrate a mature and constructive approach to vulnerability discovery, management and remediation, an agency requires a VDP to inform the public about:</p><ul>
<li>the scope of public-facing systems covered by its VDP; and</li>
<li>the nature of vulnerabilities which can be reported under its VDP.</li>
</ul>]]></paragraph>
<paragraph
    title="5.9.24.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p>To aid consistency, it is important that government agencies have a core set of content in their VDP.</p>]]></paragraph>
<paragraph
    title="5.9.24.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7133"
><![CDATA[<p class="Normal-nonumbering">An agency MUST develop and publish a VDP.</p>]]></paragraph>
<paragraph
    title="5.9.24.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7134"
><![CDATA[<p>An agency’s VDP MUST contain at least the following core content:</p><ul>
<li>A scoping statement listing the systems the policy applies to;</li>
<li>Contact details;</li>
<li>Secure communication options (including any public keys);</li>
<li>Information the finder should include in the report;</li>
<li>Acknowledgement of reports and a response time;</li>
<li>Guidance on what forms of vulnerability testing are out of scope for reporters/finders (permitted activities);</li>
<li>Reporters/finders agreeing to not share information about the vulnerability until the end of the disclosure period, in order to allow the agency to address any issues before they become public;</li>
<li>Illegal activities are not permitted (specifying the relevant legislation, such as the Crimes Act); and</li>
<li>Either that “Bug bounties” will not be paid for any discoveries, or it should provide information about the agency’s bug bounty programme.</li>
</ul>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Additional Content"><paragraph
    title="5.9.25.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="NormS5C7b">As well as mandatory content listed above, additional information that agencies may consider providing includes guidance for reporters/finders to locate the agency’s policy and how to confidentially communicate technical details to the agency’s security experts.</p>]]></paragraph>
<paragraph
    title="5.9.25.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="7136"
><![CDATA[<p class="NormS5C9">An agency SHOULD publish a security.txt to permit secure communications and direct any reports to a specific agency resource, in accordance with the agency’s VDP.</p>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Setting Expectations"><paragraph
    title="5.9.26.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="NormS5C7b">Agencies must set clear expectations for reporters/finders on the timeframe within which agencies intend to address and remediate vulnerabilities that have been reported to them.  The industry standard for a vulnerability disclosure policy is 90 days.</p>]]></paragraph>
<paragraph
    title="5.9.26.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7138"
><![CDATA[<p class="Normal-nonumbering">An agency MUST commit to addressing disclosed vulnerabilities within the timeframe it sets in its policy.</p>]]></paragraph>
<paragraph
    title="5.9.26.C.02."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Should"
    cid="7139"
><![CDATA[<p class="Normal-nonumbering">An agency’s vulnerability disclosure timeframe SHOULD be set to no more than 90 days.</p>]]></paragraph>
</block>
<block title=" Vulnerability disclosure policy (VDP) Integration"><paragraph
    title="5.9.27.R.01."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="NormS5C7b">It is essential that a VDP is integrated and consistent with an agency’s information security documentation and its policies, processes and procedures for Incident Management, Product Security and Software Security (Chapters 5, 7, 12, 14).</p>]]></paragraph>
<paragraph
    title="5.9.27.C.01."

    tags="Governance,Information Security Documentation"


    classification="All Classifications"
    compliance="Must"
    cid="7141"
><![CDATA[<p class="NormS5C9">Agencies MUST ensure they integrate their VDP with other elements of their information security policies.</p>]]></paragraph>
</block>
</subsection>
</section>
