Region
Requirement
Policy
Recommendation of the Council on the Treatment of Digital Security Vulnerabilities (OECD/LEGAL/0482)
Applies to
Signatory countries
Provision
N/A
Description

The purpose of this Recommendation is to provide guidance on how to implement the Digital Security Recommendation to develop public policies to foster vulnerability treatment in order to reduce digital security risk, thereby strengthening trust and supporting digital transformation.

Date
September 25, 2022
Organization
Organization for Economic Co-operation and Development (OECD)
Region
Requirement
Policy
Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure
Applies to
Vendors
Provision
N/A
Description
Provides "Guiding Concepts and Best Current Practices" related to multi-lateral coordination on CVDs: 1. Establish a strong foundation of processes and relationships 2. Maintain clear and consistent communications 3. Build and maintain trust 4. Minimize exposure for stakeholders 5. Respond quickly to early disclosure 6. Use coordinators when appropriate 
Date
Spring 2020
Organization
FIRST - Forum of Incident Response and Security Teams
Region
Requirement
Policy
The CERT® Guide to Coordinated Vulnerability Disclosure
Applies to
All Organizations
Provision
N/A
Description
Provides a summary of CVD. The document includes 7 core sections: 1. Principles of Coordinated Vulnerability Disclosure 2. Roles in CVD 3. Phase of CVD 4. Process Variation Points 5. Troubleshooting CVD 6. Operational Considerations 7. Open Problems in CVD 
Date
August 2017
Organization
Carnegie Mellon University Software Engineering Institute
Region
Requirement
Policy
GFCE Global Good Practices Coordinated Vulnerability Disclosure (CVD)
Applies to
Political leadership/policymakers, manufacturers/vendors, users, reporters, legal professionals, and national CSIRTs
Provision
N/A
Description
Provides CVD best practices for political leadership/policymakers, manufacturers/vendors, users, reporters, legal professionals, and national CSIRTs. It also explains 8 key challenges, including conflicts between involved stakeholders; failure to patch after disclosure; and sale of zero-day vulnerabilities. 
Date
2017
Organization
Global Forum on Cyber Expertise
Region
Requirement
Policy
Decision No. 1202 - OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies
Applies to
OSCE Member States
Provision
CBM 16
Description
Participating States will, on a voluntary basis, encourage responsible reporting of vulnerabilities affecting the security of and in the use of ICTs and share associated information on available remedies to such vulnerabilities, including with relevant segments of the ICT business and industry, with the goal of increasing co-operation and transparency within the OSCE region. OSCE participating States agree that such information exchange, when occurring between States, should use appropriately authorized and protected communication channels, including the contact points designated in line with CBM 8 of Permanent Council Decision No. 1106, with a view to avoiding duplication.
Date
March 2016
Organization
Organization for Security and Co-operation in Europe (OSCE)
Region
Requirement
Policy
Payment Card Industry Data Security Standard (PCI-DSS) 4.0
Applies to
Organizations that use or facilitate payments with major credit card issuers
Provision
6.3.1
Description

Section 6.3 - Security vulnerabilities are identified and addressed. 

In the 'defined approach requirements', PCI urges organizations to identify vulnerabilities "using industry-recognized sources for security vulnerability information, including alerts from international and national computer emergency response teams (CERTs). Although Section 6.3 does not make a broad recommendation for covered entities to have CVD/VDPs, it comes close in its guidance for in-house developed software. Specifically, it states "For control over in-house developed software, the organization may receive such information from external sources. The organization can consider using a “bug bounty” program where it posts information (for example, on its website) so third parties can contact the organization with vulnerability information. External sources may include independent investigators or companies that report to the organization about identified vulnerabilities and may include sources such as the Common Vulnerability Scoring System (CVSS) or the OWASP Risk Rating Methodology."

Date
March 2022
Organization
Payment Card Industry Security Standards Council (PCI-SSC)
Region
Requirement
Policy
ETSI 303 645
Applies to
Manufacturers
Provision
Provision 5.2-1
Description

The manufacturer shall make a vulnerability disclosure policy publicly available. This policy shall include, at a minimum: 

• contact information for the reporting of issues; and 

• information on timelines for: 1) initial acknowledgement of receipt; and 2) status updates until the resolution of the reported issues.

Date
June 2020
Organization
ETSI - European Telecommunications Standards Institute
Region
Requirement
Policy
ESTI TR 103 838, Cyber Security; Guide to Coordinated Vulnerability Disclosure
Applies to
Companies and organizations
Provision
N/A
Description

Provides guidance regarding the "essential steps" companies should take when deciding to implement a VDP. ESTI explicitly states that the document is not intended to a 'comprehensive' guide.

Date
January 2022
Organization
ETSI - European Telecommunications Standards Institute
Jurisdiction
Region
Requirement
Policy
Responsible Vulnerability Disclosure Policy
Applies to
System Owners
Provision
Responsible Disclosure Guidelines
Description

Recommends and outlines best practices for "Informers" and "System Owners". The policy also explains in which cases SingCERT can/cannot act as a conduit between Informers and System Owners. Broadly speaking, "SingCERT supports RVD as a means of fostering cooperation between System Owner(s) and the wider cybersecurity community, so as to improve cybersecurity and build a trusted and resilient cyberspace."

"System Owners are encouraged to develop their own vulnerability disclosure policies setting out how vulnerability reports will be received and handled, what the reports should contain, approaches for disclosure to affected users and the public, as well as any rewards policies." They are also encouraged to keep open contact with the former to take in more information and to update SingCERT and the Informer of its assessments. 

If the Informer cannot reach the System Owner for some reason, SingCERT can act as a liaison between the two. For this process, that informer would report the vulnerability to SingCERT via email. 
 

Version 2.0 of this manual was released in October 2024.

Date
October 2024
Organization
Cyber Security Agency of Singapore / SingCERT