<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Security Compliance</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>HackerOne Now Licensed for Penetration Testing in Singapore</title>
  <link>https://www.hackerone.com/blog/hackerone-now-licensed-penetration-testing-singapore</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">HackerOne Now Licensed for Penetration Testing in Singapore</span>
    



    
        H1 Team
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>joseph@hackerone.com</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 03/03/2025 - 11:19
</span>

            
  
      
  
    Image
                



          

  

      
            March 3rd, 2025

      
            <p dir="ltr"><span>Cyber threats don’t wait, and neither should your security strategy. Organizations across Singapore are facing growing regulatory demands and increasingly sophisticated cyber risks. The best defense? A proactive approach that uncovers vulnerabilities before attackers do.</span><br><br><span>That’s why we’re excited to announce that HackerOne is now officially licensed to provide penetration testing services in Singapore. With this new certification from the&nbsp;</span><a href="https://www.csro.gov.sg/resources/licensed-service-providers/"><span>Cybersecurity Services Regulation Office</span></a><span>, we can now bring our modern, scalable&nbsp;</span><a href="https://www.hackerone.com/product/pentest"><span>Pentest as a Service (PTaaS) solution</span></a><span> to businesses across the region—helping you strengthen security, meet compliance requirements, and stay ahead of cyber threats.</span></p><p dir="ltr"><span>Unlike traditional pentesting providers, we don’t just hand you a static report and walk away. Our agile, expert-driven approach gives you real-time collaboration, faster results, and deeper insights—so you can turn security gaps into strengths before attackers exploit them.</span></p><p dir="ltr"><span>Ready to rethink penetration testing? Here’s what this means for you.</span></p><h2 dir="ltr"><span><strong>Why This Matters for Organizations in Singapore</strong></span></h2><p dir="ltr"><span>Cybersecurity threats are increasing in complexity, and regulatory requirements are becoming stricter. Organizations in Singapore—particularly those handling sensitive data—should conduct penetration testing in line with laws, standards, and frameworks like:</span></p><ul><li dir="ltr"><span>Monetary Authority of Singapore (MAS) TRM Guidelines</span></li><li dir="ltr"><span>Personal Data Protection Act (PDPA)</span></li><li dir="ltr"><span>PCI DSS </span></li><li dir="ltr"><span>NIST Cybersecurity Framework</span></li><li dir="ltr"><span>Cybersecurity Act of Singapore</span></li><li dir="ltr"><span>ISO 27001, SOC 2, and other international security standards</span></li></ul><p dir="ltr"><span>With our newly-approved penetration testing services, businesses can now proactively identify vulnerabilities, strengthen security postures, and align with local and global regulations.</span></p><h2 dir="ltr"><span><strong>Modern, Scalable Pentesting for APAC</strong></span></h2><p dir="ltr"><span>HackerOne’s Pentest as a Service (PTaaS) model modernizes the traditional penetration testing process, offering a faster, more flexible, and outcome-driven approach. Instead of rigid, slow-moving engagements, our platform allows you to:</span></p><ul><li dir="ltr"><span>Launch pentests in days, not weeks</span></li><li dir="ltr"><span>Access a vetted global community of security experts with deep industry knowledge</span></li><li dir="ltr"><span>Collaborate in real-time to address findings and strengthen security</span></li><li dir="ltr"><span>Meet compliance mandates while focusing on meaningful risk reduction</span></li></ul><p dir="ltr"><span>Unlike traditional consultancy-based pentests, HackerOne PTaaS integrates seamlessly into your security workflow, ensuring continuous security improvement rather than a one-time report.</span></p><h2 dir="ltr"><span><strong>What Sets HackerOne’s Pentesting Apart?</strong></span></h2><p dir="ltr"><span>HackerOne delivers elite penetration testing services backed by industry-leading expertise and technology. Our approach is designed for speed, accuracy, and business-aligned security outcomes.</span></p><ul><li dir="ltr"><span><strong>Speed</strong>: Start your pentest in 4-7 business days</span></li><li dir="ltr"><span><strong>Vetted Experts</strong>: 75% of our testers have 5+ years of experience</span></li><li dir="ltr"><span><strong>High-Impact Results</strong>: 19% of findings are critical or high severity, twice the industry average</span></li><li dir="ltr"><span><strong>AI-Powered Insights</strong>: Our AI Copilot (Hai) helps interpret complex reports and suggests remediation steps</span></li><li dir="ltr"><span><strong>Seamless Integrations</strong>: Works with Jira, GitHub, ServiceNow, Slack, and more for streamlined remediation</span></li></ul><p dir="ltr"><span>With a licensed and highly specialized security testing team, HackerOne ensures that your organization stays ahead of attackers, meets compliance requirements, and builds a more resilient security posture.</span></p><h2 dir="ltr"><span><strong>Next Steps: How to Get Started</strong></span></h2><p dir="ltr"><span>Now that HackerOne is a licensed penetration testing provider in Singapore, organizations in the region can start securing their systems with our expert-led pentesting services.</span></p><p dir="ltr"><span><strong>Interested in pentesting?</strong></span><a href="https://www.hackerone.com/product/pentest#form"><span> Contact us today</span></a><span> to discuss your security needs.</span><br><span><strong>Want to learn more?</strong> Explore our</span><a href="https://hackerone.drift.click/Pentest"><span> Pentest Solution Brief</span></a><span> for detailed insights into our methodology and coverage areas.&nbsp;</span></p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/news-updates" hreflang="en">News &amp; Updates</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
    
]]></description>
  <pubDate>Mon, 03 Mar 2025 17:19:19 +0000</pubDate>
    <dc:creator>joseph@hackerone.com</dc:creator>
    <guid isPermaLink="false">5568 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>The UK’s AI Cyber Security Code of Practice: What It Means for Your Business</title>
  <link>https://www.hackerone.com/blog/uks-ai-cyber-security-code-practice</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">The UK’s AI Cyber Security Code of Practice: What It Means for Your Business</span>
    



    
        Vanessa Booth
        
            Policy Analyst
      
    


    



    
        Michael Woolslayer
        
            Policy Counsel
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>joseph@hackerone.com</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 02/27/2025 - 14:24
</span>

            
  
      
  
    Image
                



          

  

      
            February 27th, 2025

      
            <p>The Code establishes baseline cybersecurity requirements across the AI lifecycle and is expected to inform changes to international standards through the European Telecommunications Standards Institute (ETSI). To assist organizations in applying its principles, the government has also released an&nbsp;<a href="https://assets.publishing.service.gov.uk/media/679cae441d14e76535afb630/Implementation_Guide_for_the_AI_Cyber_Security_Code_of_Practice.pdf">Implementation Guide</a>, which expands on specific security measures.&nbsp;</p><p>HackerOne offered input during the development of this Code, emphasizing the importance of independent security testing, AI red teaming, and vulnerability disclosure programs (VDPs).&nbsp;<a href="https://www.hackerone.com/sites/default/files/2024-09/UK%20Call%20for%20Views%20on%20the%20Cyber%20Security%20of%20AI%20Comments.pdf">&nbsp;HackerOne’s recommendations</a>, submitted during DSIT’s Call for Views on AI Cybersecurity, highlighted the need for external validation, proactive security testing, and structured vulnerability reporting mechanisms to improve AI security.&nbsp;&nbsp;</p><p><strong>Who is the Code for?</strong></p><p>The Code applies to developers, system operators, and data custodians involved in the creation, deployment, and management of AI systems. It sets out security measures covering&nbsp;<a href="https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai#scope:~:text=secure%20design%2C%20secure%20development%2C%20secure%20deployment%2C%20secure%20maintenance%20and%20secure%20end%20of%20life.">five key phases</a>: secure design, secure development, secure deployment, secure maintenance, and secure end of life. AI vendors who solely sell models or components without direct involvement in their implementation are not directly in scope but remain subject to other relevant cybersecurity standards. &nbsp;</p><p><strong>How can organizations align with the Code?</strong></p><p>The Code&nbsp;<a href="https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai#scope:~:text=to%20do%20something-,Structure%20of%20the%20voluntary%20Code%20of%20Practice,-Principle%201%3A%20Raise">introduces 13 principles</a> to safeguard AI from cyber threats, including data poisoning, adversarial attacks, and model exploitation. Organizations that choose to follow the Code need to integrate AI security into system design, assess risks throughout the AI lifecycle, and maintain transparency with end-users. Key provisions include:&nbsp;</p><ul><li>Ensuring AI security awareness among employees and stakeholders.</li><li>Implementing supply chain security measures to prevent vulnerabilities in AI models.</li><li>Conducting adversarial testing to proactively detect security weaknesses.</li><li>Providing timely security updates and clear communication to end-users.&nbsp;</li></ul><p><strong>How does the Code address Independent Security Testing and Disclosure for AI?</strong></p><p>A key focus of the Code is the requirement for independent security validation systems. Developers&nbsp;<a href="https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai#scope:~:text=2023%2C%20G7%202023%5D-,9.1,-Developers%20shall%20ensure">must ensure AI models</a> undergo security testing before deployment, and the Code stresses the importance of&nbsp;<a href="https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai#scope:~:text=support%20from%20Developers.-,9.2.1,-For%20security%20testing">involving independent security testers</a> with expertise in AI-specific risks.</p><p>Additionally, the Code&nbsp;<a href="https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai#scope:~:text=publicly%20available%20data.-,6.4,-Developers%20and%20System">mandates the creation and maintenance of a Vulnerability Disclosure Program (VDP)</a> for AI systems. This program is vital for enhancing transparency, allowing security flaws to be responsibly reported and mitigated.&nbsp;</p><p><a href="https://assets.publishing.service.gov.uk/media/679cae441d14e76535afb630/Implementation_Guide_for_the_AI_Cyber_Security_Code_of_Practice.pdf">The Implementation Guide</a> further clarifies these expectations, emphasizing proactive security practices such as red teaming and adversarial testing. These techniques are essential for detecting vulnerabilities before they can be exploited, and the Guide offers practical steps to integrate these evaluations into the AI lifecycle. By following both the Code and the Implementation Guide, organizations can ensure a comprehensive, proactive approach to AI security – focusing on external validation, transparency, and ongoing testing to safeguard systems at every stage.&nbsp;</p><p><strong>What’s the likely impact?</strong></p><p>The Code signals a shift toward stronger regulatory expectations for AI security. As cyber threats targeting AI continue to evolve, organizations that adopt these security principles will be better positioned to comply with future standards and regulations, protect their users, and build trust in AI technologies.&nbsp;</p><p>The UK government has&nbsp;<a href="https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai#:~:text=The%20UK%20government%20plan%20to%20submit%20the%20Code%20and%20Implementation%20Guide%20in%20ETSI%20so%20that%20the%20future%20standard%20is%20accompanied%20by%20a%20guide.%20The%20government%20will%20update%20the%20content%20of%20the%20Code%20and%20Guide%20to%20mirror%20the%20future%20ETSI%20global%20standard%20and%20guide.%C2%A0%C2%A0">stated</a> its intention for this Code to serve as the foundation for future ETSI standards, ensuring a unified and internationally recognized approach to AI cybersecurity. The government also plans to update the Code and the Guide to mirror the future ETSI global standard, reinforcing the alignment with international best practices.&nbsp;</p><p><strong>How HackerOne can help:</strong></p><p>Organizations navigating AI security challenges need robust testing and vulnerability management solutions. HackerOne helps organizations align with the Code’s security requirements through:&nbsp;</p><ul><li>Independent AI security assessments that align with Principles 9.1 and 9.2.1.</li><li>Vulnerability Disclosure Programs (VDPs) to help meet Principle 6.4.</li><li>Red teaming and adversarial testing to identify weaknesses before they can be exploited as mentioned in the Implementation Guide, sections 9.2, 9.2.1, and 11.2.&nbsp;</li></ul><p><a href="https://www.hackerone.com/contact">Contact HackerOne to learn more about securing your AI systems.&nbsp;</a></p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/public-policy" hreflang="en">Public Policy</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/ai-safety-security" hreflang="en">AI Safety &amp; Security</a>
        
    

            <p>On January 31, 2025, the UK government published its&nbsp;<a href="https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai">AI Cyber Security Code of Practice</a>, a voluntary framework aimed at mitigating security risks in AI systems.&nbsp;</p>
      ]]></description>
  <pubDate>Thu, 27 Feb 2025 20:24:55 +0000</pubDate>
    <dc:creator>joseph@hackerone.com</dc:creator>
    <guid isPermaLink="false">5561 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>DORA Compliance Is Here: What Financial Entities Should Know</title>
  <link>https://www.hackerone.com/blog/dora-compliance-here-what-financial-entities-should-know</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">DORA Compliance Is Here: What Financial Entities Should Know</span>
    



    
        Michael Woolslayer
        
            Policy Counsel
      
    


    



    
        Vanessa Booth
        
            Policy Analyst
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 02/03/2025 - 08:45
</span>

            
  
      
  
    Image
                



          

  

      
            January 31st, 2025

      
            <h2>What Does DORA Regulate?</h2><p><a href="https://www.hackerone.com/blog/dora-what-you-need-know">DORA applies</a> to a wide range of financial entities operating in the EU, including banks, insurers, investment firms, and payment institutions, along with critical third-party service providers such as cloud and data providers. Essentially, any organization that provides key infrastructure for financial services will be required to comply with some or all of DORA’s operational resilience standards.</p><h2>What Does DORA Aim to Achieve?</h2><p>DORA’s primary goal is to enhance the digital resilience of the EU’s financial sector by ensuring that firms are well-prepared to handle and recover from Information and Communication Technology (ICT) disruptions. The regulation establishes a framework for cybersecurity and operational risk management across financial institutions, focusing on reducing the potential impact of cyber threats and system failures.</p><h2>What Are DORA’s Security Requirements?</h2><p>DORA mandates several key cybersecurity and operational resilience requirements for financial entities:</p><ol><li><strong>Risk Management Framework: </strong>Firms must implement comprehensive risk management practices to identify, assess, and mitigate ICT risks.</li><li><strong>Third-Party Risk Management: </strong>Financial entities must ensure third-party service providers adhere to DORA’s security standards, including implementing particular contractual terms and conducting ongoing monitoring and due diligence.</li><li><strong>Digital Resilience Testing: </strong>Firms are required to perform stress tests and regular pentests, in addition to threat-led penetration tests (TLPT) at least every 3 years, based on <a href="https://www.esma.europa.eu/sites/default/files/2024-07/JC_2024-29_-_Final_report_DORA_RTS_on_TLPT.pdf">Regulatory Technical Standards (RTS)</a> for TLPT expected to be adopted by the European Commission in early 2025.</li><li><strong>Incident Reporting: </strong>DORA mandates a clear process for reporting major ICT-related incidents to regulators within specified timeframes.</li><li><strong>Information Sharing: </strong>The regulation does not require but encourages entities to share cyber threat intelligence to bolster collective cyber security efforts across the financial sector.</li></ol><h2>How Does a Covered Financial Entity Demonstrate Compliance– and What Happens if it Doesn’t Comply?</h2><p>Covered entities must ensure they meet DORA’s security standards by implementing appropriate risk management practices, third party oversight, and resilience testing. While fines or criminal sanctions are not included in the DORA regulation, individual EU Member States can institute penalties and criminal sanctions in their national laws. These may include fines of up to 2% of an entity’s total annual worldwide revenues or up to 1 million euros and even steeper penalties of up to 5 million for critical third-party ICT providers. Entities must also submit detailed reports outlining their efforts to manage ICT risks, test their resilience, and respond to cyber incidents.</p><h2>When Do These Requirements Take Effect?</h2><p>DORA entered into force on January 16, 2023, and the full compliance deadline was January 17, 2025.</p><h2>What's the Likely Impact of These New Requirements?</h2><p>DORA’s implementation will likely enhance the overall security posture of the EU financial sector by requiring financial entities to adopt stronger risk management frameworks and resilience practices. The regulation will also increase transparency, as firms must disclose to competent authorities information about their cybersecurity measures and third-party relationships. Overall, DORA aims to ensure that financial institutions are better prepared to handle emerging cyber threats, ultimately protecting consumers and the financial system as a whole.</p><h2>We Might Be Subject to These New Requirements—What Should We Do?</h2><p>With the January 17, 2025 deadline already passed, financial entities should review their existing cyber security policies and practices to ensure they meet DORA’s requirements.</p><p>HackerOne offers a comprehensive suite of security solutions designed to help financial services organizations meet DORA compliance requirements. Our portfolio includes <a href="https://www.hackerone.com/blog/crest-and-pentesting-what-you-need-know">CREST-accredited</a> Pentest as a Service (PTaaS), Code Security Audits, Bug Bounty programs, and Spot Checks. This integrated approach aligns with DORA's mandates for regular and comprehensive ICT risk assessment and management, as outlined in <a href="https://www.digital-operational-resilience-act.com/Article_24.html">Articles 24</a> and <a href="https://www.digital-operational-resilience-act.com/Article_25.html">25</a>.</p><p><a href="https://www.hackerone.com/contact">Contact HackerOne to learn more.</a></p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/public-policy" hreflang="en">Public Policy</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/best-practices" hreflang="en">Best Practices</a>
        
    

            <p>The <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022R2554&amp;from=FR" target="_blank">Digital Operational Resilience Act (DORA)</a>, which came into force in the European Union on January 17, 2025, establishes comprehensive requirements for the financial sector to strengthen its resilience to ICT-related disruptions, including cyberattacks and technical failures.</p>
      ]]></description>
  <pubDate>Mon, 03 Feb 2025 14:45:04 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5472 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>What Will a New Administration and Congress Mean for Cybersecurity and AI Regulation?</title>
  <link>https://www.hackerone.com/blog/what-will-new-administration-and-congress-mean-cybersecurity-and-ai-regulation</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">What Will a New Administration and Congress Mean for Cybersecurity and AI Regulation?</span>
    



    
        Ilona Cohen
        
            Chief Legal and Policy Officer
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 01/28/2025 - 08:23
</span>

            
  
      
  
    Image
                



          

  

      
            January 28th, 2025

      
            <p dir="ltr">Much attention has been paid to the incoming administration’s stated intentions to roll back regulations, as well as their criticism of certain cybersecurity and artificial intelligence (AI) policies adopted by the Biden administration. A more comprehensive review of policy statements and past actions suggests that the Trump administration will support strong cybersecurity defenses and best practices as well as practices that encourage the responsible and trustworthy development and adoption of AI.</p><h2>The First Months</h2><p dir="ltr">The new administration immediately put a hold on pending regulations, as is typical. In<a href="https://trumpwhitehouse.archives.gov/presidential-actions/memorandum-heads-executive-departments-agencies/">&nbsp;the first Trump administration</a> and the<a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/01/20/regulatory-freeze-pending-review/">&nbsp;Biden administration</a>, the new White House Chief of Staff issued on Inauguration Day a memo to the heads of executive departments and agencies to immediately freeze any new or pending regulations to allow review by the new administration. The Trump administration also released a large number of executive orders on his first day of office, though only one addressed AI or cybersecurity in a material way (see below).</p><p dir="ltr">We expect that many members of Congress will reintroduce cybersecurity and AI legislation from the previous session, and new legislation on these hot issues will be introduced for the first time.&nbsp;</p><p dir="ltr">Based on precedent, it is possible that Congress will use the Congressional Review Act to reject regulations that have already been enacted by federal agencies. The law, enacted in 1996, has only been used to overturn a total of 20 rules, with 16 of those actions taking place early in the first Trump administration with a Republican majority in both chambers of Congress. To take effect, the Congressional Review Act requires Congress to introduce a joint resolution within 60 Congressional session days of its receipt of the regulation, so only relatively recent regulations are subject to the law.</p><h2>Cybersecurity Policy and Regulations</h2><h4>CISA</h4><p dir="ltr">Republican lawmakers and incoming administration officials have criticized the Cybersecurity and Infrastructure Security Agency (CISA). However, these criticisms against CISA are largely not related to cybersecurity, but rather for perceived expansion beyond its core mission of protecting federal and critical infrastructure to address issues such as disinformation. The Republican Party Platform emphasized a commitment to “use all tools of National Power to protect our Nation's Critical Infrastructure and Industrial Base from malicious cyber actors. This will be a National Priority, and we will both raise the Security Standards for our Critical Systems and Networks and defend them against bad actors.” We expect the new administration to refocus CISA on cyber protection and scale back or defund disinformation initiatives, but not to dismantle CISA.</p><h4>CIRCIA&nbsp;</h4><p dir="ltr">CISA is finalizing regulations to implement the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), enacted in 2022. The proposed rule requires a wide range of businesses in critical infrastructure sectors to report covered cyber incidents and ransomware payments to CISA. Many of the public comments, including those submitted by members of Congress that had sponsored the original legislation, argued that the draft regulations went beyond the intention of Congress by applying the rule to too many entities, requiring too many cyber incidents to be reported, and not providing enough reciprocity with similar cyber incident reporting regulations. Expect members of Congress to closely review and scrutinize the nature and scope of the final regulations.</p><h4>Cybersecurity Executive Orders</h4><p dir="ltr">The Biden administration released its second&nbsp;<a href="https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurity">executive order</a> on cybersecurity in his final week in office. The order focused on improving the United States’ defenses against the escalating threats from foreign adversaries, particularly the People’s Republic of China (PRC).&nbsp;</p><p dir="ltr">The new administration will certainly review all executive orders issued by the prior administration and consider whether to repeal them entirely, repeal them and replace them with their own executive order, or take no action. Given the scope of the order and the new administration’s focus on cyber defense and countering the malicious activities of national adversaries, particularly China, a full repeal without replacement in the short term may be unlikely. It is worth recalling the Trump administration<a href="https://trumpwhitehouse.archives.gov/presidential-actions/executive-order-taking-additional-steps-address-national-emergency-respect-significant-malicious-cyber-enabled-activities/">&nbsp;issued</a> its own executive order on cybersecurity in its last day in office, which the Biden administration did not repeal.</p><h4>Coordinated Vulnerability Disclosure Practices</h4><p dir="ltr">Coordinated vulnerability disclosure practices, including the implementation of Vulnerability Disclosure Policies and the use of bug bounties by federal agencies have been supported by both the Trump and Biden administrations, are well established in federal agencies, and are unlikely to be rolled back. Russell Vought, who has been nominated to return to his prior role as Director of the Office of Management and Budget, directed federal agencies to implement such programs in a 2020<a href="https://www.whitehouse.gov/wp-content/uploads/2020/09/M-20-32.pdf">&nbsp;memo</a>. These practices also enjoy bipartisan support in Congress, which is<a href="https://www.hackerone.com/press-release/hackerone-applauds-senate-committee-homeland-security-and-government-affairs-approval">&nbsp;actively working</a> to pass legislation to require the adoption of Vulnerability Disclosure Policies by federal contractors.</p><h2>Artificial Intelligence</h2><p dir="ltr">Both President Trump and President Biden issued executive orders related to AI. President Biden’s order directed over 50 federal entities to take more than 100 specific actions to implement its guidance in areas including safety and security, consumer protection, worker support, and consideration of AI bias and civil rights. Proposed rules resulting from the order include those proposed by the Department of Commerce that would require mandatory reporting to the federal government by leading AI developers and cloud providers. Republicans raised concerns about the order’s<a href="https://www.politico.com/news/2024/01/25/conservatives-prepare-attack-on-bidens-ai-order-00137935"> reliance</a> on the 1950 Defense Production Act for its authority to require such disclosures, as well as the order’s impact on free speech, innovation, and focus on addressing&nbsp;<a href="https://fedscoop.com/eyebrow-raising-ai-amendment-passes-senate-commerce-committee/">bias and discrimination</a>. The Trump administration repealed President Biden’s executive order on AI on its first day in office, honoring a commitment made during the campaign. In doing so, he&nbsp;<a href="https://www.whitehouse.gov/fact-sheets/2025/01/fact-sheet-president-donald-j-trump-takes-action-to-enhance-americas-ai-leadership/">issued</a> his own order to remove barriers to American innovation and “to sustain and enhance America’s dominance in AI to promote human flourishing, economic competitiveness, and national security.”&nbsp;</p><p dir="ltr">While the Trump administration is expected to take a lighter regulatory approach to AI, its past approach through executive order has<a href="https://trumpwhitehouse.archives.gov/ai/executive-order-ai/">&nbsp;recognized</a> the importance of regulatory guidance, technical standards, and transparency and trustworthiness to realizing the benefits of AI innovation. As OMB Director, Vought issued<a href="https://www.whitehouse.gov/wp-content/uploads/2020/11/M-21-06.pdf">&nbsp;guidance</a> to federal agencies for regulation of AI applications, writing that “agencies should continue to promote advancements in technology and innovation, while protecting American technology, economic and national security, privacy, civil liberties, and other American values, including the principles of freedom, human rights, the rule of law, and respect for intellectual property.” The memo emphasized the importance of public trust in AI and the validation of AI systems while encouraging agencies to “be mindful of any potential safety and security risks and vulnerabilities.&nbsp;</p><p dir="ltr">Congressional action on artificial intelligence has been limited to date with the executive branch stepping in to shape government policy and practices related to AI use and regulation. However, Congress and the states show willingness to take this issue up in the coming legislative term.&nbsp;</p><h2>Focus Areas for HackerOne and Our Partners</h2><p dir="ltr">HackerOne’s policy team continues to advocate for the enactment of legislation and regulation that enhances cybersecurity defenses and promotes the responsible adoption and use of AI. This advocacy will continue across administrations and Congresses. Regardless of how the regulatory environment evolves, companies should continue to proactively identify and manage vulnerabilities in their own systems and AI models to protect their assets and maintain the trust of the public, their customers, and investors.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/public-policy" hreflang="en">Public Policy</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/ai-safety-security" hreflang="en">AI Safety &amp; Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
    

            <p dir="ltr">The transition to a new presidential administration and a change in control of the Senate raise questions about how cybersecurity and artificial intelligence (AI) policy and regulation will change and whether such change will be dramatic or more measured.&nbsp;</p>
      ]]></description>
  <pubDate>Tue, 28 Jan 2025 14:23:05 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5470 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>A Partial Victory for AI Researchers</title>
  <link>https://www.hackerone.com/blog/partial-victory-ai-researchers</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">A Partial Victory for AI Researchers</span>
    



    
        Ilona Cohen
        
            Chief Legal and Policy Officer
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Fri, 01/10/2025 - 09:33
</span>

            
  
      
  
    Image
                



          

  

      
            January 10th, 2025

      
            <p dir="ltr">HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne participated in a&nbsp;<a href="https://hai.stanford.edu/news/strengthening-ai-accountability-through-better-third-party-evaluations">workshop</a> hosted by leading institutions to discuss the need for legal safeguards for third-party AI evaluators and address the gaps in current legal frameworks. Despite the strong push for change, the Librarian’s&nbsp;<a href="https://www.federalregister.gov/documents/2024/10/28/2024-24563/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control#:~:text=The%20Librarian%20of%20Congress%2C%20pursuant,the%20next%20three%20years%20to">ruling</a> provided some clarity, but ultimately fell short of granting the full&nbsp;legal protection requested for AI safety research.</p><h2>What is the DMCA and Why Does it Matter?&nbsp;</h2><p>DMCA Section 1201 makes it illegal to circumvent technological protection measures (TPMs) used to protect copyrighted works. Essentially, if software has security features, it’s against the law to break or otherwise bypass them—even for research purposes.&nbsp;</p><p dir="ltr">Every three years the U.S. Copyright Office considers petitions for exceptions to this restriction. In 2015, the security community advocated for and received an&nbsp;<a href="https://s3.amazonaws.com/public-inspection.federalregister.gov/2015-27212.pdf">exception for good faith security research</a>. This year, HackerOne advocated for broadening this exception.&nbsp;</p><p dir="ltr">While security research has legal protections under the law, it is not clear that the same protections extend to AI researchers. AI research, or red teaming, evaluates AI systems for more than just security - including safety, accuracy, discrimination, infringement, and other potentially harmful outputs. The absence of clear legal protections creates a chilling effect that may deter independent AI testing, which is crucial for the long-term resilience of the digital ecosystem—much like independent security research safeguards organizations by identifying vulnerabilities before they can cause harm.</p><p dir="ltr">AI platforms, in an effort to safeguard their systems, may block or ban researchers who attempt to find vulnerabilities or algorithmic flaws. In order to continue their work, researchers are sometimes forced to create new accounts or use proxy servers to bypass these access restrictions. While this circumvention is often necessary for identifying unintended behaviors and improving AI systems, in the absence of clarity around the DMCA 1201 exceptions, it comes with potential legal risk.&nbsp;</p><p dir="ltr">HackerOne&nbsp;<a href="https://www.copyright.gov/1201/2024/comments/reply/Class%204%20-%20Reply%20-%20HackerOne%20Inc..pdf">joined the effort</a> to request the Copyright Office to grant clear liability protection for good faith AI research under DMCA Sec. 1201. The process took several months and multiple rounds of comments before the Librarian of Congress issued its decision on October 28, 2024.</p><h2>What Was the Ruling?</h2><p dir="ltr">The U.S. Copyright Office considered a proposed exemption to the DMCA that would allow researchers to circumvent TPMs in order to test and improve the trustworthiness of AI systems. This exemption would have enabled independent researchers to probe AI models for biases, harmful outputs, and other issues related to fairness and accountability, without the threat of legal action.</p><p dir="ltr">However, the Librarian of Congress ultimately declined to grant this proposed exemption. The decision was based on two determinations:</p><ol><li dir="ltr"><strong>Insufficient Evidence</strong>: There was not enough evidence to prove that Section 1201 significantly deterred researchers from conducting the necessary red teaming and testing activities on AI models. While many researchers have raised concerns about the legal risks of conducting this type of research, the Copyright Office found that the existing framework of TPM circumvention protections did not present a significant barrier to their work.</li><li dir="ltr"><strong>Non-Circumvention of TPMs</strong>: Many of the techniques employed by researchers do not actually involve circumventing TPMs in the way Section 1201 was intended to prohibit. According to the ruling, most of the research methods in question do not technically involve bypassing access controls or security measures, which means they do not fall under the DMCA's anti-circumvention provisions.</li></ol><h2>The Implications for AI Research</h2><p dir="ltr">While the rejection of the full exemption for AI trustworthiness research is a setback, it does provide some clarity in certain areas. The decision clearly states that many common testing methods, such as post-ban account creation, rate limiting, jailbreak prompts, and prompt injection, do not violate Section 1201. This clarification is a win for researchers, as it helps to reduce the uncertainty around these techniques and provides more legal confidence to pursue this critical AI research.</p><p dir="ltr">However, the ruling ultimately leaves AI researchers operating at times in a legal gray area which may result in an inability or unwillingness to fully test AI systems independently, especially in cases where flaws are deeply embedded in the technology.</p><p dir="ltr">As AI continues to evolve and impact all aspects of society, legal frameworks must evolve alongside these technological advancements. The additional clarity provided is welcome, but there is still much to be done to secure stronger, more comprehensive legal protections for good faith AI researchers.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/public-policy" hreflang="en">Public Policy</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/ai-safety-security" hreflang="en">AI Safety &amp; Security</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
    

            <p>Artificial intelligence is advancing faster than ever, but the legal system is struggling to keep up. A key challenge lies in clarifying how independent AI testing and research intersect with copyright law, particularly under the U.S.’s&nbsp;<a href="https://www.copyright.gov/dmca/#:~:text=Millennium%20Copyright%20Act-,The%20Digital%20Millennium%20Copyright%20Act,between%20copyright%20and%20the%20internet." target="_blank">Digital Millennium Copyright Act</a> (DMCA). In October, in response to advocacy by HackerOne and the Hacking Policy Council, the Librarian of Congress issued a ruling that lessened legal risk for independent AI researchers under DMCA Sec. 1201.</p>
      ]]></description>
  <pubDate>Fri, 10 Jan 2025 15:33:42 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5465 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Network and Information Systems Directive (NIS2) Compliance: What You Need to Know</title>
  <link>https://www.hackerone.com/blog/network-and-information-systems-directive-nis2-compliance-what-you-need-know</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Network and Information Systems Directive (NIS2) Compliance: What You Need to Know</span>
    



    
        Sandeep Singh
        
            Director, Technical Services
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 11/27/2024 - 08:38
</span>

            
  
      
  
    Image
                



          

  

      
            November 26th, 2024

      
            <p dir="ltr">This blog will break down the NIS2 Directive drawing information from the original directive briefing published by the European Parliament and explain how organizations can prepare for compliance, including the pivotal role of penetration testing (pentesting) and how HackerOne can assist with these efforts.</p><h2>NIS2 Directive</h2><p dir="ltr">The&nbsp;<strong>NIS2 Directive</strong> aims to enhance the security of network and information systems within the EU by requiring operators of essential and important services to implement adequate security measures and report cybersecurity incidents. It applies to organizations across a wide range of sectors, from critical infrastructure like energy and transport to key digital providers and public services.</p><p dir="ltr">Key updates in NIS2:</p><ul><li dir="ltr"><strong>Broader Scope</strong>:<a href="https://ec.europa.eu/newsroom/dae/redirection/document/72155" target="_blank"> NIS2 expands</a> the range of sectors under its purview, including digital infrastructure, healthcare, telecom, social media, and public administration, recognizing that these industries are increasingly susceptible to cyber threats.</li><li dir="ltr"><strong>Risk Management Obligations</strong>: Organizations must now have comprehensive risk management and cybersecurity measures, including business continuity plans, incident response procedures, and supply chain security). The proposal includes a list of key elements that all companies must address or implement as part of the measures they take, including incident response, supply chain security, encryption, and vulnerability disclosure programs (VDPs).</li><li dir="ltr"><strong>Enhanced Incident Reporting</strong>: Under NIS2, incident reporting requirements have become stricter. Entities must notify authorities within 24 hours of becoming aware of an incident​.</li></ul><p dir="ltr">NIS2 introduces more stringent oversight for essential entities—those where a cyber event could cause significant disruption. These include sectors like energy, banking, health, and water. Important entities, such as digital service providers, are also held to high standards but face limited scrutiny unless they experience a cybersecurity incident.</p><h2>NIS2 Obligations</h2><p dir="ltr">Under NIS2, organizations must comply with strengthened cybersecurity requirements that include:</p><ul><li dir="ltr">Incident handling and crisis management</li><li dir="ltr">Vulnerability handling and disclosure</li><li dir="ltr">Risk assessment and management policies</li><li dir="ltr">Business continuity and disaster recovery plans</li><li dir="ltr">Incident response strategies</li><li dir="ltr">Supply chain security protocols</li><li dir="ltr">Encryption and cryptography measures</li><li dir="ltr">Cybersecurity training and basic hygiene practices</li><li dir="ltr">Human resource security, access control policies, and asset management</li></ul><p dir="ltr">Regular testing and auditing of security systems are also critical to NIS2 compliance, highlighting the importance of penetration testing as a method for ensuring cybersecurity defenses are effective.</p><h2>Difference Between NIS2 and DORA</h2><p>Although both NIS2 and&nbsp;<a href="https://www.hackerone.com/penetration-testing/dora">DORA (Digital Operational Resilience Act)&nbsp;</a>are aimed at improving cybersecurity, they target slightly different areas and industries.</p><ul><li dir="ltr">NIS2 focuses on enhancing cybersecurity across a broad range of sectors, including critical infrastructure, healthcare, energy, and digital service providers. It emphasizes a risk-based approach, requiring organizations to develop and implement security measures, manage risks, and ensure business continuity.</li><li dir="ltr">DORA, on the other hand, is specifically designed for the financial sector, ensuring the digital operational resilience of financial entities, including banks, insurers, and investment firms. It focuses more on financial stability in the face of cyber threats.</li></ul><p>The key difference lies in the scope: while NIS2 covers a wide variety of sectors, DORA is tailored to the financial services industry and imposes stricter testing and security measures on financial institutions​.</p><p>Financial entities that fall under both directives must ensure compliance with both, meaning they will need to meet the specific obligations for each. For example, NIS2 is less demanding than DORA in terms of security testing, but companies in the financial sector still need to conduct stringent resilience testing under both.</p><p dir="ltr"><em>Learn more about&nbsp;</em><a href="https://www.hackerone.com/penetration-testing/dora"><em>DORA Requirements and Pentesting</em></a><em>.</em></p><h2>Pentesting for NIS2 Compliance</h2><p dir="ltr">NIS2 briefing emphasizes the necessity for testing and auditing cybersecurity measures to ensure their effectiveness in real-world scenarios. This is where pentesting becomes a vital tool. Pentesting simulates cyberattacks on an organization's systems to identify vulnerabilities and assess the robustness of current defenses.</p><p dir="ltr">By regularly conducting pentests, organizations can:</p><ul><li dir="ltr">Identify and mitigate vulnerabilities.</li><li dir="ltr">Assess the effectiveness of incident response plans.</li><li dir="ltr">Document improvements in security posture over time.</li><li dir="ltr">Ensure ongoing compliance with NIS2’s risk management obligations.</li></ul><p dir="ltr">Pentesting is particularly crucial for essential entities, which are subject to more rigorous testing and reporting requirements under the directive.</p><h2>Achieve NIS2 Compliance with HackerOne’s Comprehensive Portfolio&nbsp;</h2><p dir="ltr">HackerOne provides a full suite of cybersecurity solutions to help organizations comply with the stringent requirements of the NIS2 Directive. Our portfolio includes Pentest as a Service (PTaaS) model, Vulnerability Disclosure Programs (VDP), and Bug Bounty programs. This integrated approach aligns seamlessly with NIS2’s mandates for continuous risk assessment, vulnerability management, and incident response, as outlined in the directive.</p><p dir="ltr">At the core,&nbsp;<a href="https://www.hackerone.com/product/pentest">HackerOne Pentest</a> delivers thorough, methodology-driven security testing conducted by vetted and highly skilled security researchers. In alignment with&nbsp;<a href="https://digital-strategy.ec.europa.eu/en/faqs/directive-measures-high-common-level-cybersecurity-across-union-nis2-directive-faqs" target="_blank">NIS2’s requirements for cybersecurity risk management and incident reporting</a>, our pentest services help organizations establish, maintain, and test their cybersecurity measures as part of a comprehensive risk management framework. Each engagement provides detailed reports and audit-ready documentation to support compliance efforts, ensuring that your organization can demonstrate adherence to the NIS2 Directive’s requirements for cybersecurity resilience.</p><p dir="ltr">Our pentesting services are complemented by:</p><ul><li dir="ltr"><strong>VDPs</strong>:&nbsp;<a href="https://www.hackerone.com/response">HackerOne Response</a> aligns with NIS2’s incident reporting and&nbsp;also addresses the "<a href="https://ec.europa.eu/newsroom/dae/redirection/document/72155" target="_blank">vulnerability handling and disclosure</a>"&nbsp;<a href="https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/689333/EPRS_BRI(2021)689333_EN.pdf" target="_blank">requirements</a>, enabling organizations to continuously intake, manage, and respond to vulnerabilities reported by security researchers. These programs provide a structured approach for organizations to handle security incidents, as required by NIS2, ensuring timely identification and remediation of risks. <a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program#packaging">HackerOne Essential VDP</a> is a great place to get started, with a free self-serve VDP solution.</li><li dir="ltr"><strong>Bug Bounty Programs</strong>:&nbsp;<a href="https://www.hackerone.com/product/bug-bounty-platform">HackerOne Bounty</a> offers continuous, human-powered security testing, allowing organizations to meet NIS2’s requirements for ongoing risk management. By inviting security researchers to identify vulnerabilities, Bug Bounty programs provide real-time insights into emerging threats. With HackerOne’s Managed Bug Bounty option, organizations can receive tailored support, including triaging vulnerabilities and providing detailed remediation recommendations. This ensures that critical systems and applications are constantly evaluated, addressing the needs for NIS2’s supply chain security and third-party risk management.</li></ul><p dir="ltr">HackerOne’s human-powered, continuous approach ensures that organizations can meet NIS2’s demands for regular cybersecurity assessments and incident response procedures. By leveraging HackerOne's global network of security researchers, including EU-based security professionals, organizations can ensure that their cybersecurity defenses are thoroughly evaluated and aligned with the NIS2 Directive’s standards. <a href="https://www.hackerone.com/contact">Contact the HackerOne team to learn more.</a></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p dir="ltr">The&nbsp;<a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2021)689333" target="_blank">NIS2 Directive&nbsp;</a>represents an essential evolution in the European Union's approach to cybersecurity, building upon the first NIS Directive. It responds to today’s more interconnected digital world and the growing sophistication of cyber threats.&nbsp;<a href="https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide" target="_blank">As cybercrime escalates, with global damage reaching $8.5 trillion in 2023</a>, the need for robust, adaptable cybersecurity policies has never been more critical.</p>
      ]]></description>
  <pubDate>Wed, 27 Nov 2024 14:38:47 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5450 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Are You Ready for the New NIST Control Around Public Disclosure Programs?</title>
  <link>https://www.hackerone.com/blog/are-you-ready-new-nist-control-around-public-disclosure-programs</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Are You Ready for the New NIST Control Around Public Disclosure Programs?</span>
    



    
        Kayla Underkoffler
        
            Lead Security Technologist
      
    


    



    
        Blake Entrekin
        
            Senior Director, Security Compliance
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 08/14/2023 - 11:00
</span>

            
  
      
  
    Image
                



          

  

      
            July 25th, 2024

      
            <p>Let’s first define what we’re talking about when we refer to these NIST controls. NIST 800-53 is a popular framework for security programs globally and also acts as the baseline control set for the U.S. Federal Government’s FedRAMP program. In 2020, The National Institute of Standards and Technology (NIST) <a href="https://www.hackerone.com/security-compliance/nist-overhauls-security-and-privacy-controls-and-emphasizes-vdp-best-practice" target="_blank">released its latest revision 5 (rev 5) to the 800-53 standard</a>. This repositioned the standard to emphasize risk-based outcomes of an overall security program versus rating the impact of individual controls. We’re talking about this again now because the FedRAMP Project Management Office (PMO) recently provided guidance around how rev 5 will be incorporated into the FedRAMP audit framework in 2024, so the clock is ticking for organizations to get their plan in place.</p><p>In rev 5, NIST introduces a brand new control, RA-5(11), which requires SaaS vendors to “<strong>Establish a public reporting channel for receiving reports of vulnerabilities in organizational systems and system components</strong>”&nbsp;</p><p>The NIST guidance further recommends that:<br><br><em>“The reporting channel is publicly discoverable and contains clear language authorizing good-faith research and the disclosure of vulnerabilities to the organization. The organization does not condition its authorization on an expectation of indefinite non-disclosure to the public by the reporting entity but may request a specific time period to properly remediate the vulnerability.”&nbsp;</em></p><p>Essentially, organizations must truly embrace the open nature of public vulnerability reporting. Ethical hackers who report vulnerabilities in good faith should be welcomed and organizations must be given a specific time frame in which to properly remediate those vulnerabilities. This latest revision moves us much closer to a true “see something, say something” mindset that is accepting of any vulnerability report from the public.&nbsp;</p><h2>What Is a Vulnerability Disclosure Policy?</h2><p>In essence, the guidance is talking about a <a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">“Vulnerability Disclosure Policy,</a>” which typically includes the following elements:</p><ul><li><strong>Promise:</strong> Demonstrate a clear, good-faith commitment to customers and other stakeholders potentially impacted by security vulnerabilities;</li><li><strong>Scope:</strong> Indicate what properties, products, and vulnerability types are covered;</li><li><strong>Safe Harbor:</strong> Assures vulnerability finders that they will not be unduly penalized or prosecuted if they follow the policy;</li><li><strong>Process:</strong> Outlines the process that finders should use to report vulnerabilities; and,</li><li><strong>Preferences:</strong> A living document that sets expectations for preferences and priorities regarding how reports will be evaluated, including timeline expectations.</li></ul><p>To see an example of what a live VDP looks like, you can <a href="https://hackerone.com/security?view_policy=true">view HackerOne’s own policy</a>.</p><p>With NIST’s new VDP control, organizations need guidance on what makes a strong VDP and how to evaluate those strengths to prove a best-in-class program. During a recent rev5 guidance call with the FedRAMP PMO, we asked, “With RA-5(11) being a net new control across the impact levels, how will that control be assessed?”</p><p>The PMO responded by pointing to the White House’s memorandum on this topic posted in 2020 — <a href="https://www.whitehouse.gov/wp-content/uploads/2020/09/M-20-32.pdf" target="_blank">M-20-32</a>. This document does a good job of outlining some of what we call out above, but not necessarily the specifics around how to evaluate it.</p><p>So, here we are back to square one, and you are likely asking, “Yeah — so how do I do that?”</p><p>As mentioned above, HackerOne offers VDPs as part of its own broader product offerings and regularly advises customers on industry best practices and what makes a good policy. We also carry our own FedRAMP Authority to Operate (ATO) and have experience with the FedRAMP auditing process.&nbsp;</p><p>In addition to HackerOne’s expertise on the new NIST control, we’ve also collaborated with FedRAMP Manager, Doug Stonier and Nick Rundhaug, FedRAMP Practice Leader with <a href="https://www.schellman.com/" target="_blank">Schellman &amp; Company</a>, a leading provider of attestation and compliance services. They are a globally licensed PCI Qualified Security Assessor, an ISO Certification Body, HITRUST CSF Assessor, and a FedRAMP 3PAO.</p><p>Both the experts at HackerOne and Schellman &amp; Company&nbsp;think everyone, including auditors, should be asking the following questions:</p><h2>1. How Easy/Difficult Is the Policy to Find?&nbsp;&nbsp;</h2><p>Generally speaking, you should be able to use a search engine to search for “COMPANY_NAME Vulnerability Disclosure” and quickly locate said policy. In addition, a VDP should be easily discoverable via the website’s navigation, whether that be part of a security page, privacy page, or part of the main footer.&nbsp;&nbsp;</p><p><em><strong>The Schellman &amp; Company Perspective:</strong></em></p><p>"The key part of the control addressed here is that the reporting channel is 'public.' As an assessor, we will be seeking evidence showing a publicly accessible submission mechanism.&nbsp;This could be as easy as a URL that is publicly available such as through a search engine or public webpage."</p><h2>2. How Consistently Is the Policy Followed and What Metrics Are Tied to it?</h2><p>For example, if the policy sets out a timeframe to respond to an initial submission, is the company following it? Are they actioning on submissions, and how quickly? For those looking for additional reading, see HackerOne’s <a href="https://docs.hackerone.com/organizations/response-target-metrics.html#gatsby-focus-wrapper">prescribed turnaround and resolution times</a>.</p><p><em><strong>The Schellman &amp; Company Perspective:</strong></em></p><p>"The RA-5(11) control is short, but along with the supplemental guidance, there are a number of items that will likely be covered in a related CSP (Cloud Service Provider) owned policy.&nbsp; We will review the policies that the CSP owns that cover items such as applicability, timelines, etc., and ensure the policy covers the VDP including metrics such as timelines."</p><h2>3. What Assets Are in Scope?</h2><p>This is a <em>big</em> one. All of the company’s digital assets should be in scope. A greatly limited scope results in fewer vulnerabilities and detracts away from the “see something, say something” mindset. We recognize there may be exceptions to this rule, but these should be well thought-through and few and far between. If this is part of a FedRAMP audit, an auditor should be looking to see whether or not FedRAMP assets are included in scope. If they are out of scope, you should be asking why.</p><p><em><strong>The Schellman &amp; Company Perspective:</strong></em></p><p>"The entire FedRAMP boundary (components) must be in scope at a minimum. It is likely that more than the FedRAMP boundary will be in scope, which is fine."</p><h2>4. What Types of Findings Are in Scope?</h2><p>This is an opportunity for the VDP to offer context around what vulnerability findings are considered most important to the organization and what type of testing is allowed under the policy. Ideally, any type of finding should be in scope, but we recognize that, at times, this may not always be possible. An example of a finding that may be deprioritized is findings related to third-party assets.</p><p><em><strong>The Schellman &amp; Company Perspective:</strong></em></p><p>"This is another policy check. The policy should include the type of findings that are accepted and tracked. An organization will want to define ratings (possibly based on CVSS 3.0 scoring) and determine what is accepted, such as low-risk findings that are&nbsp;'informational.'"</p><h2>5. Is There a Promise of Safe Harbor for Reasonable Submissions?</h2><p>Safe Harbor refers to the company’s willingness to absolve (read: not prosecute) any ethical hacker who follows industry standards and submits a discovered vulnerability. In May of 2022, the U.S. Department of Justice put out a <a href="https://www.justice.gov/opa/pr/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act" target="_blank">revision</a> stating that those who submit “good-faith security research should not be charged.”</p><p>A lack of a Safe Harbor provision essentially invalidates any VDP since nobody will want to submit vulnerabilities for fear of prosecution. Safe Harbour also provides the company legal protections around the allowance of ethical attacks.</p><p>As the leading expert in vulnerability disclosure, HackerOne has spent extensive time researching and consulting on this topic so that you do not have to. The HackerOne platform defines the <a href="https://docs.hackerone.com/organizations/safe-harbor-faq.html#:~:text=As%20the%20leader%20in%20Attack,disclosure%20or%20bug%20bounty%20program.">Gold Standard Safe Harbor</a>, which provides all parties the best protections afforded.</p><p><em><strong>The Schellman &amp; Company Perspective:</strong></em></p><p>"The NIST supplemental guidance addresses the need for establishing related timelines for submission and disclosure. These items are likely addressed in the CSP policy covering the VDP."</p><h2>6. Is the Preferred Method of Contact Easy to Follow?</h2><p>Nobody wants to call a 1-800 number, submit their birth certificate, and sign a 90-page contract before being able to submit a vulnerability. The recommended methods of contact for a VDP are a group email address, a submission form on the website, or a submission form on a platform. You should design the form for this use case and include few requirements or legalese that would put off a possible report.</p><p><em><strong>The Schellman &amp; Company Perspective:</strong></em></p><p>"While RA-5(11) does not have a specific requirement for the ease of submission (besides “public reporting channel”), the organization will want to consider this, and the resulting submission channel will be used as evidence by the 3PAO during a FedRAMP assessment."</p><h2>Stay On Top of the NIST VDP Control</h2><p>This conversation will continue to evolve over time as Federal Program Management Office and industry leaders continue to update the guidance. To stay ahead of NIST controls and other regulatory security requirements, <a href="https://www.hackerone.com/product/vulnerability-disclosure-program-vdp-response">HackerOne Response</a>&nbsp;provides all the tools needed to launch a successful VDP from a single platform. Our out-of-the-box setup makes it easy to establish a compliant and policy-driven vulnerability disclosure workflow for continuous security. Choose the best option to fit your team’s security goals:</p><ul><li><strong>Essential:</strong> Start with a free self-serve VDP solution to follow best practices and meet compliance mandates.</li><li><strong>Professional:</strong> Elevate vulnerability disclosure with advanced features and reporting for proactive security measures.</li><li><strong>Enterprise:</strong> Ensure enterprise-grade security and compliance with customizable solutions, dedicated support, and extensive integrations.</li></ul><p><a href="https://www.hackerone.com/contact">Contact us</a> to discover which VDP plan is right for your organization and get your VDP started today.</p>
      
            
                                                                                <a href="https://www.hackerone.com/blog/public-policy" hreflang="en">Public Policy</a>
                    
    

            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/vulnerability-management" hreflang="en">Vulnerability Management</a>
        
    

            <p>You’re likely here because the answer to this question is “no.” Within this article, you will get advice on all Vulnerability Disclosure Policy (VDP) options to help you comply.</p>
      ]]></description>
  <pubDate>Mon, 14 Aug 2023 16:00:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5261 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>HIPAA and Pentesting: What You Need to Know</title>
  <link>https://www.hackerone.com/blog/hipaa-and-pentesting-what-you-need-know</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">HIPAA and Pentesting: What You Need to Know</span>
    



    
        HackerOne Pentest
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 07/24/2024 - 13:11
</span>

            
  
      
  
    Image
                



          

  

      
            July 24th, 2024

      
            <p dir="ltr">HIPAA regulatory standards outline the lawful use, disclosure, and safeguarding of protected health information (PHI). Any organization that collects or handles PHI must comply with HIPAA rules. The HIPAA legislation is based on five rules, the first three of which deal directly with protecting PHI:</p><ul><li dir="ltr"><strong>Privacy</strong>: Prevention of customer data being shared with any one or any organization without obtaining the required permissions.</li><li dir="ltr"><strong>Security</strong>: Establishment of safeguards to protect data from being accessed inappropriately or inadvertently. Protections fall into three categories, and covered organizations must:<ul><li dir="ltr">Administrative – have knowledgeable staff and effective processes in place.</li><li dir="ltr">Technical – have IT tools for control of data, including encryption and authentication.</li><li dir="ltr">Nontechnical – have facilities in place that deter physical theft.</li></ul></li><li dir="ltr"><strong>Breach Notification</strong>: Prompt reporting of any breach to the&nbsp;<a href="https://www.hhs.gov/" target="_blank">Department of Health and Human Services</a>, and the inclusion of reporting requirements in all contracts with business associates such as billing agencies or other third-party entities performing work involving PHI.</li><li dir="ltr"><strong>Transaction</strong>: Use of specific codes for sharing data that ensure the privacy and accuracy of medical records and PHI.</li><li dir="ltr"><strong>Identifiers</strong>: The sharing of PHI only with other HIPAA-recognized organizations using unique identifying numbers.</li></ul><h3 dir="ltr">The Importance of HIPAA and HITRUST Compliance</h3><p dir="ltr">Without HIPAA, healthcare organizations are under no legal obligation to protect PHI or to share data with other organizations upon request from the patient. Through HIPAA, healthcare organizations must establish strict security controls to protect PHI and have staff trained in PHI protection and handling. They must also share patient data upon request with other HIPAA organizations. To achieve HIPAA compliance organizations must prove to an auditor that they have effective controls and policies in place.&nbsp; With HIPAA, patients have assurance that medical organizations they deal with are taking steps to protect their PHI and will share that data upon request.&nbsp;</p><p dir="ltr">While HIPAA specifies rules for protecting PHI, it does not prescribe how to achieve compliance, or provide&nbsp; a certification program. That is why implementing HIPAA standards can be complex and confusing. To make it easier to achieve compliance, the&nbsp;<a href="https://hitrustalliance.net/">Health Information Alliance Trust&nbsp;</a>(HITRUST), a private not-for-profit company, developed the&nbsp;<a href="https://hitrustalliance.net/hitrust-framework" target="_blank">HITRUST Common Security Framework</a> (CSF). HITRUST is a trusted official certifying organization, and its HITRUST CSF helps organizations design, deploy and manage their security compliance programs with a single streamlined framework based on HIPAA rules. In short, HIPAA lays out the rules and HITRUST outlines how to comply with them.&nbsp;</p><p dir="ltr">To receive certification, an independent auditor assesses the organization’s compliance with applicable HITRUST requirements.&nbsp; A successful HITRUST assessment and certification can be used to demonstrate HIPAA compliance.&nbsp;</p><h3 dir="ltr">Achieve HIPAA and HITRUST to Protect Your Health Data with HackerOne Pentest</h3><p dir="ltr">Data security is at the core of HIPAA, and pentesting plays a crucial role in helping organizations achieve HIPAA and HITRUST certifications. Pentesting identifies cyber security vulnerabilities that can affect data, with the testing results informing remediations. It validates the effectiveness of security controls and demonstrates to regulators that your organization is proactive in protecting data.</p><p dir="ltr">HackerOne Pentest offers a comprehensive approach to help organizations achieve and maintain HIPAA and HITRUST compliance through rigorous pentesting::</p><ul><li dir="ltr"><strong>Safeguard PHI Security</strong>: Our pentests meticulously examine controls around Protected Health Information (PHI), verifying that they meet the stringent requirements of the HIPAA Security Rule. We assess the effectiveness of access controls, encryption mechanisms, and other security measures designed to protect PHI from unauthorized access, modification, or disclosure. Additionally, our pentests are designed to simulate real-world attack scenarios that can uncover misconfigurations, unpatched systems, and many other flaws that could potentially lead to data breaches.</li><li dir="ltr"><strong>Leverage Experienced Pentesters</strong>: The HackerOne Delivery Team assigns seasoned, HIPAA and HITRUST-certified pentesters who possess deep expertise in healthcare security. These experts assess your organization's security posture against the comprehensive standards set forth by HIPAA and HITRUST. By identifying vulnerabilities and misconfigurations, we provide actionable recommendations to strengthen your security controls and achieve compliance.</li><li dir="ltr"><strong>Comprehensive Reporting</strong>: Upon completion of our pentests, we deliver detailed reports that articulate the identified vulnerabilities and their potential impact on HIPAA and HITRUST compliance. These reports serve as a roadmap for targeted improvements, enabling your organization to prioritize remediation efforts and demonstrate to regulators and stakeholders that you are proactively protecting sensitive health data.</li><li dir="ltr"><strong>Real-Time Results on the HackerOne Platform:</strong> The HackerOne platform provides organizations with real-time visibility into the pentesting process and results. Through the platform, customers can track the progress of the pentest, review findings as they emerge, and collaborate with the pentesters and the HackerOne team to address identified vulnerabilities promptly. This real-time access ensures that organizations can take immediate action to mitigate risks and maintain HIPAA and HITRUST compliance.</li></ul><p>To learn more about how to use pentesting to address HIPAA compliance, <a href="https://www.hackerone.com/contact">contact the experts at HackerOne today.</a></p>
      

            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p dir="ltr">Healthcare records are a prime target for malicious actors. Health data has a higher value and longer shelf life than other data types and can be used for a variety of purposes including extortion, medical fraud, and prescription purchasing. In 2023 there were&nbsp;<a href="https://www.hipaajournal.com/security-breaches-in-healthcare/" target="_blank">725 large security breaches in healthcare with over 133 million breached records</a>. To help safeguard medical information, the U.S. government established the&nbsp;<a href="https://www.hhs.gov/hipaa/for-professionals/index.html" target="_blank">Health Insurance Portability and Accountability Act</a> (HIPAA), a federal law that sets the standard for protecting sensitive patient data in the U.S.&nbsp;</p>
      ]]></description>
  <pubDate>Wed, 24 Jul 2024 18:11:25 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5399 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>DORA: What You Need to Know</title>
  <link>https://www.hackerone.com/blog/dora-what-you-need-know</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">DORA: What You Need to Know</span>
    



    
        Kayla Underkoffler
        
            Lead Security Technologist
      
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 07/08/2024 - 09:38
</span>

            
  
      
  
    Image
                



          

  

      
            July 8th, 2024

      
            <p dir="ltr">DORA focuses on Information and Communications Technology (ICT) systems and applies to all financial institutions in the EU. This includes traditional entities such as banks, insurance companies, investment firms, and credit institutions, as well as non-traditional entities like crypto firms and crowdfunding platforms. The regulation also extends to ICT third-party service providers, including cloud service providers and data centers. Although DORA is an EU regulation, any organization that works with EU-covered entities must maintain compliance, regardless of its physical location.</p><p dir="ltr">DORA regulations can be grouped into three core concepts:&nbsp;</p><ul><li dir="ltr"><strong>ICT Risk Management:&nbsp;</strong>Regulated organizations must have a documented ICT risk management framework that ensures a high level of operational resilience, including regular testing.</li><li dir="ltr"><strong>Incident Management:&nbsp;</strong>Organizations must have an ICT incident management process for the detection, remediation or resolution, and notification of ICT-related incidents.</li><li dir="ltr"><strong>Supply Chain Security:&nbsp;</strong>Organizations must manage ICT third-party risk as an integral part of their risk management framework.</li></ul><p dir="ltr">In addition to these requirements, DORA encourages, but does not require, information sharing among covered parties.</p><p dir="ltr">The regulations in DORA are similar to those in the Network and Information Security (<a href="https://nis2directive.eu/what-is-nis2/" target="_blank">NIS2</a>) Directive. Both DORA and NIS2 share the common goal of ensuring cyber resilience, though their target sector definitions differ, with some overlap, especially in the financial sector. While NIS2 has a wider scope, DORA imposes more demanding requirements for security testing. Since financial institutions fall under the scope of both DORA and NIS2, they must comply with both regulations.</p><h2>Why DORA and Why Now?</h2><p dir="ltr">The financial sector is becoming increasingly dependent on internet technology as well as fintech (financial technology) and non-financial technology companies to deliver financial services.&nbsp; With this increasing dependence comes the increasing risk of cyberattacks and other service disruptions. In 2023, the&nbsp;<a href="https://cybermagazine.com/articles/increase-in-cyberattacks-on-european-financial-services" target="_blank">number of cyberattacks on European financial services more</a> than doubled, and the average&nbsp;<a href="https://www.statista.com/statistics/1324063/cost-of-data-breaches-in-financial-industry-worldwide/" target="_blank">cost of a cyberattack on entities in the financial sector worldwide was a staggering $5.9 million</a>.</p><p dir="ltr">With today's distributed systems and the interconnected nature of financial operations, disruptions can easily spread across national borders. Before DORA, there was no unified program across the EU to strengthen digital operational resilience of its financial institutions and third-party service providers. DORA strengthens and harmonizes the ICT risk management regulations that already exist in EU member states, and establishes a universal framework for managing and mitigating IT risk in the entire financial sector.&nbsp;</p><h2>DORA and Pentesting</h2><p dir="ltr">It is in every ICT organization’s vital interest to identify and resolve or remediate vulnerabilities in their IT systems and applications before they can be exploited by bad actors. DORA requirements include regular testing for operation stability, and threat detection and response. Pentesting, the simulation of a cyberattack under near, or actual real-world conditions is perfectly suited for this task. It is a critical tool for satisfying DORA requirements.&nbsp;</p><p dir="ltr">DORA requires two levels of testing.&nbsp; All regulated entities must perform digital operational resilience testing at least annually for systems and applications supporting important functions to detect vulnerabilities and weaknesses, and to validate security controls in place. DORA also mandates threat-led pentesting (TLPT) at least once every three years, which focuses on specific threats for the most important financial operations as designated by authorities in each country.&nbsp;</p><p dir="ltr">In addition to detecting vulnerabilities in ICT systems before they can be exploited, pentesting can also be deployed in application development to check for vulnerabilities before they are installed, improving the organization’s overall security posture. It can also be used to improve overall resilience by giving the organization an opportunity to react to a cyberattack in a test situation, rather than in an actual cyber event.</p><h2>Satisfy DORA Requirements with HackerOne’s Comprehensive Security Testing Solutions</h2><p dir="ltr">HackerOne offers a comprehensive suite of security solutions designed to help financial services organizations meet DORA compliance requirements. Our portfolio includes&nbsp;<a href="https://www.hackerone.com/security-compliance/crest-pentesting">CREST-accredited</a> Pentest as a Service (PTaaS) model, Code Security Audits, Bug Bounty programs, and Spot Checks. This integrated approach aligns perfectly with DORA's mandates for regular and comprehensive ICT risk assessment and management, as outlined in&nbsp;<a href="https://www.digital-operational-resilience-act.com/Article_24.html" target="_blank">Articles 24</a> and&nbsp;<a href="https://www.digital-operational-resilience-act.com/Article_25.html" target="_blank">25</a>.</p><p dir="ltr">At the core,&nbsp;<a href="https://www.hackerone.com/product/pentest">HackerOne Pentest</a> provides a detailed, methodology-driven approach to security testing conducted by heavily vetted security researchers. In accordance with DORA Article 24(1), our pentest services help organizations establish, maintain and review a sound and comprehensive digital operational resilience testing program as an integral part of the ICT risk-management framework. Each pentesting engagement with HackerOne&nbsp;<a href="https://docs.hackerone.com/en/articles/8541373-pentest-deliverables">delivers detailed reports and attestations</a>, providing documented evidence of DORA compliance efforts. This aligns with the need for "internal validation methodologies" as mentioned in Article 24(5).</p><p dir="ltr">Our pentesting services are complemented by:</p><ul><li dir="ltr"><strong>Code Security Audits (CSA):</strong>&nbsp;<a href="https://www.hackerone.com/product/code-security-audit">HackerOne CSA</a> service addresses DORA Article 25(1)'s requirement for "source code reviews where feasible." Conducted by over 600 vetted senior software engineers, these audits provide a comprehensive view of your codebase's security posture, identifying vulnerabilities that automated tools might miss.</li><li dir="ltr"><strong>Bug Bounty Programs:</strong>&nbsp;<a href="https://hackerone.com/security">HackerOne Bounty</a> offers continuous, human-powered security testing, aligning with DORA Article 24(6)'s mandate for yearly testing of "all ICT systems and applications supporting critical or important functions." This always-on approach ensures your systems are constantly tested against new and emerging threats.</li><li dir="ltr"><strong>Spot Checks:</strong> As part of our Bug Bounty offering,&nbsp;<a href="https://www.hackerone.com/vulnerability-management/spot-checks">Spot Checks</a> allow for quick, flexible testing iterations. This capability supports DORA Article 25(1)'s call for "vulnerability assessments and scans, open source analyses, network security assessments, gap analyses," and other appropriate tests.</li></ul><p dir="ltr">HackerOne’s human-powered, continuous approach ensures that organizations can meet DORA's requirements for a "range of assessments, tests, methodologies, practices, and tools" as specified in Article 24(2). By leveraging HackerOne's global network of security experts, including EU-based professionals specializing in DORA requirements, organizations can ensure their security measures are thoroughly evaluated against both DORA standards and broader EU regulatory expectations.</p><p dir="ltr">By integrating HackerOne's security testing solutions into their DORA compliance strategy, organizations are empowered to meet the required digital operational resilience standards while demonstrating a proactive, risk-based approach to cybersecurity. This comprehensive strategy significantly enhances their credibility with regulators and ensures ongoing resilience in the face of evolving ICT risks.</p>
      

            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p>The&nbsp;<a href="https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en" target="_blank">Digital Operational Resilience Act (DORA)</a> is a European Union (EU) regulation that was enacted in January 2023 and will apply to regulated entities as of January 2025. Digital Operational Resilience refers to the ability of financial entities to maintain IT security and withstand operational disruptions. The act is aimed at strengthening the IT security of financial organizations in the EU and ensuring that they can stay resilient in the event of a cyberattack or other severe operational disruption.&nbsp;</p>
      ]]></description>
  <pubDate>Mon, 08 Jul 2024 14:38:39 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5391 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Pentesting for NIST 800-53, FISMA, and FedRAMP</title>
  <link>https://www.hackerone.com/blog/pentesting-nist-800-53-fisma-and-fedramp</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Pentesting for NIST 800-53, FISMA, and FedRAMP</span>
    



    
        HackerOne Pentest
        
    


<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 06/26/2024 - 08:56
</span>

            
  
      
  
    Image
                



          

  

      
            June 26th, 2024

      
            <h2>Overview of NIST 800-53, FISMA, and FedRAMP</h2><p dir="ltr">The National Institute of Standards and Technology (<a href="https://www.nist.gov/" target="_blank">NIST</a>) is a U.S. federal agency responsible for developing and promoting technology standards and guidelines for a variety of areas, including cybersecurity, in support of federal agencies and private sector organizations. NIST’s goal is to help organizations mitigate cybersecurity risks, protect data and information, and enhance their overall security posture.&nbsp;</p><h3>NIST 800-53</h3><p dir="ltr">To support this and other security efforts, NIST has issued a number of publications. One such publication,&nbsp;<a href="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final" target="_blank">NIST Special Publication 800-53</a>, “Security and Privacy Controls for Federal Information Systems and Organizations,” provides a comprehensive catalog of security controls and guidelines that can be implemented to secure information systems. NIST 800-53 is a foundational resource for organizations to follow in developing security programs and facilitating compliance with security regulations and standards, including FISMA and FedRAMP.&nbsp;</p><h3>FISMA</h3><p dir="ltr">The<a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/federal-information-security-modernization-act" target="_blank"> Federal Information Security Modernization Act</a> (FISMA) is a U.S. law that mandates federal agencies to develop, document, and implement agency-wide programs to provide security for the information and information systems that support the operations and assets of the agency. Under FISMA, organizations are required to implement minimum recommended information security controls as defined in NIST 800-53.</p><h3>FedRAMP</h3><p dir="ltr">The&nbsp;<a href="https://www.fedramp.gov/program-basics/" target="_blank">Federal Risk and Authorization Management Program</a> (FedRAMP) has the same basic goal as FISMA, to protect government information and systems and reduce cybersecurity risks in information systems. But while FISMA applies to all federal information systems, FedRAMP deals exclusively with cloud-related computing and services. FedRAMP provides a standardized approach to security assessment, authorization, and monitoring, including additional controls beyond baseline controls specified in NIST 800-53 to address the unique elements of cloud computing.&nbsp;</p><h2>Key Insights on NIST 800-53 Compliance</h2><p dir="ltr">NIST 800-53 compliance is mandatory for U.S. federal agencies, and it is typically required for federal contractors who handle or have access to government information systems or sensitive information.&nbsp;</p><p dir="ltr">NIST 800-53 covers security policies and controls that can be categorized into five major areas:</p><ul><li dir="ltr"><strong>Identify</strong>: Identification and management of assets, including risk management</li><li dir="ltr"><strong>Protect</strong>: Protection of assets and data security, including user access control and least-privileged access controls</li><li dir="ltr"><strong>Detect</strong>: Continuous monitoring and discovery of anomalous activities</li><li dir="ltr"><strong>Respond</strong>: Methods and strategies for identifying and mitigating threats</li><li dir="ltr"><strong>Recovery</strong>: Restoration procedures for recovery from a system failure or attack</li></ul><p dir="ltr">To achieve NIST 800-53 compliance, the organization needs to make a detailed evaluation of its cybersecurity requirements, policies and programs. Organizations tailor their compliance path to align with their individual operations, but all should consider the following steps.</p><ul><li dir="ltr"><strong>Define scope</strong>: Understand NIST 800-53 requirements. Determine which systems and applications are in scope.</li><li dir="ltr"><strong>Conduct risk assessment</strong>: Identify vulnerabilities and security risks. Prioritize mitigation efforts.</li><li dir="ltr"><strong>Implement and test controls</strong>: Select and implement applicable controls from NIST 800-53 framework. Update policies and procedures as required. Document controls to facilitate compliance audits.</li><li dir="ltr"><strong>Monitor continually</strong>: Develop plans for ongoing monitoring of security controls</li><li dir="ltr"><strong>Develop incident response plans</strong>: Develop plans for detecting, responding to, and recovering from a cybersecurity incident.</li><li dir="ltr"><strong>Perform regular audits</strong>: Undergo regular audits to fulfill compliance requirements and enhance cybersecurity posture.</li></ul><h2>Leveraging HackerOne Pentest to Meet NIST 800-53 and FISMA Standards</h2><p dir="ltr">HackerOne Pentest offers a proven approach to help organizations efficiently achieve compliance with NIST 800-53 and FISMA standards. By leveraging the expertise of elite, vetted pentesters, HackerOne Pentest conducts targeted validations of key technical controls, providing actionable insights to strengthen security posture. Our pentesting services assist with the following areas:&nbsp;</p><ul><li dir="ltr"><strong>Access Control Validation</strong>: Assess the enforcement of least privilege and separation of duties through effective authentication and authorization mechanisms. This ensures that only authorized users can access sensitive resources, reducing the risk of unauthorized access or privilege escalation.</li><li dir="ltr"><strong>Incident Response Evaluation</strong>: Evaluate the capabilities for a comprehensive incident response lifecycle, from preparation to recovery. This comprehensive assessment helps identify gaps and areas for improvement, enabling the organization to respond effectively to potential threats.</li><li dir="ltr"><strong>Risk Assessment</strong>: Conduct in-depth risk evaluations to identify vulnerabilities and inform control implementations. By leveraging the expertise of seasoned pentesters, organizations can gain a clear understanding of their risk landscape and prioritize remediation efforts effectively.</li><li dir="ltr"><strong>System and Communications Protection</strong>: Secure communication channels and control interfaces, employing cryptographic protections as necessary. This ensures that confidential data remains secure during transmission and that control interfaces are hardened against unauthorized access or manipulation.</li><li dir="ltr"><strong>Audit and Accountability Validation</strong>: Evaluate the organization's audit and accountability mechanisms, ensuring that user activities can be traced and unauthorized access or modifications can be detected and addressed promptly. This helps maintain the integrity of the system and supports forensic investigations in the event of a security incident.</li></ul><blockquote><p><em>"The MoD has embraced a strategy of securing by design, with transparency being integral for identifying areas for improvement in the development process. Working with the ethical hacking community allows us to build out our bench of tech talent and bring more diverse perspectives to protect and defend our assets. Understanding where our vulnerabilities are and working with the wider ethical hacking community to identify and fix them is an essential step in reducing cyber risk and improving resilience."</em><br>— Christine Maxwell, CISO, Ministry of Defence (MoD)</p><p><a href="https://www.hackerone.com/press-release/ministry-defence-taps-hackerone-community-take-ethical-hacking-next-level"><strong>Read the full press release.</strong></a></p></blockquote><h2>Navigating FedRAMP Compliance with HackerOne</h2><p dir="ltr">HackerOne's pentesting services are expertly tailored to help organizations achieve successful FedRAMP compliance. Our offerings focus on the following areas:</p><ul><li dir="ltr"><strong>Cloud-Specific Controls</strong>: Our pentests extend beyond NIST 800-53, targeting cloud-specific concerns such as multi-tenancy, data encryption both at rest and in transit, and virtualization security.</li><li dir="ltr"><strong>Third-Party Assessment Organization (3PAO)</strong>: While HackerOne is not a 3PAO, we collaborate with independent assessors during our pentests to deliver an unbiased and comprehensive evaluation of our security controls and compliance efforts.</li><li dir="ltr"><strong>Authorization Packages Documentation</strong>: Following our pentests, we produce detailed documentation, including the System Security Plan (SSP), Security Assessment Report (SAR), and Plan of Action and Milestones (POA&amp;M). These documents articulate our security measures and findings, providing organizations with a clear roadmap to address any identified vulnerabilities and achieve FedRAMP compliance.</li></ul><blockquote><p><em>"Implementing the VDP helped us triage and supplemented the internal team we were building. We also knew that the federal government was mandating VDP policies for their agencies, and we wanted to be on the forefront of embracing that security policy for our own constituents."</em><br>— Jillian Burner, CISO, Ohio Secretary of State</p><p><a href="https://www.hackerone.com/vulnerability-disclosure/five-takeaways-ohio-secretary-states-vdp-success-story"><strong>Read the full story.</strong></a></p></blockquote><h3>Additional HackerOne Services</h3><ul><li dir="ltr"><strong>Public Reporting Channel with a Vulnerability Disclosure Program (VDP):&nbsp;</strong>Risk Assessment control&nbsp;<a href="https://csf.tools/reference/nist-sp-800-53/r5/ra/ra-5/ra-5-11/" target="_blank">RA-5 (11)</a> requires that organizations establish a public channel to receive external vulnerability reports,&nbsp;<a href="https://www.hackerone.com/product/response-vulnerability-disclosure-program">HackerOne Response</a>&nbsp;offers a Vulnerability Disclosure Program (VDP) to help satisfy the control. By enabling organizations to establish a structured process for receiving and addressing security vulnerabilities reported by external parties, organizations can be on track to meet requirements and enhance overall risk management and compliance efforts.</li><li dir="ltr"><strong>Continuous Monitoring with a Bug Bounty Program</strong>: While our pentesting offers deep, targeted FedRAMP assessments,&nbsp;<a href="https://www.hackerone.com/product/bug-bounty-platform">HackerOne Bounty</a> extends this capability, providing ongoing, crowdsourced security testing, ensuring that your systems are constantly tested against new and emerging threats. This continuous approach aligns with FedRAMP's emphasis on continuous monitoring, offering an agile, responsive framework to identify and mitigate vulnerabilities year-round.&nbsp;</li></ul>
      

            
            <a href="https://www.hackerone.com/blog/topic/security-compliance" hreflang="en">Security Compliance</a>
        
            
            <a href="https://www.hackerone.com/blog/topic/penetration-testing" hreflang="en">Penetration Testing</a>
        
    

            <p>Federal organizations are required to meet specific technology and cybersecurity standards, and several agencies and laws are responsible for setting and enforcing these guidelines. Let's break down some of the different governing bodies and laws for federal organizations and how to use pentesting to address NIST 800-53, FISMA, and FedRAMP compliance.</p>
      ]]></description>
  <pubDate>Wed, 26 Jun 2024 13:56:19 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">5387 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
