<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Australia</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Protective Security Policy Framework - Policy 11 - Robust ICT Systems</title>
  <link>https://www.hackerone.com/node/2398</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Protective Security Policy Framework - Policy 11 - Robust ICT Systems</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 10/09/2024 - 12:52
</span>

  
    Jurisdiction
              Australia
          

  
    Region
              Asia/Pacific
          

  
    Requirement
              Required
          

  
    Organization
              Australian Department of Home Affairs
          

  
    Provision
              C.6
          

  
    Applies to
              Australian Government entities
          

  
    Date
              July 29, 2022
          

  
    Description
              <p>C.6 Vulnerability Disclosure Program&nbsp;</p><p>60. Requirement 4 mandates that all entities must have in place a vulnerability disclosure program. This includes having a publicly available vulnerability disclosure policy supported by processes and procedures for receiving, verifying, resolving and reporting on security vulnerabilities disclosed by both internal and external sources.&nbsp;</p><p>61. Implementing a vulnerability disclosure program, based on responsible disclosure, can assist entities, vendors and service providers to improve the security of their products and services as it provides a way for security researchers, customers and members of the public to responsibly notify them of potential security vulnerabilities in a coordinated manner. Furthermore, following the verification and resolution of a reported security vulnerability, it can assist entities, vendors and service providers in notifying their customers of any security vulnerabilities that have been discovered in their products and services and any recommended security patches, updates or mitigations.&nbsp;</p><p>62. For guidance on the creation and maintenance of vulnerability disclosure programs, see the Information Security Manual and Guidelines for Software Development.</p>
          

            <a href="https://www.protectivesecurity.gov.au/system/files/2024-02/policy-11-robust-ict-systems.pdf">https://www.protectivesecurity.gov.au/system/files/2024-02/policy-11-robust-ict…</a>
      ]]></description>
  <pubDate>Wed, 09 Oct 2024 17:52:21 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2398 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Code of Practice: Securing the Internet of Things for Consumers</title>
  <link>https://www.hackerone.com/node/2397</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Code of Practice: Securing the Internet of Things for Consumers</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Wed, 10/09/2024 - 08:52
</span>

  
    Jurisdiction
              Australia
          

  
    Region
              Asia/Pacific
          

  
    Requirement
              Recommended
          

  
    Organization
              Australian Government
          

  
    Provision
              Principle 2
          

  
    Applies to
              Device Manufacturers, IoT Service Providers and Mobile Application Developers
          

  
    Date
              2020
          

  
    Description
              <p>Principle 2: Implement a vulnerability disclosure policy&nbsp;</p><p>IoT device manufacturers, IoT service providers and mobile application developers should provide a public point of contact as part of a vulnerability disclosure policy in order for security researchers and others to report issues. Disclosed vulnerabilities should be acted on in a timely manner. Implementing a bug bounty program encourages and rewards the cyber security community for identifying and reporting vulnerabilities, thereby facilitating the responsible and coordinated disclosure and remediation of vulnerabilities.&nbsp;</p><p>Primarily applies to Device Manufacturers, IoT Service Providers and Mobile Application Developers.</p>
          

            <a href="https://www.homeaffairs.gov.au/reports-and-pubs/files/code-of-practice.pdf">https://www.homeaffairs.gov.au/reports-and-pubs/files/code-of-practice.pdf</a>
      ]]></description>
  <pubDate>Wed, 09 Oct 2024 13:52:19 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2397 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Information Security Manual (ISM)</title>
  <link>https://www.hackerone.com/node/2377</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Information Security Manual (ISM)</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 07/29/2024 - 16:25
</span>

  
    Jurisdiction
              Australia
          

  
    Region
              Asia/Pacific
          

  
    Requirement
              Recommended
          

  
    Organization
              Australian Signals Directorate (ASD)
          

  
    Provision
              Pg. 106 (Controls ISM-1616, ISM-1755, ISM-1756, ISM-1717)
          

  
    Applies to
              Large companies, Government agencies
          

  
    Date
              September 2023
          

  
    Description
              <strong>Control: ISM-1616</strong>; Revision: 0; Updated: Aug-20; Applicability: All; Essential Eight: N/A A vulnerability disclosure program is implemented to assist with the secure development and maintenance of products and services.&nbsp;&nbsp;<strong>Control: ISM-1755</strong>; Revision: 1; Updated: Dec-22; Applicability: All; Essential Eight: N/A A vulnerability disclosure policy is developed, implemented and maintained.&nbsp;&nbsp;<strong>Control: ISM-1756</strong>; Revision: 1; Updated: Dec-22; Applicability: All; Essential Eight: N/A Vulnerability disclosure processes, and supporting vulnerability disclosure procedures, are developed, implemented and maintained.&nbsp;<strong>Control: ISM-1717</strong>; Revision: 2; Updated: Sep-23; Applicability: All; Essential Eight: N/A A ‘security.txt’ file is hosted for all internet-facing organisational domains to assist in the responsible disclosure of vulnerabilities in an organisation’s products and services.&nbsp;
          

            <a href="https://www.cyber.gov.au/sites/default/files/2024-03/Information%20Security%20Manual%20%28March%202024%29.pdf">https://www.cyber.gov.au/sites/default/files/2024-03/Information%20Security%20M…</a>
      ]]></description>
  <pubDate>Mon, 29 Jul 2024 21:25:49 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2377 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
