<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>International / Standards Bodies</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>UN Working Group Report, "Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security"</title>
  <link>https://www.hackerone.com/node/2396</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">UN Working Group Report, "Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security"</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Thu, 08/29/2024 - 15:16
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              United Nations
          

  
    Provision
              III.j.
          

  
    Applies to
              UN Member States
          

  
    Date
              July 22, 2015
          

  
    Description
              <p>States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure.&nbsp;</p><p>Report adopted by UN General Assembly Resolution 70/237: https://documents.un.org/doc/undoc/gen/n15/457/57/pdf/n1545757.pdf</p>
          

            <a href="https://documents.un.org/doc/undoc/gen/n15/228/35/pdf/n1522835.pdf">https://documents.un.org/doc/undoc/gen/n15/228/35/pdf/n1522835.pdf</a>
      ]]></description>
  <pubDate>Thu, 29 Aug 2024 20:16:28 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2396 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>ISO/IEC 30111, Information technology — Security techniques — Vulnerability handling processes</title>
  <link>https://www.hackerone.com/node/2392</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">ISO/IEC 30111, Information technology — Security techniques — Vulnerability handling processes</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 15:01
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              International Organization for Standardization/International Electrotechnical Commission (ISO/IEC)
          

  
    Provision
              N/A
          

  
    Applies to
              Vendors
          

  
    Date
              October 2019
          

  
    Description
              <p>This document provides requirements and recommendations for how to process and remediate reported potential vulnerabilities in a product or service.</p><p>This document is applicable to vendors involved in handling vulnerabilities</p>
          

            <a href="https://www.iso.org/standard/69725.html">https://www.iso.org/standard/69725.html</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 20:01:07 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2392 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>ISO/IEC 29147, Information technology — Security techniques — Vulnerability disclosure</title>
  <link>https://www.hackerone.com/node/2391</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">ISO/IEC 29147, Information technology — Security techniques — Vulnerability disclosure</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 14:58
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              International Organization for Standardization/International Electrotechnical Commission (ISO/IEC)
          

  
    Provision
              N/A
          

  
    Applies to
              Vendors
          

  
    Date
              October 2018
          

  
    Description
              <p>This document provides requirements and recommendations to vendors on the disclosure of vulnerabilities in products and services. Vulnerability disclosure enables users to perform technical vulnerability management as specified in ISO/IEC 27002:2013, 12.6.1[1]. Vulnerability disclosure helps users protect their systems and data, prioritize defensive investments, and better assess risk. The goal of vulnerability disclosure is to reduce the risk associated with exploiting vulnerabilities. Coordinated vulnerability disclosure is especially important when multiple vendors are affected. This document provides:</p><p>— guidelines on receiving reports about potential vulnerabilities;</p><p>— guidelines on disclosing vulnerability remediation information;</p><p>— terms and definitions that are specific to vulnerability disclosure;</p><p>— an overview of vulnerability disclosure concepts;</p><p>— techniques and policy considerations for vulnerability disclosure;</p><p>— examples of techniques, policies (Annex A), and communications (Annex B).</p><p>Other related activities that take place between receiving and disclosing vulnerability reports are described in ISO/IEC 30111.</p>
          

            <a href="https://www.iso.org/standard/72311.html">https://www.iso.org/standard/72311.html</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 19:58:51 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2391 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Good Practice Guidance on the Co-ordination of Digital Security Vulnerabilities (DSTI/CDEP/SDE(2021)9/FINAL)</title>
  <link>https://www.hackerone.com/node/2390</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Good Practice Guidance on the Co-ordination of Digital Security Vulnerabilities (DSTI/CDEP/SDE(2021)9/FINAL)</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 10:29
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              Organization for Economic Co-operation and Development (OECD)
          

  
    Provision
              N/A
          

  
    Applies to
              Policy makers, code owners, system owners, vulnerability researchers
          

  
    Date
              January 25, 2023
          

  
    Description
              <p>This good practice guidance aims to provide policy makers with an overarching understanding of the co-ordination of digital security vulnerabilities in practice, while avoiding technical jargon and detailed considerations. It may also help technical security experts to communicate with policy makers and non-technical experts in their organisation such as CEOs, board members, communication, and legal departments, etc. This document is expected to be sufficiently consistent with technical standards and other guides targeting technical experts in this area, does not aim to replace them, but rather helps raise awareness about their existence and the need for practitioners to use them.</p>
          

            <a href="https://one.oecd.org/document/DSTI/CDEP/SDE(2021)9/FINAL/en/pdf">https://one.oecd.org/document/DSTI/CDEP/SDE(2021)9/FINAL/en/pdf</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 15:29:05 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2390 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Recommendation of the Council on the Treatment of Digital Security Vulnerabilities (OECD/LEGAL/0482)</title>
  <link>https://www.hackerone.com/node/2389</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Recommendation of the Council on the Treatment of Digital Security Vulnerabilities (OECD/LEGAL/0482)</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 10:26
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              Organization for Economic Co-operation and Development (OECD)
          

  
    Provision
              N/A
          

  
    Applies to
              Signatory countries
          

  
    Date
              September 25, 2022
          

  
    Description
              <p>The purpose of this Recommendation is to provide guidance on how to implement the Digital Security Recommendation to develop public policies to foster vulnerability treatment in order to reduce digital security risk, thereby strengthening trust and supporting digital transformation.</p>
          

            <a href="https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0482">https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0482</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 15:26:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2389 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure</title>
  <link>https://www.hackerone.com/node/2388</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 10:21
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              FIRST - Forum of Incident Response and Security Teams
          

  
    Provision
              N/A
          

  
    Applies to
              Vendors
          

  
    Date
              Spring 2020
          

  
    Description
              Provides "Guiding Concepts and Best Current Practices" related to multi-lateral coordination on CVDs:&nbsp;1. Establish a strong foundation of processes and relationships&nbsp;2. Maintain clear and consistent communications&nbsp;3. Build and maintain trust&nbsp;4. Minimize exposure for stakeholders&nbsp;5. Respond quickly to early disclosure&nbsp;6. Use coordinators when appropriate&nbsp;
          

            <a href="https://www.first.org/global/sigs/vulnerability-coordination/multiparty/FIRST-Multiparty-Vulnerability-Coordination.pdf">https://www.first.org/global/sigs/vulnerability-coordination/multiparty/FIRST-M…</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 15:21:44 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2388 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>The CERT® Guide to Coordinated Vulnerability Disclosure</title>
  <link>https://www.hackerone.com/node/2387</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">The CERT® Guide to Coordinated Vulnerability Disclosure</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 10:16
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              Carnegie Mellon University Software Engineering Institute
          

  
    Provision
              N/A
          

  
    Applies to
              All Organizations
          

  
    Date
              August 2017
          

  
    Description
              Provides a summary of CVD. The document includes 7 core sections:&nbsp;1. Principles of Coordinated Vulnerability Disclosure&nbsp;2. Roles in CVD&nbsp;3. Phase of CVD&nbsp;4. Process Variation Points&nbsp;5. Troubleshooting CVD&nbsp;6. Operational Considerations&nbsp;7. Open Problems in CVD&nbsp;
          

            <a href="https://insights.sei.cmu.edu/documents/1945/2017_003_001_503340.pdf">https://insights.sei.cmu.edu/documents/1945/2017_003_001_503340.pdf</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 15:16:03 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2387 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>GFCE Global Good Practices Coordinated Vulnerability Disclosure (CVD)</title>
  <link>https://www.hackerone.com/node/2386</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">GFCE Global Good Practices Coordinated Vulnerability Disclosure (CVD)</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 10:10
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              Global Forum on Cyber Expertise
          

  
    Provision
              N/A
          

  
    Applies to
              Political leadership/policymakers, manufacturers/vendors, users, reporters, legal professionals, and national CSIRTs
          

  
    Date
              2017
          

  
    Description
              Provides CVD best practices for political leadership/policymakers, manufacturers/vendors, users, reporters, legal professionals, and national CSIRTs. It also explains 8 key challenges, including conflicts between involved stakeholders; failure to patch after disclosure; and sale of zero-day vulnerabilities.&nbsp;
          

            <a href="https://thegfce.org/wp-content/uploads/CoordinatedVulnerabilityDisclosure-1-1.pdf">https://thegfce.org/wp-content/uploads/CoordinatedVulnerabilityDisclosure-1-1.p…</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 15:10:53 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2386 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Decision No. 1202 - OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies</title>
  <link>https://www.hackerone.com/node/2385</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Decision No. 1202 - OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 10:02
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              Europe
          

  
    Requirement
              Recommended
          

  
    Organization
              Organization for Security and Co-operation in Europe (OSCE)
          

  
    Provision
              CBM 16
          

  
    Applies to
              OSCE Member States
          

  
    Date
              March 2016
          

  
    Description
              Participating States will, on a voluntary basis, encourage responsible reporting of vulnerabilities affecting the security of and in the use of ICTs and share associated information on available remedies to such vulnerabilities, including with relevant segments of the ICT business and industry, with the goal of increasing co-operation and transparency within the OSCE region. OSCE participating States agree that such information exchange, when occurring between States, should use appropriately authorized and protected communication channels, including the contact points designated in line with CBM 8 of Permanent Council Decision No. 1106, with a view to avoiding duplication.
          

            <a href="https://www.osce.org/files/f/documents/d/a/227281.pdf">https://www.osce.org/files/f/documents/d/a/227281.pdf</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 15:02:38 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2385 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Payment Card Industry Data Security Standard (PCI-DSS) 4.0</title>
  <link>https://www.hackerone.com/node/2384</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Payment Card Industry Data Security Standard (PCI-DSS) 4.0</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Tue, 07/30/2024 - 09:59
</span>

  
    Jurisdiction
              International / Standards Bodies
          

  
    Region
              International
          

  
    Requirement
              Recommended
          

  
    Organization
              Payment Card Industry Security Standards Council (PCI-SSC)
          

  
    Provision
              6.3.1
          

  
    Applies to
              Organizations that use or facilitate payments with major credit card issuers
          

  
    Date
              March 2022
          

  
    Description
              <p>Section 6.3 - Security vulnerabilities are identified and addressed.&nbsp;</p><p>In the 'defined approach requirements', PCI urges organizations to identify vulnerabilities "using industry-recognized sources for security vulnerability information, including alerts from international and national computer emergency response teams (CERTs). Although Section 6.3 does not make a broad recommendation for covered entities to have CVD/VDPs, it comes close in its guidance for in-house developed software. Specifically, it states "For control over in-house developed software, the organization may receive such information from external sources. The organization can consider using a “bug bounty” program where it posts information (for example, on its website) so third parties can contact the organization with vulnerability information. External sources may include independent investigators or companies that report to the organization about identified vulnerabilities and may include sources such as the Common Vulnerability Scoring System (CVSS) or the OWASP Risk Rating Methodology."</p>
          

            <a href="https://blog.pcisecuritystandards.org/pci-dss-v4-0-resource-hub">https://blog.pcisecuritystandards.org/pci-dss-v4-0-resource-hub</a>
      ]]></description>
  <pubDate>Tue, 30 Jul 2024 14:59:23 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2384 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
