<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Germany</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Cyber Security Strategy for Germany 2021</title>
  <link>https://www.hackerone.com/node/2365</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Cyber Security Strategy for Germany 2021</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 07/29/2024 - 15:15
</span>

  
    Jurisdiction
              Germany
          

  
    Region
              Europe
          

  
    Requirement
              Recommended *Coming Soon
          

  
    Organization
              Federal Ministry of the Interior, Building, and Community
          

  
    Provision
              Section 8.1.8
          

  
    Applies to
              Government agencies
          

  
    Date
              2021
          

  
    Description
              8.1.8 Responding responsibly to vulnerabilities – promoting coordinated vulnerability&nbsp;Our aim is for the Federal Government to develop a framework to ensure that those reporting bugs have legal certainty if they approach companies to inform them that they have become aware of vulnerabilities, with a view to fostering proactive vulnerability governance. There will be reliable points of contact for them to report their findings. These can take the form of internal contact points which companies themselves are obligated to set up, or the BSI as a public liaison office. The legislator will obligate the companies affected to provide points of contact and processes to enable them to fix reported vulnerabilities in a suitable time frame. The extent to which the rights and duties are set out on both sides of the CVD process will be examined. These rights and duties could include a holdback period before making vulnerabilities public or a binding deadline for patches or updates. A coordinated process will be put in place between the BSI and manufacturers which extends beyond the simple exchange of information. This will also apply to vulnerabilities in the IT supply chains of products and services (supply chain security).
          

            <a href="https://www.bmi.bund.de/SharedDocs/downloads/EN/themen/it-digital-policy/cyber-security-strategy-for-germany2021.pdf;jsessionid=D94F486E55F1DC58629FD013BEABAED2.live872?__blob=publicationFile&amp;v=4">https://www.bmi.bund.de/SharedDocs/downloads/EN/themen/it-digital-policy/cyber-…</a>
      ]]></description>
  <pubDate>Mon, 29 Jul 2024 20:15:42 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2365 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
