Good Practice Guide on Vulnerability Disclosure

From Challenges to Recommendations

Nicole van der Meulen, Salil Gunashekar, Stefan Soesanto, Eun A Jo

ResearchPosted on rand.org Apr 27, 2016Published in: Good Practice Guide on Vulnerability Disclosure: From Challenges to Recommendations, Nov. 2015, p. 1-92

Vulnerabilities are 'flaws' or 'mistakes' in computer-based systems that may be exploited to compromise the network and information security of affected systems. They provide a point-of-entry or gateway to exploit a system and as such pose potentially severe security risks. Fixing vulnerabilities is therefore crucial and the process of disclosing vulnerabilities is a vital component that cannot be underestimated. The vulnerability disclosure landscape is complex, with several stakeholders involved that include vendors, IT security providers, independent researchers, the media, malicious users, governments and, ultimately, the general public. These stakeholders often have competing interests, which results in a challenging landscape. In the specific context of the vulnerability disclosure process, this study seeks to achieve the following primary objectives: --take stock of the current situation in vulnerability disclosure; --identify the challenges of the current situation with respect to vulnerability disclosure; --identify good practices; --propose recommendations for improvements to address the challenges and enhance the adoption of good practices.

Topics

Document Details

  • Availability: Non-RAND
  • Year: 2015
  • Pages: 92
  • Document Number: EP-66448

Research conducted by

This publication is part of the RAND external publication series. Many RAND studies are published in peer-reviewed scholarly journals, as chapters in commercial books, or as documents published by other organizations.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.