Skip to content

Commit

Permalink
fix spacing problem
Browse files Browse the repository at this point in the history
  • Loading branch information
ahouseholder committed Apr 25, 2024
1 parent 9444837 commit 94ef4ba
Show file tree
Hide file tree
Showing 3 changed files with 31 additions and 31 deletions.
4 changes: 2 additions & 2 deletions docs/reference/policy_templates/_policy_tips.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,10 +21,10 @@
In general, expectations of others should use "MAY", "SHOULD", "MUST", "MUST
NOT", "REQUIRED", or "OPTIONAL".

Expectations that the`ORGANIZATION` sets for itself should prefer "SHALL"
Expectations that the `ORGANIZATION` sets for itself should prefer "SHALL"
and "SHALL NOT" in place of "MUST" or "MUST NOT".

Similarly, it seems unlikely that`ORGANIZATION` would use "SHOULD" to refer to
Similarly, it seems unlikely that `ORGANIZATION` would use "SHOULD" to refer to
its own behavior, rather preferring to use "SHALL", "SHALL NOT", or "MAY"
formulations.

Expand Down
16 changes: 8 additions & 8 deletions docs/reference/policy_templates/receivers.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ or other organizations that receive vulnerability reports.

* `ORGANIZATION` MAY, at our discretion, decline to coordinate or publish a vulnerability report. This decision is generally based on the scope and severity of the vulnerability and our ability to add value to the coordination and disclosure process.

* In the event that`ORGANIZATION` declines to coordinate a vulnerability report, the Reporter SHOULD proceed to coordinate with any other affected vendor(s). Additionally, the Reporter MAY proceed with public disclosure at their discretion.
* In the event that `ORGANIZATION` declines to coordinate a vulnerability report, the Reporter SHOULD proceed to coordinate with any other affected vendor(s). Additionally, the Reporter MAY proceed with public disclosure at their discretion.

* `ORGANIZATION` SHALL investigate every reported vulnerability and strive to ensure that appropriate steps are taken to mitigate risk and remediate reported vulnerabilities.

Expand All @@ -38,15 +38,15 @@ or other organizations that receive vulnerability reports.

## Coordination with reporters

* `ORGANIZATION` SHALL acknowledge receipt of vulnerability reports via email within`SLC`.
* `ORGANIZATION` SHALL acknowledge receipt of vulnerability reports via email within `SLC`.

* `ORGANIZATION` MAY contact the Reporter for further information.

* `ORGANIZATION` SHALL inform the Reporter of the results of our validation, as appropriate, and accordingly provide status updates as remediation of the vulnerability is underway.

* `ORGANIZATION` SHALL include credit to the reporter in any published vulnerability report unless otherwise requested by the reporter.

* In the event that`ORGANIZATION` chooses to publicly disclose the reported vulnerability,`ORGANIZATION` SHALL recognize your contribution to improving our security if you are the first to report a unique vulnerability, and your report triggers a code or configuration change.
* In the event that `ORGANIZATION` chooses to publicly disclose the reported vulnerability, `ORGANIZATION` SHALL recognize your contribution to improving our security if you are the first to report a unique vulnerability, and your report triggers a code or configuration change.

* `ORGANIZATION` MAY forward the name and contact information of the Reporter to any affected vendors unless otherwise requested by the reporter.

Expand All @@ -60,7 +60,7 @@ or other organizations that receive vulnerability reports.

## Coordination with vendors

* In the event that`ORGANIZATION` determines the reported vulnerability is consequent to a vulnerability in a generally available product or service,`ORGANIZATION` MAY report the vulnerability to the affected vendor(s), service provider(s), or third party vulnerability coordination service(s) in order to enable the product or service to be fixed.
* In the event that `ORGANIZATION` determines the reported vulnerability is consequent to a vulnerability in a generally available product or service, `ORGANIZATION` MAY report the vulnerability to the affected vendor(s), service provider(s), or third party vulnerability coordination service(s) in order to enable the product or service to be fixed.

* `ORGANIZATION` SHALL make a good faith effort to inform vendors of reported vulnerabilities prior to public disclosure.

Expand All @@ -80,7 +80,7 @@ or other organizations that receive vulnerability reports.

## Coordination with others

* `ORGANIZATION` MAY engage the services of a third party coordination service (e.g., CERT/CC, DHS CISA) to assist in resolving any conflicts that cannot be resolved between the Reporter and`ORGANIZATION`.
* `ORGANIZATION` MAY engage the services of a third party coordination service (e.g., CERT/CC, DHS CISA) to assist in resolving any conflicts that cannot be resolved between the Reporter and `ORGANIZATION`.

* `ORGANIZATION` MAY, at our discretion, provide reported vulnerability information to anyone who can contribute to the solution and with whom we have a trusted relationship, including vendors (often including vendors whose products are not vulnerable), service providers, community experts, sponsors, and sites that are part of a national critical infrastructure, if we believe those sites to be at risk.

Expand All @@ -98,10 +98,10 @@ or other organizations that receive vulnerability reports.

* `ORGANIZATION`'s final determination of a publication schedule SHALL be based on the best interests of the community overall.

* `ORGANIZATION` SHALL publish public disclosures via`PUBLICATION CHANNEL`.
* `ORGANIZATION` SHALL publish public disclosures via `PUBLICATION CHANNEL`.

* `ORGANIZATION` MAY disclose to the public the prior existence of vulnerabilities already fixed by`ORGANIZATION`, including potentially details of the vulnerability, indicators of vulnerability, or the nature (but not content) of information rendered available by the vulnerability.
* `ORGANIZATION` MAY disclose to the public the prior existence of vulnerabilities already fixed by `ORGANIZATION`, including potentially details of the vulnerability, indicators of vulnerability, or the nature (but not content) of information rendered available by the vulnerability.

* `ORGANIZATION` SHALL make our disclosure determinations based on relevant factors such as but not limited to: whether the vulnerability has already been publicly disclosed, the severity of the vulnerability, potential impact to critical infrastructure, possible threat to public health and safety, immediate mitigations available, vendor responsiveness and feasibility for creating an upgrade or patch, and vendor estimate of time required for customers to obtain, test, and apply the patch. Active exploitation, threats of an especially serious nature, or situations that require changes to an established standard may result in earlier or later disclosure.

* `ORGANIZATION` MAY disclose product vulnerabilities`SLC` after the initial contact is made, regardless of the existence or availability of patches or workarounds from affected vendors in cases where a product is affected and the vendor is unresponsive, or fails to establish a reasonable timeframe for remediation.
* `ORGANIZATION` MAY disclose product vulnerabilities `SLC` after the initial contact is made, regardless of the existence or availability of patches or workarounds from affected vendors in cases where a product is affected and the vendor is unresponsive, or fails to establish a reasonable timeframe for remediation.
42 changes: 21 additions & 21 deletions docs/reference/policy_templates/reporters.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,90 +15,90 @@ Reporters MUST adhere to the following guidelines.

## General

* Reporters MUST comply with all applicable`JURISDICTION` laws in connection with security research activities or other participation in this vulnerability disclosure program.
* Reporters MUST comply with all applicable `JURISDICTION` laws in connection with security research activities or other participation in this vulnerability disclosure program.

* Reporters SHOULD make a good faith effort to notify and work directly with the affected vendor(s) or service providers prior to publicly disclosing vulnerability reports.

## Scope of Authorized Testing

* Reporters MAY test`SYSTEM SCOPE` to detect a vulnerability for the sole purpose of providing`ORGANIZATION` information about that vulnerability.
* Reporters MAY test `SYSTEM SCOPE` to detect a vulnerability for the sole purpose of providing `ORGANIZATION` information about that vulnerability.

* Reporters SHOULD only test against test accounts owned by the Reporter or with explicit permission from the account holder.

* Reporters MUST avoid harm to`ORGANIZATION`'s information systems and operations.
* Reporters MUST avoid harm to `ORGANIZATION`'s information systems and operations.

* Reporters MUST make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction or manipulation of data.

* Reporters MUST stop testing once that testing has established that a vulnerability exists, or sensitive data has been encountered. Sensitive data includes personally identifiable information, financial information (e.g., account numbers), proprietary information or trade secrets.

* Reporters MUST NOT test any services not expressly listed in`SYSTEM SCOPE`, including any connected services
* Reporters MUST NOT test any services not expressly listed in `SYSTEM SCOPE`, including any connected services

* Reporters MUST NOT exploit any vulnerability beyond the minimal amount of testing required to prove that the vulnerability exists or to identify an indicator related to that vulnerability.

* Reporters MUST NOT intentionally access the content of any communications, data, or information transiting or stored on`ORGANIZATION`'s information system(s) – except to the extent that the information is directly related to a vulnerability and the access is necessary to prove that the vulnerability exists.
* Reporters MUST NOT intentionally access the content of any communications, data, or information transiting or stored on `ORGANIZATION`'s information system(s) – except to the extent that the information is directly related to a vulnerability and the access is necessary to prove that the vulnerability exists.

* Reporters MUST NOT exfiltrate any data under any circumstances.

* Reporters MUST NOT intentionally compromise the privacy or safety of`ORGANIZATION`'s personnel, customers, the general public, or any legitimate third parties.
* Reporters MUST NOT intentionally compromise the privacy or safety of `ORGANIZATION`'s personnel, customers, the general public, or any legitimate third parties.

* Reporters MUST NOT use any exploit to compromise, alter, or exfiltrate data

* Reporters SHOULD NOT establish command line access and/or persistence

* Reporters MUST NOT exploit any vulnerabilities found to pivot to other systems.

* Reporters MUST NOT intentionally compromise the intellectual property or other commercial or financial interests of any`ORGANIZATION`'s personnel or entities, customers, or any legitimate third parties.
* Reporters MUST NOT intentionally compromise the intellectual property or other commercial or financial interests of any `ORGANIZATION`'s personnel or entities, customers, or any legitimate third parties.

* Reporters MUST NOT cause a denial of any legitimate services in the course of their testing.

* Reporters MUST NOT perform physical access testing (e.g. office access, open doors, tailgating, or other trespass).

* Reporters MUST NOT conduct social engineering in any form of`ORGANIZATION` personnel or contractors.
* Reporters MUST NOT conduct social engineering in any form of `ORGANIZATION` personnel or contractors.

* Reporters SHOULD contact`ORGANIZATION` at POINT OF CONTACT if at any point you are uncertain of whether to proceed with testing.
* Reporters SHOULD contact `ORGANIZATION` at POINT OF CONTACT if at any point you are uncertain of whether to proceed with testing.

## Coordination with `ORGANIZATION`

* Reporters SHOULD submit vulnerability reports to`ORGANIZATION` via`REPORTING CHANNEL`.
* Reporters SHOULD submit vulnerability reports to `ORGANIZATION` via `REPORTING CHANNEL`.

* Reporters MAY be eligible for one or more bug bounties. See`BUG BOUNTY` for details where applicable.
* Reporters MAY be eligible for one or more bug bounties. See `BUG BOUNTY` for details where applicable.

* Reporters SHOULD submit high quality reports.

* Reporters SHOULD include sufficient descriptive details to permit`ORGANIZATION` and/or the affected vendor(s) to accurately reproduce the vulnerable behavior.
* Reporters SHOULD include sufficient descriptive details to permit `ORGANIZATION` and/or the affected vendor(s) to accurately reproduce the vulnerable behavior.

* Reporters SHOULD NOT report unanalyzed crash dumps or fuzzer output unless accompanied by a sufficiently detailed explanation of how they represent a security vulnerability.

* Reporters SHOULD report other vulnerabilities found incidental to their in-scope testing even if those vulnerabilities would be otherwise considered out-of-scope. For example, while testing an in-scope system the reporter finds it to be exposing data from out-of-scope system. These are still reportable vulnerabilities.

* Reporters MUST keep confidential any information about vulnerabilities discovered for`SLC` after you have notified`ORGANIZATION`. Notwithstanding, this expectation does not preclude Reporters from simultaneously coordinating the vulnerability report with other affected parties (vendors, service providers, coordinators, etc.)
* Reporters MUST keep confidential any information about vulnerabilities discovered for `SLC` after you have notified `ORGANIZATION`. Notwithstanding, this expectation does not preclude Reporters from simultaneously coordinating the vulnerability report with other affected parties (vendors, service providers, coordinators, etc.)

* Reporters MAY include a proof-of-concept exploit if available.

* Reporters MAY request that their contact information be withheld from all affected vendor(s).

* Reporters MAY request not to be named in the acknowledgements of`ORGANIZATION`'s public disclosures.
* Reporters MAY request not to be named in the acknowledgements of `ORGANIZATION`'s public disclosures.

* Reporters MUST NOT submit a high-volume of low-quality reports.

* Reporters MUST NOT require`ORGANIZATION` to enter into a customer relationship, non-disclosure agreement (NDA) or any other contractual or financial obligation as a condition of receiving or coordinating vulnerability reports.
* Reporters MUST NOT require `ORGANIZATION` to enter into a customer relationship, non-disclosure agreement (NDA) or any other contractual or financial obligation as a condition of receiving or coordinating vulnerability reports.

* Reporters MUST NOT demand compensation in return for reporting vulnerability information reported outside of an explicit bug bounty program.

## Coordination with vendors

* In the event that the Reporter finds a vulnerability in a`ORGANIZATION``SYSTEM SCOPE` consequent to a vulnerability in a generally available product or service, the Reporter MAY report the vulnerability to the affected vendor(s), service provider(s), or third party vulnerability coordination service(s) in order to enable the product or service to be fixed.
* In the event that the Reporter finds a vulnerability in a `ORGANIZATION``SYSTEM SCOPE` consequent to a vulnerability in a generally available product or service, the Reporter MAY report the vulnerability to the affected vendor(s), service provider(s), or third party vulnerability coordination service(s) in order to enable the product or service to be fixed.

## Coordination with others

* Reporters MAY engage the services of a third party coordination service (e.g., CERT/CC, DHS CISA) to assist in resolving any conflicts that cannot be resolved between the Reporter and`ORGANIZATION`.
* Reporters MAY engage the services of a third party coordination service (e.g., CERT/CC, DHS CISA) to assist in resolving any conflicts that cannot be resolved between the Reporter and `ORGANIZATION`.

* Reporters SHOULD NOT disclose any details of any extant`ORGANIZATION``SYSTEM SCOPE` vulnerability, or any indicators of vulnerability to any party not already aware at the time the report is submitted to`ORGANIZATION`.
* Reporters SHOULD NOT disclose any details of any extant `ORGANIZATION``SYSTEM SCOPE` vulnerability, or any indicators of vulnerability to any party not already aware at the time the report is submitted to `ORGANIZATION`.

## Public disclosure

* Reporters MAY disclose to the public the prior existence of vulnerabilities already fixed by`ORGANIZATION`, including potentially details of the vulnerability, indicators of vulnerability, or the nature (but not content) of information rendered available by the vulnerability.
* Reporters MAY disclose to the public the prior existence of vulnerabilities already fixed by `ORGANIZATION`, including potentially details of the vulnerability, indicators of vulnerability, or the nature (but not content) of information rendered available by the vulnerability.

* Reporters choosing to disclose to the public SHOULD do so in consultation with`ORGANIZATION`.
* Reporters choosing to disclose to the public SHOULD do so in consultation with `ORGANIZATION`.

* Reporters MUST NOT disclose any incidental proprietary data revealed during testing or the content of information rendered available by the vulnerability to any party not already aware at the time the report is submitted to`ORGANIZATION`.
* Reporters MUST NOT disclose any incidental proprietary data revealed during testing or the content of information rendered available by the vulnerability to any party not already aware at the time the report is submitted to `ORGANIZATION`.

0 comments on commit 94ef4ba

Please sign in to comment.