Section 22.217 Vulnerability Reporting Flashcards

Objective 4.3 Explain various activities associated with vulnerability management

1
Q

Vulnerability Reporting

A

Process of documenting and communicating security weaknesses in software or systems to individuals and organizations responsible for addressing the issues

■ Reports should use clear, concise, and transparent language

■ Confidentiality is crucial to prevent exploitation, reputation damage, and legal repercussions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internal Reporting

A

First line of defense in vulnerability management within the organization

■ Identifying, documenting, and communicating vulnerabilities within the organisational structure

■ Information remains internal

■ Timely reporting reduces exposure to unpatched vulnerabilities

■ Establish clear communication paths and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

External Reporting

A

Reporting vulnerabilities outside the organization, involving vendors, partners, customers, or the public

■ Coordinating with vendors to address vulnerabilities for the benefit of all customers

■ Sharing non-sensitive details with databases like CVE or vendor knowledge bases

■ Respect privacy when discussing vulnerabilities with external organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsible Disclosures

A

Ethical and judicious disclosure to affected stakeholders before public
announcement

■ Collaborate with the entity responsible for the vulnerability (e.g software developer)

■ Consider bug bounty programs

■ Give vendors time to address the issue before public disclosure

■ Provide detailed reports, including methods used to exploit vulnerabilities and recommended mitigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Importance of Confidentiality

A

Confidentiality is non-negotiable to prevent exploitation

■ Vulnerability reports are valuable maps for attackers

■ Encrypt reports and use secure storage

■ Share reports on a need-to-know basis

■ Consider executive summaries for non-technical stakeholders

■ Breaching confidentiality can lead to exploitation, reputation damage, and legal repercussions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly