You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
Version 1
Next »
Introduction
- Vulnerability Management is the process to handle security incidents.
- x
Resources
- Vulnerability Reports
- Vulnerability Verification
- Change Proposals
- Changes
Vulnerability Management Process
Vulnerability Reporting
- Reports about vulnerabilities are forwarded to SOS
- Detection of vulnerabilities includes both the SOS software product and any 3rd party libraries included with the software product.
- Sources of vulnerability detection in source code of SOS software products include
- automated scans performed by source code repositories,
- security audits performed by users and customers for example for pen-testing,
- security breaches reported by users and customers.
- SOS tracks vulnerabilities in 3rd party open source libraries by automated scans provided by source code repositories,
- Users are advised to use private e-mail to report vulnerabilities.
Vulnerability Verification
- After receipt of a vulnerability report SOS sets up a Vulnerability Task Force to reproduce and to identify a reported vulnerability.
- This includes to identify affected releases of the software product.
- This includes to evaluate risks for a given vulnerability.
- This step typically is completed within 24 hours after receipt of a respective report.
- If a vulnerability is confirmed then the task force will
- request a CVE ID from https://www.mitre.org/ and provide the respective CVE report.
- add a private Change Request to the Change Management System
- report back to the vulnerability reporter about the assigned CVE ID. This step is completed immediately after receipt of a CVE ID and depends on mitre.org response times.
Vulnerability Risk Mitigation
- Depending on the security risks identified with the previous step for verification of a vulnerability the following applies:
- for high-risk and for medium-risk vulnerabilities an alert is provided to customers who subscribe to this type of notification with their product support option.
- for low-risk vulnerabilities no information is provided to customers.
- Based on the criticality a release date is determined:
- For high-risk and for medium-risk vulnerabilities an immediate maintenance release date is planned for branches of the software product that are under maintenance.
- For low-risk vulnerabilities the typical release cycle of approx. 3 months or earlier is applied.
Vulnerability Fixes
- Fixes are provided for any branches of the software product that are under maintenance.
- Fixes are not made publicly available with the GitHub Source Code Repositories.
- Fixes include the procedure to approve that an exploit of the vulnerability is no longer applicable.
- For high-risk and for medium-risk vulnerabilities this steps typically is completed within five business days.
Vulnerability Communication
- With fixes being available the following applies:
- Fixes provided for any branches under maintenance are communicated at the same point in time.