Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

A Vulnerability Disclosure Game Changer

Two new ISO standards will push third-party developers, online service providers and even hardware vendors to stop ignoring vulnerability disclosures

SAN FRANCISCO -- RSA CONFERENCE 2013 --Two new standards on the horizon in 2013 could prod ISVs, hardware makers and online services developers to start to address the black hole around how they handle responsible vulnerability disclosures and triage after vulnerabilities are found within in-house software, web apps and firmware. So says bug-finding maven Katie Moussouris, senior security strategist for the Microsoft Security Response Center and a former @stake penetration tester, who held court at a jam-packed and encored session at RSA this week about how the impending publication of two ISO standards will be a game changer for when "friendly hackers come a knockin'" on an enterprise's doors.

RSA Conference 2013
Click here for more articles.

"A lot of people wonder, how do i know if I'm going to have to be compliant with these standards?" For those of you who do business on a global scale, you will note that it is often a pre-purchasing prerequisite requirement to be ISO compliant with certain standards," Moussouris says. "I'm guessing that at least one of these will be on a customer's required list in the near future. This is why its important for you to learn about it now."

The first, ISO 29147, governs how well organizations "roll out the red carpet" for researchers seeking to inform them about vulnerabilities in their systems, says Moussouris. Most notable in the standard is a requirement that organizations make it obvious to researchers who they should contact to disclose.

"Hackers have a hard time figuring out where to report security vulnerabilities. If you don't make the front door really obvious the back door will be used and it could end up that a frustrated hacker ends up calling up the Wall Street Journal," she says. "There are a number of different customer support email addresses they can try, web forms and what not. The standard coming up will say, thou shalt have some way for external parties to report."

In the same vein, the new standard also defines a seven-day window for responding to researchers to just let them know that their disclosure was received. Though the standard doesn't specify how quickly organizations need to address the vulnerability itself, it does offer guidance on how to coordinate with the researcher and how to create advisories to customers once the fix has been made. It also includes information about how the processes should work in concert with the other corresponding standard, ISO 30111, which governs the process and organizational structure built to support vulnerability remediation regardless of whether an outside hacker finds vulns or an internal worker finds them.

"The insertion point into this process is, potential vulnerability acquired, now what? That's where we're picking up," says Moussouris, who is an editor for the yet-to-be published standard.

The standard offers guidance on how to build a framework to quickly address vulnerabilities through the five-stage process of receipt of vulnerability information, verification of the vulnerability, resolution development, release of the fix and post-release communication to ensure customers implement the fix. The standard addresses how organizations should be communicating internally to get a fix developed, how vulnerability information should be protected within internal systems, and how communication with customers should be carried out.

Additionally, the specification requires organizations address the all important task of root cause analysis, she says.

"This seems like captain obvious talking, but you'd be surprised. In my years of doing vulnerability reporting and coordination, you would be shocked at how many organizations will take a vulnerability report, patch that one vector you've shown them through proof of concept and not do a root cause analysis," Moussouris says. "They have no idea what's actually causing the vuln."

As she explains, root cause analysis should ideally be fed back into the security development lifecycle so that organizations can stop making the same mistakes over and over again.

According to Moussouris, both standards are on track for release in the latter half of 2013 or late 2014. She believes that they will both go a long way towards pushing third-party vendors into a more mature set of processes around vulnerability remediation.

"A lot of companies for a very long time got away with essentially just ignoring a lot of vulnerability reports," she says. "If you want to do business with certain organizations, especially governments that think ISO compliance is very important for security assurance, you are actually going to have to respond. It will be in the standard."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5243
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
CVE-2019-14688
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
CVE-2019-19694
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...
CVE-2020-5242
PUBLISHED: 2020-02-20
openHAB before 2.5.2 allow a remote attacker to use REST calls to install the EXEC binding or EXEC transformation service and execute arbitrary commands on the system with the privileges of the user running openHAB. Starting with version 2.5.2 all commands need to be whitelisted in a local file whic...
CVE-2020-8601
PUBLISHED: 2020-02-20
Trend Micro Vulnerability Protection 2.0 is affected by a vulnerability that could allow an attack to use the product installer to load other DLL files located in the same directory.