• There are no items in your cart

ISO/IEC 29147:2018

Current

Current

The latest, up-to-date edition.

Information technology — Security techniques — Vulnerability disclosure

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Language(s)

English, French

Published date

23-10-2018

€144.00
Excluding VAT

This document provides requirements and recommendations to vendors on the disclosure of vulnerabilities in products and services. Vulnerability disclosure enables users to perform technical vulnerability management as specified in ISO/IEC 27002:2013, 12.6.1[1]. Vulnerability disclosure helps users protect their systems and data, prioritize defensive investments, and better assess risk. The goal of vulnerability disclosure is to reduce the risk associated with exploiting vulnerabilities. Coordinated vulnerability disclosure is especially important when multiple vendors are affected. This document provides:

— guidelines on receiving reports about potential vulnerabilities;

— guidelines on disclosing vulnerability remediation information;

— terms and definitions that are specific to vulnerability disclosure;

— an overview of vulnerability disclosure concepts;

— techniques and policy considerations for vulnerability disclosure;

— examples of techniques, policies (Annex A), and communications (Annex B).

Other related activities that take place between receiving and disclosing vulnerability reports are described in ISO/IEC 30111.

This document is applicable to vendors who choose to practice vulnerability disclosure to reduce risk to users of vendors' products and services.

Committee
ISO/IEC JTC 1/SC 27
DocumentType
Standard
Pages
32
ProductNote
THIS STANDARDS ALSO REFERS TO :ITU-T X.1520,ITU-T X.1521,ITU-T X.1524,ISO/IEC 15408,ISO/IEC 18405,
PublisherName
International Organization for Standardization
Status
Current
Supersedes

INCITS/ISO/IEC 27035-1:2016(2019) Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management
INCITS/ISO/IEC 30111:2013(R2019) Information technology - Security techniques - Vulnerability handling processes
AAMI TIR57:2016(R2023) Principles for medical device security—Risk management

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.