Information technology - Security techniques - Vulnerability disclosure (ISO/IEC 29147:2018)

This document provides requirements and recommendations to vendors on the disclosure of
vulnerabilities in products and services. Vulnerability disclosure enables users to perform technical
vulnerability management as specified in ISO/IEC 27002:2013, 12.6.1[1]. Vulnerability disclosure helps
users protect their systems and data, prioritize defensive investments, and better assess risk. The goal
of vulnerability disclosure is to reduce the risk associated with exploiting vulnerabilities. Coordinated
vulnerability disclosure is especially important when multiple vendors are affected. This document
provides:
— guidelines on receiving reports about potential vulnerabilities;
— guidelines on disclosing vulnerability remediation information;
— terms and definitions that are specific to vulnerability disclosure;
— an overview of vulnerability disclosure concepts;
— techniques and policy considerations for vulnerability disclosure;
— examples of techniques, policies (Annex A), and communications (Annex B).
Other related activities that take place between receiving and disclosing vulnerability reports are
described in ISO/IEC 30111.
This document is applicable to vendors who choose to practice vulnerability disclosure to reduce risk
to users of vendors’ products and services.

Informationstechnik - Sicherheitstechniken - Bekanntgabe von Sicherheitslücken (ISO/IEC 29147:2018)

Technologies de l'information - Techniques de sécurité - Divulgation de vulnérabilité (ISO/IEC 29147:2018)

Informacijska tehnologija - Varnostne tehnike - Razkritje ranljivosti (ISO/IEC 29147:2018)

General Information

Status
Published
Public Enquiry End Date
31-Mar-2020
Publication Date
28-Jul-2020
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
18-Jun-2020
Due Date
23-Aug-2020
Completion Date
29-Jul-2020

Buy Standard

Standard
SIST EN ISO/IEC 29147:2020
English language
42 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN ISO/IEC 29147:2020
01-september-2020
Informacijska tehnologija - Varnostne tehnike - Razkritje ranljivosti (ISO/IEC
29147:2018)
Information technology - Security techniques - Vulnerability disclosure (ISO/IEC
29147:2018)
Informationstechnik - Sicherheitstechniken - Bekanntgabe von Sicherheitslücken
(ISO/IEC 29147:2018)

Technologies de l'information - Techniques de sécurité - Divulgation de vulnérabilité

(ISO/IEC 29147:2018)
Ta slovenski standard je istoveten z: EN ISO/IEC 29147:2020
ICS:
35.030 Informacijska varnost IT Security
SIST EN ISO/IEC 29147:2020 en,fr,de

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEC 29147:2020
---------------------- Page: 2 ----------------------
SIST EN ISO/IEC 29147:2020
EUROPEAN STANDARD
EN ISO/IEC 29147
NORME EUROPÉENNE
EUROPÄISCHE NORM
May 2020
ICS 35.030
English version
Information technology - Security techniques -
Vulnerability disclosure (ISO/IEC 29147:2018)

Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitstechniken -

- Divulgation de vulnérabilité (ISO/IEC 29147:2018) Offenlegung von Schwachstellen (ISO/IEC

29147:2018)
This European Standard was approved by CEN on 3 May 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for

giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical

references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to

any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by

translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC

Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,

Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,

Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,

Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels

© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 29147:2020 E

reserved worldwide for CEN national Members and for
CENELEC Members.
---------------------- Page: 3 ----------------------
SIST EN ISO/IEC 29147:2020
EN ISO/IEC 29147:2020 (E)
Contents Page

European foreword ....................................................................................................................................................... 3

---------------------- Page: 4 ----------------------
SIST EN ISO/IEC 29147:2020
EN ISO/IEC 29147:2020 (E)
European foreword

The text of ISO/IEC 29147:2018 has been prepared by Technical Committee ISO/IEC JTC 1 "Information

technology” of the International Organization for Standardization (ISO) and has been taken over as

EN ISO/IEC 29147:2020 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and Data Protection”

the secretariat of which is held by DIN.

This European Standard shall be given the status of a national standard, either by publication of an

identical text or by endorsement, at the latest by November 2020, and conflicting national standards

shall be withdrawn at the latest by November 2020.

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. CEN shall not be held responsible for identifying any or all such patent rights.

According to the CEN-CENELEC Internal Regulations, the national standards organizations of the

following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,

Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,

Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of

North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the

United Kingdom.
Endorsement notice

The text of ISO/IEC 29147:2018 has been approved by CEN as EN ISO/IEC 29147:2020 without any

modification.
---------------------- Page: 5 ----------------------
SIST EN ISO/IEC 29147:2020
---------------------- Page: 6 ----------------------
SIST EN ISO/IEC 29147:2020
INTERNATIONAL ISO/IEC
STANDARD 29147
Second edition
2018-10
Information technology — Security
techniques — Vulnerability disclosure
Technologies de l'information — Techniques de sécurité —
Divulgation de vulnérabilité
Reference number
ISO/IEC 29147:2018(E)
ISO/IEC 2018
---------------------- Page: 7 ----------------------
SIST EN ISO/IEC 29147:2020
ISO/IEC 29147:2018(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2018

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting

on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address

below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2018 – All rights reserved
---------------------- Page: 8 ----------------------
SIST EN ISO/IEC 29147:2020
ISO/IEC 29147:2018(E)
Contents Page

Foreword ........................................................................................................................................................................................................................................vi

Introduction ..............................................................................................................................................................................................................................vii

1 Scope ................................................................................................................................................................................................................................. 1

2 Normative references ...................................................................................................................................................................................... 1

3 Terms and definitions ..................................................................................................................................................................................... 1

4 Abbreviated terms .............................................................................................................................................................................................. 3

5 Concepts ........................................................................................................................................................................................................................ 3

5.1 General ........................................................................................................................................................................................................... 3

5.2 Structure of this document ........................................................................................................................................................... 3

5.3 Relationships to other International Standards ......................................................................................................... 4

5.3.1 ISO/IEC 30111 ................................................................................................................................................................... 4

5.3.2 ISO/IEC 27002 ................................................................................................................................................................... 5

5.3.3 ISO/IEC 27034 series ........................................................................................................................................... ........ 6

5.3.4 ISO/IEC 27036-3 .............................................................................................................................................................. 6

5.3.5 ISO/IEC 27017 ................................................................................................................................................................... 6

5.3.6 ISO/IEC 27035 series ........................................................................................................................................... ........ 6

5.3.7 Security evaluation, testing and specification ........................................................................................ 6

5.4 Systems, components, and services ...................................................................................................................................... 6

5.4.1 Systems .................................................................................................................................................................................... 6

5.4.2 Components ......................................................................................................................................................................... 6

5.4.3 Products .................................................................................................................................................................................. 6

5.4.4 Services .................................................................................................................................................................................... 7

5.4.5 Vulnerability ........................................................................................................................................................................ 7

5.4.6 Product interdependency......................................................................................................................................... 7

5.5 Stakeholder roles .................................................................................................................................................................................. 8

5.5.1 General...................................................................................................................................................................................... 8

5.5.2 User ............................................................................................................................................................................................. 8

5.5.3 Vendor ....................................................................................................................................................................................... 8

5.5.4 Reporter .................................................................................................................................................................................. 8

5.5.5 Coordinator .......................................................................................................................................................................... 9

5.6 Vulnerability handling process summary ........................................................................................................................ 9

5.6.1 General...................................................................................................................................................................................... 9

5.6.2 Preparation ........................................................................................................................................................................10

5.6.3 Receipt ...................................................................................................................................................................................10

5.6.4 Verification .........................................................................................................................................................................11

5.6.5 Remediation development ...................................................................................................................................11

5.6.6 Release ...................................................................................................................................................................................11

5.6.7 Post-release .......................................................................................................................................................................12

5.6.8 Embargo period .............................................................................................................................................................12

5.7 Information exchange during vulnerability disclosure.....................................................................................12

5.8 Confidentiality of exchanged information ....................................................................................................................13

5.8.1 General...................................................................................................................................................................................13

5.8.2 Secure communications ..........................................................................................................................................13

5.9 Vulnerability advisories ...............................................................................................................................................................13

5.10 Vulnerability exploitation ...........................................................................................................................................................14

5.11 Vulnerabilities and risk .................................................................................................................................................................14

6 Receiving vulnerability reports .........................................................................................................................................................14

6.1 General ........................................................................................................................................................................................................14

6.2 Vulnerability reports .......................................................................................................................................................................14

6.2.1 General...................................................................................................................................................................................14

6.2.2 Capability to receive reports ..............................................................................................................................14

6.2.3 Monitoring ..........................................................................................................................................................................15

© ISO/IEC 2018 – All rights reserved iii
---------------------- Page: 9 ----------------------
SIST EN ISO/IEC 29147:2020
ISO/IEC 29147:2018(E)

6.2.4 Report tracking ..............................................................................................................................................................15

6.2.5 Report acknowledgement .....................................................................................................................................15

6.3 Initial assessment ..............................................................................................................................................................................16

6.4 Further investigation ......................................................................................................................................................................16

6.5 On-going communication ...........................................................................................................................................................16

6.6 Coordinator involvement ............................................................................................................................................................16

6.7 Operational security ........................................................................................................................................................................17

7 Publishing vulnerability advisories ..............................................................................................................................................17

7.1 General ........................................................................................................................................................................................................17

7.2 Advisory .....................................................................................................................................................................................................17

7.3 Advisory publication timing .....................................................................................................................................................17

7.4 Advisory elements ............................................................................................................................................................................18

7.4.1 General...................................................................................................................................................................................18

7.4.2 Identifiers ............................................................................................................................................................................18

7.4.3 Date and time ...................................................................................................................................................................18

7.4.4 Title ..........................................................................................................................................................................................19

7.4.5 Overview ..............................................................................................................................................................................19

7.4.6 Affected products .........................................................................................................................................................19

7.4.7 Intended audience .......................................................................................................................................................19

7.4.8 Localization .......................................................................................................................................................................19

7.4.9 Description .................. .................................................... ...................................................................................................19

7.4.10 Impact ....................................................................................................................................................................................19

7.4.11 Severity .................................................................................................................................................................................20

7.4.12 Remediation ......................................................................................................................................................................20

7.4.13 References ..........................................................................................................................................................................20

7.4.14 Credit ...................................................................... .................................................................................................................20

7.4.15 Contact information ...................................................................................................................................................20

7.4.16 Revision history .............................................................................................................................................................20

7.4.17 Terms of use ......................................................................................................................................................................20

7.5 Advisory communication ............................................................................................................................................................20

7.6 Advisory format ..................................................................................................................................................................................21

7.7 Advisory authenticity .....................................................................................................................................................................21

7.8 Remediations .........................................................................................................................................................................................21

7.8.1 General...................................................................................................................................................................................21

7.8.2 Remediation authenticity ......................................................................................................................................21

7.8.3 Remediation deployment ......................................................................................................................................21

8 Coordination ..........................................................................................................................................................................................................21

8.1 General ........................................................................................................................................................................................................21

8.2 Vendors playing multiple roles ..............................................................................................................................................22

8.2.1 General...................................................................................................................................................................................22

8.2.2 Vulnerability reporting among vendors ...................................................................................................22

8.2.3 Reporting vulnerability information to other vendors ................................................................22

9 Vulnerability disclosure policy ...........................................................................................................................................................22

9.1 General ........................................................................................................................................................................................................22

9.2 Required policy elements ...........................................................................................................................................................23

9.2.1 General...................................................................................................................................................................................23

9.2.2 Preferred contact mechanism ...........................................................................................................................23

9.3 Recommended policy elements.............................................................................................................................................23

9.3.1 General...................................................................................................................................................................................23

9.3.2 Vulnerability report contents .................. ...........................................................................................................23

9.3.3 Secure communication options ........................................................................................................................24

9.3.4 Setting communication expectations ..........................................................................................................24

9.3.5 Scope .......................................................................................................................................................................................24

9.3.6 Publication .........................................................................................................................................................................24

9.3.7 Recognition ........................................................................................................................................................................24

9.4 Optional policy elements .............................................................................................................................................................24

9.4.1 General...................................................................................................................................................................................24

iv © ISO/IEC 2018 – All rights reserved
---------------------- Page: 10 ----------------------
SIST EN ISO/IEC 29147:2020
ISO/IEC 29147:2018(E)

9.4.2 Legal considerations ..................................................................................................................................................24

9.4.3 Disclosure timeline .....................................................................................................................................................24

Annex A (informative) Example vulnerability disclosure policies .....................................................................................25

Annex B (informative) Information to request in a report .........................................................................................................26

Annex C (informative) Example advisories .................................................................................................................................................27

Annex D (informative) Summary of normative elements ............................................................................................................30

Bibliography .............................................................................................................................................................................................................................32

© ISO/IEC 2018 – All rights reserved v
---------------------- Page: 11 ----------------------
SIST EN ISO/IEC 29147:2020
ISO/IEC 29147:2018(E)
Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that

are members of ISO or IEC participate in the development of International Standards through

technical committees established by the respective organization to deal with particular fields of

technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other

international organizations, governmental and non-governmental, in liaison with ISO and IEC, also

take part in the work.

The procedures used to develop this document and those intended for its further maintenance are

described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for

the different types of document should be noted. This document was drafted in accordance with the

editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/directives).

Attention is drawn to the possibility that some of the elements of this document may be the subject

of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent

rights. Details of any patent rights identified during the development of the document will be in the

Introduction and/or on the ISO list of patent declarations received (see www .iso .org/patents) or the IEC

list of patent declarations received (see http: //patents .iec .ch).
Any trade name used in this document is informati
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.