Final | June 2020 | v1.0.0 | OFFICIAL - Public | Cyber Security Unit
Vulnerability disclosure is a process through which individuals, such as users, vendors or security researches work together to find solutions that reduce risks associated with a vulnerability. It encompasses actions such as reporting, coordinating, and publishing information about a vulnerability and its resolution.
The Vulnerability disclosure guideline provides information for departments on:
This guideline is based on ISO/IEC 29147 Information Technology Security Techniques Vulnerability Disclosure.
This guideline will assist departments in managing vulnerability risks discovered by individuals. Specifically, it will:
This document is primarily intended for Queensland Government departments. It will be of specific interest to:
This guideline supports the Information and cyber security policy (IS18).
Information relating to incident management is outside the scope of the guideline and departments should refer to the Incident management guideline.
Information relating to vulnerability management is also outside the scope of this guideline and departments should refer to the Vulnerability management guideline.
Queensland Government seeks to build a trusted environment for individuals to disclose vulnerabilities in our products and systems. Departments should encourage responsible security research through online communication channels, websites and/or direct communication.
The meaning of responsible security research should be clearly defined and published to ensure a clear understanding between departments and researchers. Clear messages published on department websites can be very useful for this purpose.
Departments are encouraged not to pursue legal action against anyone who acts in good faith in relation to the discovery and reporting of a potential security vulnerability, provided the vulnerability is disclosed in accordance with the departments responsible disclosure statement (subject to legal and regulatory requirements).
Departments should set expectations for the type and format of information required when individuals are disclosing a vulnerability.
When disclosing a vulnerability, individuals should be encouraged to:
Where applicable, individuals should also be encouraged to include:
While departments are still building their vulnerability disclosure capability, a statement is available on the Queensland Government Enterprise Architecture website. The Cyber Security Unit (CSU) will collect, analyse, and forward vulnerability reports to the relevant department(s).
Departments should set expectations for communication mechanisms and timeframes when individuals disclose a vulnerability.
After receiving a vulnerability disclosure from an individual, departments should:
Departments should also ensure any vulnerability disclosure program or policy includes a mechanism for escalation should the individual be unsatisfied with the outcome of the disclosure process. Departments may choose to refer individuals to CSU as part of their escalation process.
Departments should not offer compensation to individuals or organisations for disclosing potential or confirmed vulnerabilities outside of authorised bug bounty programs.
If a department discovers or becomes aware of a vulnerability in the products or services used by the department, an attempt should be made to disclose the vulnerability to the vendor or service provider.
When disclosing a vulnerability to a vendor or service provider, departments should:
Once the vulnerability has been disclosed to the vendor or service provider, departments should remain in contact with the vendor or service provider. If a vendor or service provider does not respond to communication attempts, the department should continue to attempt to make contact until 60 days after the first failed attempt.
Departments should allow at least 90 days for the vendor or service provider to mitigate or remediate the vulnerability before further action is taken. Where appropriate, departments should work with vendors/service providers to make reasonable adjustments to this timeline. In the case that vendors or service providers take longer than 60 days to respond to a communication attempt regarding the vulnerability disclosure or fail to complete a process to address the disclosed vulnerability within the time period negotiated with the disclosing department (90 days by default), departments are encouraged to notify CSU at cybersecurity@qld.gov.au.
Your browser is not supported. Some functionality might not work as expected.
Please upgrade your browser to a version on the supported browser list