16.2: Establish and Maintain a Process to Accept and Address Software Vulnerabilities
CSF v1.1 References:
Threats Addressed:
Previous Version:
- Critical Security Controls Version 7.1:
- 18.8: Establish a Process to Accept and Address Reports of Software Vulnerabilities
Control Statement
Establish and maintain a process to accept and address reports of software vulnerabilities, including providing a means for external entities to report. The process is to include such items as: a vulnerability handling policy that identifies reporting process, responsible party for handling vulnerability reports, and a process for intake, assignment, remediation, and remediation testing. As part of the process, use a vulnerability tracking system that includes severity ratings, and metrics for measuring timing for identification, analysis, and remediation of vulnerabilities. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
Third-party application developers need to consider this an externally-facing policy that helps to set expectations for outside stakeholders.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]