16.2: Establish and Maintain a Process to Accept and Address Software Vulnerabilities

CSF v1.1 References:

Threats Addressed:


Previous Version:

Control Statement

Establish and maintain a process to accept and address reports of software vulnerabilities, including providing a means for external entities to report. The process is to include such items as: a vulnerability handling policy that identifies reporting process, responsible party for handling vulnerability reports, and a process for intake, assignment, remediation, and remediation testing. As part of the process, use a vulnerability tracking system that includes severity ratings, and metrics for measuring timing for identification, analysis, and remediation of vulnerabilities. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.

Third-party application developers need to consider this an externally-facing policy that helps to set expectations for outside stakeholders.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]