Published on JD Supra on December 3, 2019
On November 27, 2019, the Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security (DHS) released for public comment a draft of Binding Operational Directive 20-01, Develop and Publish a Vulnerability Disclosure Policy (the “Directive”). Pursuant to the Directive, Executive Branch agencies are required to develop and publish a procedure pursuant to which members of the public can report discovered vulnerabilities without fear of prosecution. The Directive is also accompanied by a draft coordinated vulnerability disclosure policy.
Today there is no consistency among Federal agencies with respect to the establishment or operation of vulnerability disclosure programs (VDPs). Although agencies such as the Department of Defense and the General Services Administration already have published VDPs, many Federal agencies have no strategy at all for handling third party vulnerability reports. Only a few have formally acknowledged that good faith reporters will be exempted from prosecution under the Computer Fraud and Abuse Act of 1986, which prohibits third parties from accessing computer systems without authorization. This has created a situation where individuals with knowledge of vulnerabilities in governmental systems are not reporting the vulnerabilities, thereby leaving governmental systems at greater risk of attack.
By requiring VDPs, CISA is hoping to foster collaboration between the public and the government as well as promote a stronger governmental infrastructure. CISA noted in its press release: “A key benefit of a vulnerability disclosure policy is to reduce risk to agency infrastructure and the public by incentivizing coordinated disclosure so there is time to fix the vulnerability before it is publicly known.” In addition, the Directive establishes a clear baseline for policy across agencies.
Pursuant to the Directive, Executive Branch agencies must:
Furthermore, when creating a VDP, agencies should not: (i) require a reporter to personally identify themselves; (ii) limit participation to US citizens; or (iii) require reporters to keep the uncovered vulnerability confidential for longer than a prescribed and limited period of time. The last requirement is designed to ensure that the agency acts in a timely and responsible manner to investigate and resolve the vulnerability. While each VDP will vary based on the needs of the particular agency, 90 days is a good benchmark for the time period during which reporters may be required to keep the information confidential.
The public sector has long used “bug bounty” programs to provide financial incentives for individuals to report identified vulnerabilities. While the Directive stops short of requiring agencies to offer financial rewards, agencies are permitted to do so. The overarching goal of the Directive is to create and foster an environment where good faith security research on specific, internet-accessible systems is welcomed and authorized by all Executive Branch agencies.
DHS is authorized by the Federal Information Security Modernization Act of 2014 (44 U.S.C. §3553(b)(2)) to issue and oversee Binding Operational Directives. These directives are binding on departments and agencies of the Executive Branch of the Federal government, although they do not apply to certain statutorily identified national security and intelligence systems or the Department of Defense.
The VDP Directive is the first ever for which DHS has solicited public comment. The public and constituent agencies are invited to comment on the Directive via email or GitHub until 11:59 PM on December 27, 2019.