Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Computer Security Incident Response Team (CSIRT)

...

A

...

Computer

...

Security

...

Incident

...

Response

...

Team

...

(CSIRT)

...

is

...

a

...

service

...

organization

...

that

...

is

...

responsible

...

for

...

receiving,

...

reviewing,

...

and

...

responding

...

to

...

computer

...

security

...

incident

...

reports

...

and

...

activity.

...

Their

...

services

...

are

...

usually

...

performed

...

for

...

a

...

defined

...

constituency

...

that

...

could

...

be

...

a

...

parent

...

entity

...

such

...

as

...

a

...

corporate,

...

governmental,

...

or

...

educational

...

organization;

...

a

...

region

...

or

...

country;

...

a

...

research

...

network;

...

or

...

a

...

paid

...

client.

...

A

...

CSIRT

...

can

...

be

...

a

...

formalized

...

team

...

or

...

an

...

ad-hoc

...

team.

...

A

...

formalized

...

team

...

performs

...

incident

...

response

...

work

...

as

...

its

...

major

...

job

...

function.

...

An

...

ad-hoc

...

team

...

is

...

called

...

together

...

during

...

an

...

ongoing

...

computer

...

security

...

incident

...

or

...

to

...

respond

...

to

...

an

...

incident

...

when

...

the

...

need

...

arises

...

[1].

CSIRT with National Responsibility

...

CSIRTs

...

with

...

National

...

Responsibility,

...

also

...

known

...

as

...

, National

...

CSIRTs

...

,

...

are

...

designated

...

by

...

a

...

country

...

or

...

economy

...

to

...

have

...

specific

...

responsibilities

...

in

...

cyber

...

protection

...

for

...

the

...

country

...

or

...

economy.

...

A

...

National

...

CSIRT

...

can

...

be

...

inside

...

or

...

outside

...

of

...

government,

...

but

...

must

...

be

...

specifically

...

recognized

...

by

...

the

...

government

...

as

...

having

...

responsibility

...

in

...

the

...

country

...

or

...

economy

...

[2].

...

In

...

addition

...

to

...

functioning

...

as

...

a

...

clearing

...

house

...

for

...

incident

...

response

...

across

...

government

...

departments

...

and

...

agencies,

...

CSIRTs

...

with

...

National

...

Responsibility

...

often

...

have

...

some

...

degree

...

of

...

responsibility

...

or

...

oversight

...

for

...

coordinating

...

vulnerability

...

response

...

across

...

their

...

nation's

...

critical

...

infrastructure.

...

US-CERT,

...

part

...

of

...

the

...

Department

...

of

...

Homeland

...

Security,

...

has

...

been

...

designated

...

as

...

the

...

national

...

CSIRT

...

for

...

the

...

United

...

States.

...

We

...

maintain

...

a

...

list

...

of

...

National

...

CSIRTS

...

on

...

the

...

CERT

...

website

...

[3].

Product Security Incident Response Team (PSIRT)

...

Over

...

time,

...

Product

...

Security

...

Incident

...

Response

...

Teams

...

(PSIRTs)

...

have

...

emerged

...

as

...

a

...

specialized

...

form

...

of

...

CSIRT,

...

allowing

...

vendors

...

to

...

focus

...

their

...

response

...

to

...

product

...

security

...

issues.

...

Although

...

not

...

all

...

vendors

...

have

...

dedicated

...

PSIRTs,

...

vulnerability

...

response

...

is

...

sufficiently

...

different

...

from

...

security

...

incident

...

response

...

that

...

larger

...

vendor

...

organizations

...

can

...

usually

...

justify

...

having

...

a

...

distinct

...

function

...

to

...

deal

...

with

...

it.

...

PSIRTs

...

usually

...

provide

...

an

...

interface

...

to

...

the

...

outside

...

world

...

to

...

receive

...

vulnerability

...

reports

...

as

...

well

...

as

...

serving

...

as

...

a

...

central

...

coordinator

...

between

...

internal

...

departments

...

for

...

the

...

organization's

...

vulnerability

...

response

...

for

...

its

...

products.

...

When

...

reporting

...

a

...

vulnerability

...

to

...

a

...

vendor,

...

the

...

reporter

...

will

...

usually

...

be

...

communicating

...

with

...

the

...

vendor's

...

PSIRT.

...

For

...

example,

...

Cisco,

...

Oracle,

...

Intel,

...

Microsoft,

...

Apple,

...

Adobe,

...

and

...

others

...

have

...

established

...

internal

...

PSIRTs.

...

Many

...

PSIRTs

...

participate

...

in

...

the

...

Forum

...

for

...

Incident

...

Response

...

and

...

Security

...

Teams

...

[4].

Security Research Organizations

...

Bug Bounties and Commercial Brokers

...

In

...

recent

...

years,

...

a

...

new

...

class

...

of

...

coordinator

...

has

...

emerged

...

in

...

the

...

form

...

of

...

commercial

...

bug

...

bounty

...

program

...

providers.

...

Many

...

individual

...

vendors

...

have

...

established

...

programs

...

to

...

compensate

...

security

...

researchers

...

for

...

their

...

efforts

...

in

...

discovering

...

vulnerabilities

...

in

...

the

...

vendor's

...

products.

...

Creation

...

of

...

a

...

bug

...

bounty

...

program

...

has

...

been

...

noted

...

as

...

an

...

indicator

...

of

...

maturity

...

in

...

vendors'

...

vulnerability

...

response

...

efforts.

...

In

...

some

...

cases,

...

vendor

...

bug

...

bounty

...

programs

...

are

...

enabled

...

by

...

other

...

companies

...

that

...

provide

...

tools

...

and

...

services

...

to

...

facilitate

...

vulnerability

...

coordination.

...

Companies

...

such

...

as

...

BugCrowd

...

[5],

...

HackerOne

...

[6],

...

Synack

...

[7],

...

and

...

Cobalt

...

[8]

...

offer

...

turnkey

...

solutions

...

for

...

vendors

...

who

...

want

...

to

...

bootstrap

...

their

...

own

...

vulnerability

...

response

...

program.

...



While

...

bug

...

bounty

...

programs

...

help

...

address

...

the

...

vulnerability

...

coordination

...

needs

...

of

...

individual

...

vendors,

...

there

...

still

...

are

...

vulnerabilities

...

that

...

require

...

larger

...

scale

...

coordination.

...

In

...

particular,

...

multivendor

...

coordination

...

remains

...

a

...

challenge

...

for

...

many

...

organizations.

...

As

...

individual

...

vendors

...

have

...

become

...

more

...

mature

...

in

...

their

...

handling

...

of

...

vulnerabilities

...

in

...

their

...

products,

...

the

...

role

...

of

...

multivendor

...

coordination

...

has

...

increased

...

in

...

importance

...

for

...

more

...

traditional

...

vulnerability

...

coordinators

...

such

...

as

...

the

...

CERT/CC

...

[9],

...

NCSC-NL

...

[10],

...

NCSC-FI

...

[11],

...

and

...

JPCERT/CC

...

[12].

Information Sharing and Analysis Organizations (ISAOs) and Centers (ISACs)

...

Information

...

Sharing

...

and

...

Analysis

...

Organizations

...

(ISAOs)

...

and

...

Centers

...

(ISACs)

...

are

...

non-government

...

entities

...

that

...

serve

...

various

...

roles

...

in

...

gathering,

...

analyzing,

...

and

...

disseminating

...

critical

...

infrastructure

...

cybersecurity

...

information

...

across

...

private

...

sector

...

organizations

...

of

...

various

...

sizes

...

and

...

capabilities

...

[13

...

, 14].

...

These

...

organizations

...

have

...

only

...

begun

...

to

...

emerge

...

in

...

earnest

...

within

...

the

...

past

...

few

...

years,

...

but

...

they

...

are

...

already

...

actively

...

involved

...

in

...

the

...

coordination

...

and

...

deployment

...

of

...

vulnerability

...

mitigations.

...

Furthermore,

...

it

...

seems

...

likely

...

that

...

some

...

number

...

of

...

critical

...

infrastructure

...

sectors

...

will

...

need

...

to

...

become

...

involved

...

further

...

in

...

the

...

coordination

...

of

...

the

...

vulnerability

...

discovery,

...

disclosure,

...

and

...

remediation

...

processes.

Reasons to Engage a Coordinator

...

At its most effective, CVD follows the supply chain affected by the vulnerability. As a mental model, it can be useful to think of the supply chain as horizontal or vertical. A horizontal supply chain implies that many vendors need to independently make changes to their products in order to fix a vulnerability. A vertical supply chain implies that one vendor might originate the fix, but many other vendors may need to update their products after the original fix is available. Software libraries tend to have vertical supply chains. Protocol implementations often have horizontal supply chains.

We discuss horizontal and vertical supply chains in Section 5.4.2 below.

CVD Disputes

Occasionally vendors and reporters have difficulty arriving at a mutually acceptable response to the existence of a vulnerability. Disputes can arise for many reasons, including the following:

...