Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Anchor
quote_franklin_keep_secrets
quote_franklin_keep_secrets
Three can keep a secret, if two of them are dead.

  • Benjamin Franklin
Wiki Markup
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d722d722-3808-4674-b6ab-7943a41324ae"><ac:parameter ac:name="">Maintaining_PreDisclosure_Secr-1</ac:parameter></ac:structured-macro>The more people who know a secret, the more likely it is to leak. Simple probability theory tells us that even if the probability of any given party leaking is very low, the cumulative probability of a leak increases exponentially with the number of parties involved \[100\]. 
Returning to our simple model, and the "Who needs to know what, when?" question, multiparty disclosure highlights the need to balance need-to-know with need-to-share. There are varying degrees of need-to-know. Not everyone needs to know the same thing at the same time. Patch originators are usually notified early in the process, since their answer to "What do I need to do in response to this knowledge?" (i.e., create a patch) is often on the critical path for any downstream parties to be able to take action. Downstream vendors (patch consumers) and deployers can be notified later.

Anchor
Coordinating_Further_Downstrea
Coordinating_Further_Downstrea
Anchor
_Toc479938933
_Toc479938933
Anchor
_Toc489873219
_Toc489873219
Coordinating Further Downstream

Vulnerabilities having the potential for significant impact can lead to coordination efforts beyond the traditional product vendor space. Infrastructure and service providers are sometimes brought in early, if there are mitigations that can be deployed in advance of the availability of a fix. This can be especially helpful in cases where the vulnerability may affect the infrastructure necessary to distribute the patch in the first place.

Anchor
Do_You_Include_Deployers
Do_You_Include_Deployers
Anchor
_Toc479938934
_Toc479938934
Anchor
_Toc489873220
_Toc489873220
Do You Include Deployers?

Anchor
Do_You_Include_Other_Deployers
Do_You_Include_Other_Deployers
Be careful to consider fairness though: By what criteria should you notify service provider X but not service provider Y? At some point, the complexity of who knows what gets high enough that the likelihood of a leak goes to 1, and you might as well go public.

Anchor
Complex_Communications_Reduce_
Complex_Communications_Reduce_
Anchor
_Toc479938935
_Toc479938935
Anchor
_Toc489873221
_Toc489873221
Complex Communications Reduce Trust

Anchor
Do_You_Include_Other_Deployers-1
Do_You_Include_Other_Deployers-1
It's also important to be aware that not all participants along the chain of disclosure will be equally trustworthy. That's not to say they are actively malicious, just that they may have incompatible values or priorities that lead them to disclose the existence of the vulnerability to others earlier than you'd prefer.