What is a Vulnerability Disclosure Policy and how can I shape mine?
Shaping Your Vulnerability Disclosure Policy (VDP): A Guide for Modern Teams
In today’s threat landscape, security is a continuous journey, not a destination. No matter how robust your internal security team is, your attack surface is constantly evolving. Embracing the global community of independent security researchers is one of the most effective ways to stay ahead of threats.
But how do you invite external researchers to test your systems without inviting chaos? The answer is a well-crafted Vulnerability Disclosure Policy (VDP).
Think of a VDP as the "If you see something, say something" sign for your digital infrastructure. It sets the rules of engagement, outlines what is in and out of scope, and protects good-faith researchers from legal trouble.
Below, we break down the core components of a modern VDP, why each section matters, and provide a ready-to-use template for your organization.
1. Our Commitment to Security
What it means: This is your opening statement. It sets the tone for your relationship with the security community.
Why you need it: Historically, companies have been adversarial toward hackers. This section signals that your organization is mature, collaborative, and values the work of ethical researchers. It builds trust from the very first sentence.
2. Authorization & Safe Harbor
What it means: A legal promise that you will not sue or press charges against researchers who follow your rules.
Why you need it: Many security laws (like the CFAA in the US) make unauthorized access illegal. Ethical hackers will not test your systems if they fear legal retaliation. Providing Safe Harbor is the industry standard and the most critical part of any modern VDP.
3. Scope
What it means: The exact domains, IPs, apps, and types of vulnerabilities you want researchers to look at—and the ones you absolutely don’t.
Why you need it: Without a defined scope, researchers might test sensitive third-party services you don’t own, or use methods that disrupt your business.
-
The "Automated Scanner" Clause: As an Aftra customer, you already have an engine continuously monitoring and mapping your attack surface. You do not need thousands of independent researchers running their own noisy, automated scanners against your servers. We strongly recommend prohibiting third-party automated scanners in your VDP to save your team from alert fatigue and duplicate reports.
4. Rules of Engagement
What it means: The operational boundaries for testing.
Why you need it: You want researchers to find the unlocked doors, but you don't want them walking in and rummaging through the filing cabinets. This section explicitly bans destructive actions like Denial of Service (DoS), introducing malware, or accessing customer data.
5. Reporting Process
What it means: Instructions on how, where, and in what format to submit a vulnerability report.
Why you need it: You don't want vulnerability reports getting lost in a generic support inbox or posted publicly on social media. Setting up a dedicated security@yourcompany.com email ensures reports go directly to the people equipped to triage them.
6. Our Response Commitment
What it means: The Service Level Agreements (SLAs) you promise to the researcher. Why you need it: Security researchers get frustrated if they send a report into a black hole. Setting expectations for when you will acknowledge the report (e.g., 3-5 days) and how long you need to fix it (e.g., 90 days) keeps the lines of communication open and prevents researchers from publishing the vulnerability prematurely.
7. Recognition
What it means: How you thank researchers for their time and effort.
Why you need it: Even if you aren't ready to launch a paid "Bug Bounty" program, recognizing researchers is vital. A "Security Hall of Fame" on your website costs nothing but provides valuable resume material for independent researchers, incentivizing them to help you.
The Aftra Customer VDP Template
Ready to publish your own policy? Copy the template below, replace the bracketed information with your company's details, and host it on your website (typically at yourdomain.com/security or yourdomain.com/vulnerability-disclosure-policy).
[Company Name] Vulnerability Disclosure Policy
Version 1.0 // Last Updated: [Date]
1. Our Commitment to Security
At [Company Name], we are committed to the security of our services and the data entrusted to us by our customers. We understand that securing our infrastructure is a continuous effort, and we highly value the contributions of the independent security research community. If you believe you have discovered a security vulnerability in our systems, we encourage you to report it to us responsibly and in accordance with this policy.
2. Authorization & Safe Harbor
We consider security research and vulnerability disclosure activities conducted in accordance with this policy to be "authorized" conduct. To ensure you can conduct your research without fear of legal repercussion:
-
We will not pursue civil or criminal action, or notify law enforcement, against you for accidental or good-faith violations of this policy.
-
We waive any potential claims against you for circumventing technological measures used to protect the systems in scope of this policy.
-
If legal action is initiated by a third party against you for activities that were conducted in accordance with this policy, we will make this authorization known.
3. Scope
In-Scope Systems:
-
https://[Your Domain].com -
*.[Your Domain].com -
[List any other specific domains, APIs, or mobile apps in scope]
Out-of-Scope Systems: Any third-party systems or services used by [Company Name] (e.g., hosting provider infrastructure, external APIs, integrated SaaS platforms). Vulnerabilities discovered in these systems should be reported to the respective vendor according to their disclosure policy.
Out-of-Scope Vulnerabilities: The following issues and testing methods are strictly prohibited and considered out of scope:
-
Automated Scanning: We strictly prohibit the use of third-party automated scanners against our infrastructure. We continuously monitor and map our own attack surface using the Aftra scanning engine. Reports derived from other automated tools generally duplicate our own findings and create unnecessary noise. Please focus your research on manual testing and complex logic errors.
-
Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks.
-
Social engineering (e.g., phishing, vishing) directed at [Company Name] employees, contractors, or customers.
-
Physical security attacks against our offices or data centers.
-
Self-XSS (Cross-Site Scripting) that cannot be used to attack other users.
-
Missing security best practices (e.g., missing security headers, weak SSL/TLS cipher suites) without a demonstrated, exploitable vulnerability.
4. Rules of Engagement
When conducting your research, you must abide by the following rules:
-
Respect Privacy: Do not view, access, modify, exfiltrate, or store any data that does not belong to you. If you encounter sensitive or personal data, stop testing immediately, notify us, and purge all local copies of the data.
-
Do No Harm: Do not engage in any activity that could be disruptive, damaging, or harmful to the performance or availability of our services.
-
Proportionality: Use exploits only to the extent necessary to confirm a vulnerability's presence. Do not use an exploit to pivot to other systems or compromise data.
-
No Malware: Do not introduce malicious software, backdoors, or code into our systems.
5. Reporting Process
Please submit your findings via email to [Security Email Address, e.g., security@company.com].
To help us quickly validate and prioritize your submission, please include the following in your report:
-
A detailed description of the vulnerability and its potential business or security impact.
-
Clear, step-by-step instructions to reproduce the issue, including any URLs or parameters involved.
-
Any proof-of-concept (PoC) scripts, screenshots, or videos that demonstrate the vulnerability.
-
(Optional) For machine-readable discovery of this policy and our contact information, researchers can refer to the
/.well-known/security.txtfile on our domain.
6. Our Response Commitment
When you report a vulnerability and choose to share your contact information, we commit to the following:
-
Acknowledgment: We will make a best effort to acknowledge receipt of your report within [e.g., 3 to 5] business days.
-
Validation & Updates: We will investigate the report, confirm the existence of the vulnerability, and provide you with periodic updates on our remediation progress.
-
Remediation & Disclosure: We ask that you provide us a reasonable amount of time (typically [e.g., 90 days] from acknowledgment) to resolve the issue before making any public disclosure.
7. Recognition
We greatly appreciate the efforts of security researchers who help keep [Company Name] safe. (Choose one of the following or customize based on your program)
-
[Option A - Hall of Fame]: We do not currently offer monetary rewards (bug bounties) for reported vulnerabilities. However, for valid reports that are submitted in accordance with this policy, we are happy to provide public recognition on our Security Hall of Fame page. Please let us know if you would like to be acknowledged and under what name or handle.
-
[Option B - Swag/Rewards]: For valid, critical vulnerabilities reported in accordance with this policy, we may offer [Company Name] merchandise/swag or a monetary reward at our own discretion, based on the severity and impact of the vulnerability.
8. Policy Governance
This policy may be updated at any time. Please refer to the "Last Updated" date at the top of this document for the current version. For any questions regarding this policy, please contact [Security Email Address].
Stay ahead, stay secure!