Management & Strategy

Lawmaker Wants Federal Contractors to Have Vulnerability Disclosure Policies 

Congresswoman Nancy Mace has introduced a bill that would require federal contractors to have a Vulnerability Disclosure Policy (VDP).

Congresswoman Nancy Mace has introduced a bill that would require federal contractors to have a Vulnerability Disclosure Policy (VDP).

Congresswoman Nancy Mace (R-SC) this week introduced a bill that would require federal contractors to implement a Vulnerability Disclosure Policy (VDP).

The proposed legislation, named the Federal Cybersecurity Vulnerability Reduction Act, would require a VDP that is consistent with NIST guidelines. This includes making it clear how vulnerabilities can be reported, establishing a system for providing feedback to reporters, and providing assurances that good faith security research is authoritized and welcomed. 

A VDP can help organizations learn about the existence of vulnerabilities in their systems and infrastructure by making it easier for third parties to report discovered security issues.

The US government has been relying on VDPs and bug bounty programs for years to find and patch vulnerabilities before they can be exploited by malicious actors. 

It’s also worth pointing out that binding operational directive BOD 20-01 from 2020 requires federal agencies to have a VDP. The new bill would expand the requirement, helping reduce risks associated with federal contractors. 

“By mandating Vulnerability Disclosure Policies (VDP) for federal contractors, we can ensure a proactive approach to cybersecurity, enabling contractors to identify and address software vulnerabilities promptly,” Congresswoman Mace said. “This legislation, aligned with internationally recognized standards, empowers contractors to stay ahead of malicious actors, preventing potential exploits and protecting sensitive information.”

Mace is chairwoman of the House Oversight Subcommittee on Cybersecurity, Informational Technology, and Government Innovation.

HackerOne, a cybersecurity company specializing in bug bounty programs and vulnerability disclosure policies, said on Thursday that it strongly endorses the bill, noting that the legislation “is an important step toward enhancing the cybersecurity resilience of the many businesses that support the federal government and have access to government data”.

Advertisement. Scroll to continue reading.

The Pentagon has been running bug bounty programs since 2016, getting help from thousands of white hat hackers who discovered a total of more than 2,500 vulnerabilities. The payouts from more than 40 bug bounty programs total $650,000. 

In its inaugural VDP Platform Annual Report published on Friday, the US Cybersecurity and Infrastructure Security Agency (CISA) said its VPD platform facilitated the remediation of more than 1,000 vulnerabilities through December 2022, including nearly 200 critical issues. 

Related: Microsoft Paid Out $13 Million via Bug Bounty Programs for Fourth Consecutive Year

Related: Hacker Conversations: Youssef Sammouda, Bug Bounty Hunter

Related: Adobe Inviting Researchers to Private Bug Bounty Program

Related Content

Vulnerabilities

CISA and the FBI warn of threat actors abusing path traversal software vulnerabilities in attacks targeting critical infrastructure.

Mobile & Wireless

Microsoft has uncovered a new type of attack called Dirty Stream that impacted Android apps with billions of installations. 

Vulnerabilities

A vulnerability (CVE-2024-27322) in the R programming language implementation can be exploited to execute arbitrary and be used as part of a supply chain...

Vulnerabilities

Cisco patches a high-severity Integrated Management Controller vulnerability for which PoC exploit code is available.

Vulnerabilities

PAM company Delinea over the weekend rushed to patch a critical authentication bypass vulnerability after it apparently ignored the researcher who found the flaw.

Vulnerabilities

Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products.

Application Security

A critical vulnerability in multiple programming languages allows attackers to inject commands in Windows applications.

Vulnerabilities

A critical OS command injection in Progress Flowmon can be exploited to gain remote, unauthenticated access to the system.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version