Bounty or Bug Programs: A How-To Guide

BCLP
Contact

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate, however, about the merits of listening to the security concerns of people outside of an organization. On one end of the spectrum, some organizations refuse to discuss any aspect of their security with the public. On the other end of the spectrum, organizations proactively encourage the public to report security vulnerabilities by paying well-meaning hackers (usually called “white hat hackers” or “independent researchers”) to report problems. While these organizations view “bounty” programs as commonsense crowdsourcing, others view the concept of paying someone who has hacked a company’s system as extortion. As more companies move to establish bounty programs third parties have begun to offer platforms or frameworks to help organize the programs. Some frameworks provide a forum in which companies can communicate with hackers, a method to facilitate payments to hackers, and guidelines for hackers to follow when identifying vulnerabilities and reporting them to participating companies.

The following provides a snapshot of information on bounty programs as well as a checklist for organizations that are considering starting a program, or are evaluating the structure of their existing program.

489

The number of organizations that have established data security bounty programs (as of November 11, 2016)1

53%

The percentage of bounty programs that pay a bounty.2

$100k

One of the largest maximum rewards offered through a bounty program (as of November 11, 2016).3

$100 to $25,000

Typical range of rewards offered for programs that pay monetary compensation.

What to think about when considering a bounty program:

  • If you do not enact a bounty program:
  1. What are the practical implications if the organization views any hack as “unauthorized?”
  2. What are the practical implications if a “white hat” hacker tries to breach your security with no guidelines on how they should act?
  3. Is there a risk that individuals who know of a security vulnerability may provide that information to bad actors instead of providing it, first, to you?
  4. Is there a risk that individuals who know of a security vulnerability may provide that information to the media or to regulators instead of providing it, first, to you?
  5. Would the organization view an unsolicited request for payment by a hacker as extortion?
  • If you do enact a bounty program:
  1. Will you be encouraging more breaches to your system?
  2. Do you have confidence that you can track / monitor successful participants?
  3. Will all of your systems be “in scope” for the bounty program?
  4. Should certain forms of attack be prohibited (e.g. denial of service attaches)?
  5. Will employees be eligible to participate?
  6. Will the program be focused on weaknesses to the security of sensitive personal information, to the performance of IT infrastructure, or to both?
  7. Will you proactively disclose the level of compensation that a participant should expect?
  8. What conditions of confidentiality will you impose on participants?
  9. How can you avoid the unintentional access or acquisition of sensitive personal information?
  10. How will you receive and document security vulnerabilities?
  11. Will you utilize a third party that manages, hosts, or provides a framework for your program?

1. Statistics from Vulnerability Laboratory, Bug Bounties, Rewards, and Acknowledgements, http://vulnerability-lab.com/list-of-bug-bounty-programs.php.

2. Based upon review of data obtained from vulnerability labs, infra.

3. Microsoft has posted various $100,000 awards, see https://technet.microsoft.com/en-us/library/dn425036.aspx

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© BCLP

Written by:

BCLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

BCLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide