The Dutch government's cyber security center has published guidelines that it hopes will encourage ethical hackers to disclose security vulnerabilities in a responsible way.
"Persons who report an IT vulnerability have an important social responsibility," the Dutch ministry of Security and Justice said on Thursday, announcing guidelines for ethical hacking that were published by the country's National Cyber Security Center (NCSC).
White-hat hackers and security researchers play an important role in securing IT systems by finding vulnerabilities, the NCSC said. However, the center maintained that security researchers are sometimes reluctant to disclose vulnerabilities to companies, instead using media outlets to announce vulnerabilities, which is an undesirable practice because it exposes a hole before it is fixed.
With the guide, the government wants to provide organizations with a framework to create their own policies on responsible disclosure. Ivo Opstelten, Minister of Security and Justice, plans to encourage a wide use of the responsible disclosure guidelines within the government, he said in a letter sent to the parliament.
While the released guidance does not affect the existing legal framework, it encourages parties to work together to make IT systems safer, the NCSC said. Companies and governments could for example offer a standardized online form that can be used by security researchers to notify an organization if they found a vulnerability, it said.
The company and the researcher can also agree to disclose the vulnerability within a certain time frame. An acceptable period for the disclosure of software vulnerabilities is 60 days, while a reasonable period to disclose harder to fix hardware vulnerabilities is 6 months, the NCSC said. When an organization decides to follow these guidelines, it should include in its policy that it will not take legal action against ethical hackers who comply with the rules, it added.
The Dutch Public Prosecution Service however will keep the option to prosecute when it suspects that crimes have been committed, the ministry of Security and Justice said.
The person who discovers the vulnerability should report it directly and as soon as possible to the owner of the system in a confidential manner, so the leak cannot be abused by others. Furthermore, the ethical hacker will not use social engineering techniques, nor install a backdoor or copy, modify or delete data from the system, the NCSC specified. Alternatively a hacker could make a directory listing in the system, the guidelines said.
Hackers should also refrain from altering the system and not repeatedly access the system. Using brute-force techniques to access a system is also discouraged, the NCSC said. The ethical hacker further has to agree that vulnerabilities will only be disclosed after they are fixed and only with consent of the involved organization. The parties can also decide to inform the broader IT community if the vulnerability is new or it is suspected that more systems have the same vulnerability, the NCSC said.
While the responsible disclosure procedure is in principle a matter for the detector and the organization, the NCSC can act as an intermediary if a vulnerability is reported to it directly.
"I think this is a very good thing, especially when the NCSC acts as an intermediary," said Ronald Prins, CEO of the Dutch security firm Fox-IT. One of the problems ethical hackers face is that they have a hard time being taken seriously if they report a vulnerability to a company, and they have a hard time reaching the right person, he said.
If an organization is contacted about a security vulnerability by an official government organization like the NCSC, it will probably take the warning more seriously, he added. Online forms used to report the vulnerability directly to the right person within an organization could also help this process, he added.
While there is little flexibility given to ethical hackers within the guidelines, Prins said he understood why the government did that. It prevents ethical hackers from crossing the line, he said.
"I see that some people are disappointed" because the Public Prosecution Service is still allowed to prosecute when they deem that necessary, Prins said. But it is impossible not to do this, he added. "I would be very pleased if someone reports a problem that he found," he said. But if that person spends days pounding his systems to get in, Prins would definitely consider filing a legal complaint, he said.
Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to firstname.lastname@example.org
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.