
Vulnerability Information
Handling Policy
Purpose and Scope
Purpose
Properly handle vulnerability information discovered internally and externally, properly address vulnerabilities, and mitigate risks to customers
Scope
- Our global services and products
- Software created by third parties that we use in the above-mentioned products
Stages (two)
Vulnerability response
-
Gather information
We collect information from a wide range of internal and external sources and manage this information in a centralized manner.
Specifically, our sources include external reports, such as from the Information Security Early Warning Partnership, reports from security researchers submitted to our Vulnerability Bounty Program, and internal avenues. -
Assess impact
The PSIRT and the departments concerned will assess the scope and severity of the impact of the information obtained.
We use CVSS as one of our severity indicators. The severity and urgency of the vulnerability will be determined according to the nature of the information found. -
Implement countermeasures
Based on the results of the investigation, the relevant department will make a comprehensive decision on the nature and timing of the response.
Vulnerability information release process
If the conditions for release are met, information on the vulnerability response of the product will be published on JVN, a vulnerability countermeasure information portal site in Japan.
Information will be released in accordance with the date agreed upon with JPCERT/CC in accordance with the principle of coincidental release dates.
Vulnerability information release
Information about fixed vulnerabilities is announced on the below web site
See the vulnerability information release process for details.
Vulnerability countermeasure information portal site in Japan
Acknowledgements
After the vulnerability information is made public, we will release the name of the person who reported it.
We will contact the reporter again after release.