mirror of
https://gitflic.ru/project/openide/openide.git
synced 2025-12-13 15:52:01 +07:00
SDP-2920 Add security policy to the intellij-community repo
GitOrigin-RevId: fb3c7f0715dffab295521ba7a44a349f530c0089
This commit is contained in:
committed by
intellij-monorepo-bot
parent
cd431a177e
commit
ac4dffac8d
67
SECURITY.md
Normal file
67
SECURITY.md
Normal file
@@ -0,0 +1,67 @@
|
||||
# Coordinated Disclosure Policy
|
||||
Version 1.3, last updated: June 5, 2020
|
||||
|
||||
We do our best to make sure our software is free of any security vulnerabilities. The reality though is that it's not always the case.
|
||||
That is why we are very eager and grateful to hear about any issues you find.
|
||||
|
||||
|
||||
## Where to report issues
|
||||
|
||||
Please report these issues
|
||||
|
||||
* Directly to our [issue tracker](https://youtrack.jetbrains.com) setting issue type to `Security Problem` to limit visibility.
|
||||
* Via email [security@jetbrains.com](mailto:security@jetbrains.com) encrypted with a [PGP key](https://www.jetbrains.com/privacy-security/), you can find this on most public key servers.
|
||||
|
||||
|
||||
## Reporting conditions
|
||||
|
||||
Those reporting issues should conform to the following conditions:
|
||||
|
||||
* All communication and disclosure should be made in a coordinated manner, not putting our business or our users and customers at risk.
|
||||
* The issue should contain a description and working proof of concept.
|
||||
* There should not be any attacks that attempt to access JetBrains or our customers' confidential data.
|
||||
* There should not be any attacks that lead to denial of service attacks on our systems and services or jeopardizing them in any way.
|
||||
* No automated tools should be used for attacking our systems or services.
|
||||
* No social engineering should be targeted against JetBrains employees or customers.
|
||||
|
||||
|
||||
## Proof of concept
|
||||
* Proof of concept should be drafted using your data when possible.
|
||||
* The impact from the demonstration should be limited to the necessary minimum required to prove the concept.
|
||||
* Where it is not possible to avoid interacting with real users or their data, the impact should be minimized to a few entries where it is absolutely necessary to demonstrate a vulnerability.
|
||||
* The confidentiality, integrity, and availability of our products, services, data, and business processes are to be respected.
|
||||
|
||||
|
||||
## Bug Bounty
|
||||
|
||||
We don't have a formal bug bounty program, but depending on the severity of the issue, we often reward reporters based on the issue score that we calculate according to [CVSS](https://www.first.org/cvss).
|
||||
We determine the rewards at our discretion and on a case-by-case basis. The available reward options include financial rewards, swag, free licenses for JetBrains products, and mentioning a reporter in the JetBrains Security Bulletin.
|
||||
The issue should not already have been announced publicly or known by JetBrains. This includes issues that we are aware of but have not yet disclosed publicly for whatever reasons.
|
||||
|
||||
|
||||
## Timeline
|
||||
|
||||
* As soon as possible
|
||||
|
||||
* Triage reported vulnerabilities as soon as possible depending on their impact.
|
||||
* Prevent further exposure of users data and further exploitation of a security issue.
|
||||
|
||||
* 24 hours from receiving the report
|
||||
|
||||
* Respond to your report with a confirmation of receipt and any questions, or an update on the planned course of action.
|
||||
|
||||
* With next release or bug fix update
|
||||
|
||||
* We release updated products with security fixes with the next release or bug fix update.
|
||||
* Shortly after that we inform our customers about the vulnerability and recommend that they update to a more secure version of the product.
|
||||
|
||||
* Weeks following
|
||||
* Announce the vulnerability and its fix on the [JetBrains Blog](https://blog.jetbrains.com) or the product blog. The exact number of weeks depends on multiple factors including planned time for our customers to update their software if necessary.
|
||||
|
||||
* Following quarter
|
||||
|
||||
* Announce vulnerabilities we've fixed over the past quarter in our [Security Bulletin](https://www.jetbrains.com/privacy-security/issues-fixed/)
|
||||
that you can [subscribe to](https://www.jetbrains.com/security/subscribe).
|
||||
|
||||
|
||||
If you have any questions or concerns regarding this policy, please reach out to [security@jetbrains.com](mailto:security@jetbrains.com).
|
||||
Reference in New Issue
Block a user