Skip to main content
Version: 3.0

2.4.3.7

Req NoRequirementCompliance Class And ApplicabilityPrimary KeywordSecondary Keyword
2.4.3.7Processes and plans are in place based upon the IoTSF “Vulnerability Disclosure Guidelines” [ref 19]1, or a similar recognised process, to deal with the identification of a security vulnerability or compromise when they occur.Mandatory for all classesBusinessProcess

Footnotes

  1. IoTSF Vulnerability Disclosure Guidelines can be found [https://iotsecurityfoundation.org/best-practice-guidelines]