2.4.3.7
| Req No | Requirement | Compliance Class And Applicability | Primary Keyword | Secondary Keyword | 
|---|---|---|---|---|
| 2.4.3.7 | Processes and plans are in place based upon the IoTSF “Vulnerability Disclosure Guidelines” [ref 19]1, or a similar recognised process, to deal with the identification of a security vulnerability or compromise when they occur. | Mandatory for all classes | Business | Process | 
Footnotes
- 
IoTSF Vulnerability Disclosure Guidelines can be found [https://iotsecurityfoundation.org/best-practice-guidelines] ↩