Product Security Advisories
Documentation related to KEYper Product Security Advisories.
KEYper System’s Responsible Disclosure Policy KEYper Systems believes that the disclosure of vulnerabilities is essential for improving the quality of our products and services, safety of our customers that rely on them, and awareness as to their choices relative to preserving their specific interests. KEYper Systems values insight from the security research community and welcomes disclosure and collaboration with this community. KEYper Systems values the insight and commitment of security researchers and other vulnerability investigators to make the world a safer place by discovering vulnerabilities of security solutions and providing mechanisms to privately report them with legitimacy and integrity. Responsible disclosure ensures that security access infrastructure is tested and proven reliable. Moreover, the commitment to mitigate vulnerabilities is reassuring for our customers and the security industry. The following is KEYper System’s responsible disclosure policy:
We ask the security researcher community to work with KEYper Systems to coordinate the public disclosure of a vulnerability. Pre-maturely revealing a vulnerability publicly without first notifying KEYper Systems could hurt organizations by exposing sensitive information and putting people and organizations in danger of malicious attacks. Therefore, KEYper Systems strongly advocates a two-step process: first, private disclosure of a potential vulnerability to KEYper Systems. Once the vulnerability is validated, resolved and KEYper Systems and its customers provided a reasonable time to deploy, KEYper Systems coordinates the public disclosure, which includes the recognition of the security researcher’s discovery, confirming that credit is given to the right person(s). We also ask researchers to recognize that our action to investigate, validate and remediate reported vulnerabilities varies based on complexity and severity. We will communicate expected timelines, changes and collaborate where possible. In addition, we request that researchers do not perform Denial of Service mechanisms, compromise KEYper Systems user infrastructure or personal information. Like other leading companies, KEYper Systems applies industry best practices for coordinated disclosure of vulnerabilities to protect the security ecosystem, ensure that customers get the highest quality information, and drive public discourse about ways to improve products, protocols, methodologies, standards, and solutions. CALL TO ACTION If you believe you have discovered a vulnerability, click on the “Reporting Guidelines” link in the menu in this KEYper Systems Security Resources Center for instructions on how to contact the KEYper Systems Security Response Team to report your finding privately. |
Documentation related to KEYper Product Security Advisories.
KEYper Systems values insight from the security research community and welcomes disclosure and collaboration with this community.
Please report any potential or real security vulnerability claim to the KEYper Systems Product Security Team via e-mail.