Loading 0%

Guidelines For Federal Entities to Apply Bug Bounty Programs

Main Components

verification
Planning Phase

The steps for developing policies and processes, methods for selecting technical programs, and the scope of testing.

low-priority
Preparation Phase

How to determine the budget for the program, eligibility to participate in the program, identify priorities for addressing gaps, the corporate communication plan, and the mechanism for distributing rewards.

published-with-changes
Implementation Phase

The process of vulnerability screening and validating reports.

done-all
Program Closing Phase

How to review the action plan frequently and prepare improvement plans.

How likely are you to recommend DGOV Publications?