Loading 0%

Guidelines For Federal Entities to Apply Bug Bounty Programs

Main Components

verification
Planning Phase

This phase describes the steps for developing policies and processes, methods for selecting technical programs, and the scope of testing

low-priority
Preparation Phase

This phase describes how to determine the budget for the program, eligibility to participate in the program, identify priorities for addressing gaps, the corporate communication plan, and the mechanism for distributing rewards

published-with-changes
Implementation Phase

This phase describes the process of vulnerability screening and validating the reports

done-all
Program Closing Phase

This phase describes how to review the action plan frequently and prepare improvement plans

How likely are you to recommend DGOV Publications?