Trump Administration Releases VEP Charter to Increase Transparency

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws.

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws. White House Cybersecurity Coordinator Rob Joyce emphasized in a blog post the importance of “improved transparency” and “accountability of the process and those who operate it”.  

The unclassified document, “Vulnerabilities Equities Policy and Process for the United States Government,” sets out the workflow and equity considerations taken when the agencies involved “make determinations regarding disclosure or restriction when the USG obtains knowledge of newly discovered and not publicly known vulnerabilities in information systems and technologies,” according to the charter. The process, it adds, “balances whether to disseminate vulnerability information to the vendor/supplier in the expectation that it will be patched, or to temporarily restrict the knowledge of the vulnerability to the USG, and potentially other partners, so that it can be used for national security and law enforcement purposes, such as intelligence collection, military operations, and/or counterintelligence.”

According to Joyce, those who are part of the Equities Review Board “consider four major groups of equities: defensive equities; intelligence / law enforcement / operational equities; commercial equities; and international partnership equities.” The goal is to weigh the benefit to national security and to the national public by considering a wide range of questions across these equities. Some of the questions listed in the charter include:

  • Are threat actors likely to exploit this vulnerability, if it were known to them?
  • Is exploitation of this vulnerability alone sufficient to cause harm?
  • How likely is it that threat actors will discover or acquire knowledge of this vulnerability?
  • How much do users rely on the security of the product?
  • How severe is the vulnerability? What are the potential consequences of exploitation of this vulnerability?
  • What access or benefit does a threat actor gain by exploiting this vulnerability?
  • If the vulnerability is disclosed, how likely is it that the vendor or another entity will develop and release a patch or update that effectively mitigates it?
  • Can this vulnerability be exploited to support intelligence collection, cyber operations, or law enforcement evidence collection?
  • If a patch or update is released, how likely is it to be applied to vulnerable systems? How soon? What percentage of vulnerable systems will remain forever unpatched or unpatched for more than a year after the patch is released?
  • If USG knowledge of this vulnerability were to be revealed, what risks could that pose for USG international relations?

This move toward transparency comes after criticism toward the U.S. intelligence community for withholding details about critical vulnerabilities that have been used against businesses and consumers in attacks such as the WannaCry virus this year.

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.