Trump Administration Releases VEP Charter to Increase Transparency

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws.

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws. White House Cybersecurity Coordinator Rob Joyce emphasized in a blog post the importance of “improved transparency” and “accountability of the process and those who operate it”.  

The unclassified document, “Vulnerabilities Equities Policy and Process for the United States Government,” sets out the workflow and equity considerations taken when the agencies involved “make determinations regarding disclosure or restriction when the USG obtains knowledge of newly discovered and not publicly known vulnerabilities in information systems and technologies,” according to the charter. The process, it adds, “balances whether to disseminate vulnerability information to the vendor/supplier in the expectation that it will be patched, or to temporarily restrict the knowledge of the vulnerability to the USG, and potentially other partners, so that it can be used for national security and law enforcement purposes, such as intelligence collection, military operations, and/or counterintelligence.”

According to Joyce, those who are part of the Equities Review Board “consider four major groups of equities: defensive equities; intelligence / law enforcement / operational equities; commercial equities; and international partnership equities.” The goal is to weigh the benefit to national security and to the national public by considering a wide range of questions across these equities. Some of the questions listed in the charter include:

  • Are threat actors likely to exploit this vulnerability, if it were known to them?
  • Is exploitation of this vulnerability alone sufficient to cause harm?
  • How likely is it that threat actors will discover or acquire knowledge of this vulnerability?
  • How much do users rely on the security of the product?
  • How severe is the vulnerability? What are the potential consequences of exploitation of this vulnerability?
  • What access or benefit does a threat actor gain by exploiting this vulnerability?
  • If the vulnerability is disclosed, how likely is it that the vendor or another entity will develop and release a patch or update that effectively mitigates it?
  • Can this vulnerability be exploited to support intelligence collection, cyber operations, or law enforcement evidence collection?
  • If a patch or update is released, how likely is it to be applied to vulnerable systems? How soon? What percentage of vulnerable systems will remain forever unpatched or unpatched for more than a year after the patch is released?
  • If USG knowledge of this vulnerability were to be revealed, what risks could that pose for USG international relations?

This move toward transparency comes after criticism toward the U.S. intelligence community for withholding details about critical vulnerabilities that have been used against businesses and consumers in attacks such as the WannaCry virus this year.

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities