Trump Administration Releases VEP Charter to Increase Transparency

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws.

The Trump Administration released a new 14-page charter Wednesday detailing the Vulnerabilities Equities Process (VEP), which the federal government uses to determine if, how and when it tells private companies about zero-day security flaws. White House Cybersecurity Coordinator Rob Joyce emphasized in a blog post the importance of “improved transparency” and “accountability of the process and those who operate it”.  

The unclassified document, “Vulnerabilities Equities Policy and Process for the United States Government,” sets out the workflow and equity considerations taken when the agencies involved “make determinations regarding disclosure or restriction when the USG obtains knowledge of newly discovered and not publicly known vulnerabilities in information systems and technologies,” according to the charter. The process, it adds, “balances whether to disseminate vulnerability information to the vendor/supplier in the expectation that it will be patched, or to temporarily restrict the knowledge of the vulnerability to the USG, and potentially other partners, so that it can be used for national security and law enforcement purposes, such as intelligence collection, military operations, and/or counterintelligence.”

According to Joyce, those who are part of the Equities Review Board “consider four major groups of equities: defensive equities; intelligence / law enforcement / operational equities; commercial equities; and international partnership equities.” The goal is to weigh the benefit to national security and to the national public by considering a wide range of questions across these equities. Some of the questions listed in the charter include:

  • Are threat actors likely to exploit this vulnerability, if it were known to them?
  • Is exploitation of this vulnerability alone sufficient to cause harm?
  • How likely is it that threat actors will discover or acquire knowledge of this vulnerability?
  • How much do users rely on the security of the product?
  • How severe is the vulnerability? What are the potential consequences of exploitation of this vulnerability?
  • What access or benefit does a threat actor gain by exploiting this vulnerability?
  • If the vulnerability is disclosed, how likely is it that the vendor or another entity will develop and release a patch or update that effectively mitigates it?
  • Can this vulnerability be exploited to support intelligence collection, cyber operations, or law enforcement evidence collection?
  • If a patch or update is released, how likely is it to be applied to vulnerable systems? How soon? What percentage of vulnerable systems will remain forever unpatched or unpatched for more than a year after the patch is released?
  • If USG knowledge of this vulnerability were to be revealed, what risks could that pose for USG international relations?

This move toward transparency comes after criticism toward the U.S. intelligence community for withholding details about critical vulnerabilities that have been used against businesses and consumers in attacks such as the WannaCry virus this year.

About the Author

Jessica Davis is the Associate Content Editor for 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3