OBL-ART13-07Binding
Establish and publish a coordinated vulnerability disclosure (CVD) policy
- 适用于
- Manufacturer
- 来源引用
- Art. 13(7)Annex I Part II §1
- 产品类别
- default, important-class-i, important-class-ii, critical
Last reviewed
通俗语言
You must post a clear process for reporting security bugs. Add an email or web form for reports. Say how fast you will reply. Explain how you will work with the reporter before you go public with a fix. A security.txt file at your website root is the normal way to do this.
Legal text
Article 13(7) of Regulation (EU) 2024/2847 and Annex I Part II §1 require that manufacturers shall:
- Identify and document vulnerabilities and components contained in the product
- Have a policy for coordinated vulnerability disclosure
- Take measures to facilitate the sharing of information about potential vulnerabilities
The CVD policy must be publicly accessible so that external reporters can find it.
Key requirements
- Public CVD policy — published on your website and discoverable
- Security contact — dedicated email address or web form for vulnerability reports
(e.g.
security@example.com) security.txtfile — publish at/.well-known/security.txtper RFC 9116 to make the contact machine-discoverable- Acknowledgement commitment — state a timeframe for acknowledging receipt (ENISA recommends ≤ 5 business days)
- Disclosure timeline — describe the coordinated disclosure process, including how you handle embargo periods with researchers
- Scope statement — indicate which products and versions the policy covers
Recommended CVD policy elements
Based on ENISA's CVD guidelines and CRA Annex I Part II:
- Contact address and preferred contact method
- PGP / S/MIME key for encrypted submissions (recommended)
- Languages supported for reports
- Acknowledgement timeframe
- Expected timeline for remediation updates
- Disclosure coordination process (embargo, researcher credit, CVE assignment)
- Safe-harbour statement for good-faith researchers
Evidence you may need
- Published CVD policy (URL)
/.well-known/security.txtfile- Vulnerability intake log (confidential — not publicly required)
- Records of reports received and how they were handled