🔍 VDP🛡️ Security Governance📋 Step-by-Step Guide✓ ISO 27001 · SOC 2

How to Build a Vulnerability Disclosure Policy

Every day, security researchers find vulnerabilities in systems they do not own. What they do next depends entirely on what you have published. Without a VDP, they have no safe way to tell you — so most of them either stay silent or go public. Here is how to build one that actually works.

SS
Soham Sawant
✍️ Cybersecurity Expert & Technical Writer·📖 8 min read
📅 March 2026·🏢 SecComply
Vulnerability disclosure policy security research

A Vulnerability Disclosure Policy is the front door for security researchers. Without one, researchers who find vulnerabilities in your systems have no structured, legally safe way to tell you about them — and many will not try.

VDP Lifecycle — From Report to ResolutionNo VDP found → Goes public / stays silent🔍ResearcherFinds Bug📋Checks forVDP📨SubmitsReport⚖️Triage &Validate🔧Remediate& PatchClose &AcknowledgeRESPONSE SLA TARGETSAcknowledge receipt≤3 business daysInitial triage≤5 business daysStatus update≤10 business daysCritical fix≤30 daysHigh severity fix≤60 daysMedium/Low fix≤90 daysVDP vs BUG BOUNTYFinancial rewardVDPBug BountyLegal safe harbourVDPBug BountyDefined scopeVDPBug BountyVolume of reportsLowHighVDPBug BountyCostLowHighVDPBug BountyBest starting pointLaterVDPBug BountyCOMPLIANCE MAPPINGISO 27001A.8.8 + A.5.6SOC 2CC7.1PCI DSSReq 6.3DPDPSection 8(5)NIST CSFRS.AN / DE.CM

VDP lifecycle from researcher discovery to resolution, response SLA targets by severity, VDP vs bug bounty comparison, and compliance framework mapping across ISO 27001, SOC 2, PCI DSS, DPDP, and NIST CSF.

Security vulnerabilities exist in every production system. The question is not whether they will be found — it is whether the people who find them have a clear, safe way to tell you before someone else finds out first. A Vulnerability Disclosure Policy answers that question. This guide walks through every element you need to build one that researchers will actually use, that holds up under legal scrutiny, and that satisfies the auditors reviewing your ISO 27001 or SOC 2 evidence package.

0%
of Fortune 500 companies have a published VDP or bug bounty programme
HackerOne 2024
0 days
average time to remediate a critical vulnerability without a formal disclosure programme
Bugcrowd 2024
0 days
average time to remediate with an active VDP or bug bounty programme in place
HackerOne 2024

What Is a Vulnerability Disclosure Policy?

A Vulnerability Disclosure Policy is a published statement that tells security researchers how to report vulnerabilities they discover in your systems, what to expect in response, and what legal protections they have for acting in good faith. It is the structured front door for coordinated vulnerability disclosure.

Without a VDP, a security researcher who finds a critical vulnerability in your system faces an uncomfortable choice: report it anyway and risk legal action under computer crime laws, publish it publicly to force a response, or stay silent. None of these outcomes serve you or the researcher. A VDP creates a fourth option — a clear, safe, structured path to responsible disclosure.

"Security researchers find vulnerabilities whether you want them to or not. A VDP is not permission for them to test your systems — it is a commitment about what you will do when they find something and come to you."

VDP vs Bug Bounty — What Is the Difference?

These terms are often confused. The distinction is simple but important for deciding where to start.

📋

Vulnerability Disclosure Policy

  • Defines how to report vulnerabilities
  • Provides legal safe harbour for researchers
  • Sets response time commitments
  • No financial reward for findings
  • Low report volume — manageable for any team
  • The right starting point for most organisations
💰

Bug Bounty Programme

  • VDP plus financial incentives per valid finding
  • Significantly higher report volume
  • Requires dedicated triage capacity
  • Attracts professional researchers at scale
  • Can cost thousands to hundreds of thousands
  • Build on top of a mature VDP, not before it
💡
Start With a VDP

Most organisations should build a VDP first and run it for 6-12 months before introducing monetary rewards. A bug bounty programme launched without mature internal triage processes will generate more reports than the team can handle — leading to slow responses, frustrated researchers, and a programme that damages rather than builds trust.

The 6-Step Build Process

  • 1
    Define your scope explicitlySpecify exactly which systems, domains, and assets are in scope — and equally importantly, what is explicitly out of scope. Ambiguous scope is the number one reason researchers stop reporting. If they are unsure whether a system is in scope, most will not risk testing it.
  • 2
    Write your safe harbour clauseCommit in writing that researchers acting in good faith within your defined scope will not face legal action. This is the single most important element of a VDP — without it, researchers assume legal risk under computer crime laws and most will simply not report.
  • 3
    Create a dedicated submission channelSet up a security reporting email address (security@yourdomain.com) or use a managed platform like HackerOne, Bugcrowd, or Intigriti. Publish a security.txt file at /.well-known/security.txt pointing to it. Make it easy to find — a disclosure process nobody can locate is not a disclosure process.
  • 4
    Set and publish response time commitmentsResearchers need to know their report will not disappear. Commit to specific timelines: acknowledge within 3 business days, provide a status update within 10 days, resolve critical findings within 30 days. These commitments are also what auditors look for as evidence of a functioning programme.
  • 5
    Build your internal triage process firstThe internal process must exist before you publish the policy. Define who receives reports, how they are assessed for severity using CVSS, which team owns remediation, how the researcher is kept updated, and what happens if a finding requires coordinated disclosure with a third party. Publishing without this ready guarantees you will miss your own SLAs on the first report.
  • 6
    Publish, promote, and maintain itPublish the VDP at a stable URL such as /security or /responsible-disclosure. Add a security.txt file. Reference it in your security documentation and ISO 27001 ISMS. Review it annually and update it when your scope changes. A VDP is a living document — set it once and forget it and it will become inaccurate and unenforceable.

Defining Your Scope

Scope definition is where most VDPs fail. Overly broad scope creates legal uncertainty — researchers do not know where they can and cannot test. Overly narrow scope makes the programme useless — it excludes the systems that matter most. Here is what a well-defined scope looks like:

Example VDP Scope Definition

✓ In Scope

  • *.seccomply.net (all subdomains)
  • app.seccomply.net (web application)
  • api.seccomply.net (REST API)
  • iOS and Android mobile applications
  • Authentication and access control issues
  • Data exposure and injection vulnerabilities

✗ Out of Scope

  • Physical security attacks
  • Social engineering of employees
  • Denial of service (DoS/DDoS)
  • Third-party services not owned by SecComply
  • Issues requiring privileged physical access
  • Automated scanner output without proof of concept
⚠️
Always Explicitly Exclude What You Cannot Handle

DoS testing, social engineering, and physical intrusion attempts should always be explicitly out of scope unless you have dedicated capacity to handle them. Leaving them ambiguous means a researcher who attempts them will claim they were in scope — and you will have no clear basis to disagree.

Writing an Effective Safe Harbour Clause

The safe harbour clause is your commitment to researchers that good-faith security research will not result in legal action. Without it, the Computer Fraud and Abuse Act (CFAA) in the US, the Computer Misuse Act in the UK, and equivalent laws in India make it technically illegal to access systems without explicit authorisation — even to report a vulnerability you accidentally found.

A strong safe harbour clause includes four elements:

  • 1
    Authorisation statementExplicitly state that testing activity within the defined scope, conducted in accordance with the policy, is authorised. This directly addresses the "without authorisation" element of computer crime laws.
  • 2
    Non-prosecution commitmentState that the organisation will not pursue civil or criminal action against researchers acting in good faith within scope. This should be unconditional within the defined boundaries — qualified safe harbours ("we reserve the right to...") undermine researcher confidence.
  • 3
    Good faith definitionDefine what "good faith" means in your context: no accessing user data beyond what is necessary to demonstrate the vulnerability, no disrupting production systems, no modifying or deleting data, no public disclosure before remediation is complete.
  • 4
    Law enforcement statementCommit that if a third party initiates legal action against a researcher who acted in good faith under your policy, the organisation will take steps to clarify that the research was conducted in accordance with your authorisation.
Security research responsible disclosure

The safe harbour clause is the most important element of any VDP. Without legal protection, researchers who act responsibly face the same legal risk as those who act maliciously — a situation that benefits nobody.

The security.txt File

A security.txt file is a standardised text file defined by RFC 9116, published at /.well-known/security.txt on your web server. It tells security researchers — and automated scanning tools — exactly how to contact you about a vulnerability. It is the single most effective way to ensure your disclosure channel is discoverable.

# SecComply security.txt — RFC 9116 Contact: https://seccomply.net/security Contact: mailto:security@seccomply.net Encryption: https://seccomply.net/pgp-key.txt Policy: https://seccomply.net/responsible-disclosure Acknowledgments: https://seccomply.net/security/hall-of-fame Preferred-Languages: en, hi Expires: 2027-01-01T00:00:00.000Z

The Expires field is mandatory under RFC 9116 — it tells researchers when to check for an updated version. Set it to 12 months from publication and update it annually. An expired security.txt signals to researchers that the programme may be inactive.

Building Your Internal Triage Process

The internal triage process is what determines whether your VDP is functional or just a document. It must exist and be tested before you publish the policy. Here are the response timelines that define a credible programme:

≤3 business days
Acknowledge receiptSend a confirmation to the researcher that their report has been received and is under review. This can be automated. The absence of acknowledgement is the top reason researchers escalate to public disclosure.
≤5 business days
Initial triageAssess the report for validity and severity. Assign a CVSS score. Route to the appropriate remediation owner. If the report is out of scope, respond clearly explaining why — do not simply close it without explanation.
≤10 business days
Status updateProvide the researcher with a substantive update: confirmed as valid, duplicate of an existing finding, or requires more information. If remediation is underway, share an estimated timeline.
≤30 days
Critical severity fix (CVSS 9.0+)Critical vulnerabilities — remote code execution, authentication bypass, mass data exposure — must be remediated urgently. If a 30-day fix is not achievable, communicate this to the researcher with a revised timeline and interim mitigation.
≤60 days
High severity fix (CVSS 7.0–8.9)High severity findings require prioritised remediation. Keep the researcher updated on progress. If a patch requires a scheduled release cycle, explain the process.
≤90 days
Close and acknowledgeOnce remediated, close the report, notify the researcher, and add them to your Hall of Fame or acknowledgements page if they consent. A thank-you to researchers who report responsibly builds programme credibility over time.

VDP and Compliance Requirements

FrameworkRelevant ControlWhat a VDP Provides
ISO 27001A.8.8 — Management of technical vulnerabilities; A.5.6 — Contact with special interest groupsFormal external vulnerability reporting channel, documented triage process, evidence of engagement with security research community
SOC 2CC7.1 — Identify and respond to vulnerabilities; CC7.3 — Evaluate security eventsEvidence that vulnerabilities are identified through external channels as well as internal testing, documented response process
PCI DSSReq 6.3 — Identify security vulnerabilities and address themExternal vulnerability identification channel complementing internal scanning and penetration testing requirements
DPDP ActSection 8(5) — Reasonable security safeguardsDemonstrates proactive vulnerability management as part of reasonable security safeguards — directly relevant to breach prevention
NIST CSFDE.CM — Continuous monitoring; RS.AN — AnalysisExternal detection input into your vulnerability management programme, coordinated response capability

A VDP is most effective when it sits inside a mature vulnerability management programme. If you are still building that foundation, our guide to vulnerability management for startups covers the full process — CVSS scoring, triage workflows, and tooling — that your VDP will feed directly into.

🛡️
VDP as ISO 27001 Evidence

When ISO 27001 auditors assess A.8.8 (technical vulnerability management), they look for evidence that your organisation has a systematic process for receiving and acting on vulnerability information from all sources — including external researchers. A published VDP with documented triage records and researcher acknowledgements is among the strongest evidence you can provide for this control.

Ready to Publish Your VDP?

SecComply helps organisations build VDPs that satisfy ISO 27001 and SOC 2 requirements — with the scope definition, safe harbour language, and internal triage process ready for auditor review.

Frequently Asked Questions

What is a Vulnerability Disclosure Policy (VDP)?

A Vulnerability Disclosure Policy is a published statement that tells security researchers how to report vulnerabilities they find in your systems, what to expect in response, and what legal protections they have for doing so in good faith. It is the front door for coordinated vulnerability disclosure — without one, researchers who find vulnerabilities in your systems have no safe, structured way to tell you about them.

What is the difference between a VDP and a bug bounty programme?

A VDP is a policy that defines how to report vulnerabilities and the safe harbour protections for researchers who do so. A bug bounty programme is a VDP plus financial incentives — researchers are paid for valid findings. A VDP is the foundation; a bug bounty is built on top of it. Most organisations should start with a VDP before introducing monetary rewards, which significantly increase report volume and triage complexity.

Does ISO 27001 require a VDP?

ISO 27001:2022 Annex A.8.8 requires organisations to manage technical vulnerabilities, and A.5.6 requires contact with special interest groups including security research communities. A VDP directly satisfies both controls. SOC 2 CC7.1 requires that vulnerabilities are identified through system monitoring and testing — a VDP extends this to external researchers.

What should a safe harbour clause include?

A safe harbour clause should explicitly state that the organisation will not pursue legal action against researchers who discover and report vulnerabilities in good faith, acting within the defined scope and following the policy guidelines. It should reference that the organisation considers such research authorised under applicable computer crime laws. It should also state what researchers must not do — such as accessing user data beyond what is necessary to demonstrate the vulnerability.

What is a security.txt file?

A security.txt file is a standardised text file published at /.well-known/security.txt on your web server that tells security researchers how to contact you about vulnerabilities. It is defined by RFC 9116 and typically includes your security contact email or URL, a link to your VDP, an expiry date, and optionally a PGP key for encrypted submissions. It is the single most effective way to ensure researchers can find your disclosure channel.