|
2 | 2 | Vulnerability Notification
|
3 | 3 | ==========================
|
4 | 4 |
|
5 |
| -10gen values the privacy and security of all users of MongoDB, and we |
| 5 | +.. default-domain:: mongodb |
| 6 | + |
| 7 | +`10gen <http://www.10gen.com/>`_ values the privacy and security of all users of MongoDB, and we |
6 | 8 | work very hard to ensure that MongoDB and related tools minimize risk
|
7 | 9 | exposure and increase the security and integrity of data and
|
8 | 10 | environments using MongoDB.
|
9 | 11 |
|
10 | 12 | Notification
|
11 | 13 | ------------
|
12 | 14 |
|
13 |
| -If you believe you've discovered a vulnerability in MongoDB or a |
14 |
| -related product, have experienced a security incident related to |
| 15 | +If you believe you have discovered a vulnerability in MongoDB or a |
| 16 | +related product or have experienced a security incident related to |
15 | 17 | MongoDB, please report these issues so that 10gen can respond
|
16 | 18 | appropriately and work to prevent additional issues in the
|
17 | 19 | future. All vulnerability reports should contain as much information
|
18 |
| -as possible so that we can move easily to resolve the issue, in |
19 |
| -particular, include the following: |
| 20 | +as possible so that we can move easily to resolve the issue. |
| 21 | +In particular, please include the following: |
20 | 22 |
|
21 | 23 | - The name of the product.
|
22 | 24 |
|
@@ -59,26 +61,26 @@ You may encrypt email using our `public key
|
59 | 61 | of a any sensitive information in your vulnerability report.
|
60 | 62 |
|
61 | 63 | 10gen will respond to any vulnerability notification received via
|
62 |
| -email via email which will contain a reference number (i.e. a ticket |
| 64 | +email with email which will contain a reference number (i.e. a ticket |
63 | 65 | from the SECURITY project,) Jira case posted to the `SECURITY
|
64 | 66 | <https://jira.mongodb.org/SECURITY/>`_ project.
|
65 | 67 |
|
66 | 68 | Evaluation
|
67 | 69 | ~~~~~~~~~~
|
68 | 70 |
|
69 | 71 | 10gen will validate all submitted vulnerabilities. 10gen will use Jira
|
70 |
| -to track all communication regarding the vulnerability, which may |
71 |
| -include requests for clarification and additional information. If |
| 72 | +to track all communications regarding the vulnerability, which may |
| 73 | +include requests for clarification and for additional information. If |
72 | 74 | needed 10gen representatives can set up a conference call to exchange
|
73 | 75 | information regaining the vulnerability.
|
74 | 76 |
|
75 | 77 | Disclosure
|
76 | 78 | ~~~~~~~~~~
|
77 | 79 |
|
78 | 80 | 10gen requests that you do *not* publicly disclose any information
|
79 |
| -regarding the vulnerability or exploit, until 10gen has had the |
| 81 | +regarding the vulnerability or exploit until 10gen has had the |
80 | 82 | opportunity to analyze the vulnerability, respond to the notification,
|
81 |
| -and if needed to notify key users, customers, and partners. |
| 83 | +and to notify key users, customers, and partners if needed. |
82 | 84 |
|
83 | 85 | The amount of time required to validate a reported vulnerability
|
84 | 86 | depends on the complexity and severity of the issue. 10gen takes all
|
|
0 commit comments