Scoping for a bug bounty effort is a critical step in hosting an effective bounty program. Tuning your scope to fit the security needs of your organization can make a significant difference in researcher engagement, meeting your program goals, and creating a lasting positive effect on your cyber security.
Mapping Scope to Goals:
One of the most effective ways to scope an engagement is to begin by defining the goals or outcomes you wish to see from a bounty program. If you aim to see code development improvement then scoping in source code, deployment pipelines, and production applications may make for an effective choice. If you are hoping to identify weaknesses in your deployed application then scoping in the application and any supporting services (cloud hosting, web application firewall, load balancing) may be preferable.
Incentivize Worst Case Scenarios:
Another way to best identify scope is to table top worst case scenarios. If an attacker got in, what actions or systems would be the worst possible outcomes of a breach? Using these “nightmare” scenarios as a basis, it is possible to add incentives to vulnerabilities that would lead directly (or chain indirectly) to these outcomes. If a specific database holds sensitive information such as Personally Identifiable Information (PII) or Protected Healthcare Information (PHI), incentivizing vulnerabilities against these specific assets would be prudent.
Test/Staging vs. Production Environments:
Many organizations implement a testing environment which may be referred to as staging, test, development, user acceptance testing, or pre-production environments. Organizations may be inclined to offer these environments for scope to avoid negative impacts to production. The standing recommendation for scoping is to test the production environment if at all possible. While many test environments claim to be exact copies of production, in all prior experience nuances between these environments leads system owners to pay for vulnerabilities that do not exist in the production instance. Additionally, vulnerabilities may exist in production environments that do not exist in any pre-production instances. Asset owners sometimes profess concern about the risk of researchers accessing production environments. In our experience, the detailed rules of engagement put in place for bug bounties, combined with detailed logging of researcher actions and researchers' need to maintain their professional reputations, provide more than sufficient risk mitigation.
Legal Protections for Vulnerability Disclosure:
Organizations routinely fear perceived legal and policy consequences for vulnerabilities found during a bug bounty or a vulnerability disclosure program. Federal policy has been updated to provide protection to security researchers operating in good faith. M-20-32 provides the latest guidance on vulnerability research performed during bug bounties and vulnerability disclosure programs. It is clearly stated in that memo that, “Good-Faith Security Research is Not an Incident or Breach”. However, in the process of assessing and responding to the reported vulnerability, it is possible to discover that an incident or breach occurred prior to the vulnerability report. Any discovered incident or breach must be handled according to the OMB Memo M-17-12. Both Memo's are available near the top of this page.
Scoping for a bug bounty effort is a critical step in hosting an effective bounty program. Tuning your scope to fit the security needs of your organization can make a significant difference in researcher engagement, meeting your program goals, and creating a lasting positive effect on your cyber security.
Mapping Scope to Goals:
One of the most effective ways to scope an engagement is to begin by defining the goals or outcomes you wish to see from a bounty program. If you aim to see code development improvement then scoping in source code, deployment pipelines, and production applications may make for an effective choice. If you are hoping to identify weaknesses in your deployed application then scoping in the application and any supporting services (cloud hosting, web application firewall, load balancing) may be preferable.
Incentivize Worst Case Scenarios:
Another way to best identify scope is to table top worst case scenarios. If an attacker got in, what actions or systems would be the worst possible outcomes of a breach? Using these “nightmare” scenarios as a basis, it is possible to add incentives to vulnerabilities that would lead directly (or chain indirectly) to these outcomes. If a specific database holds sensitive information such as Personally Identifiable Information (PII) or Protected Healthcare Information (PHI), incentivizing vulnerabilities against these specific assets would be prudent.
Test/Staging vs. Production Environments:
Many organizations implement a testing environment which may be referred to as staging, test, development, user acceptance testing, or pre-production environments. Organizations may be inclined to offer these environments for scope to avoid negative impacts to production. The standing recommendation for scoping is to test the production environment if at all possible. While many test environments claim to be exact copies of production, in all prior experience nuances between these environments leads system owners to pay for vulnerabilities that do not exist in the production instance. Additionally, vulnerabilities may exist in production environments that do not exist in any pre-production instances. Asset owners sometimes profess concern about the risk of researchers accessing production environments. In our experience, the detailed rules of engagement put in place for bug bounties, combined with detailed logging of researcher actions and researchers' need to maintain their professional reputations, provide more than sufficient risk mitigation.
Legal Protections for Vulnerability Disclosure:
Organizations routinely fear perceived legal and policy consequences for vulnerabilities found during a bug bounty or a vulnerability disclosure program. Federal policy has been updated to provide protection to security researchers operating in good faith. M-20-32 provides the latest guidance on vulnerability research performed during bug bounties and vulnerability disclosure programs. It is clearly stated in that memo that, “Good-Faith Security Research is Not an Incident or Breach”. However, in the process of assessing and responding to the reported vulnerability, it is possible to discover that an incident or breach occurred prior to the vulnerability report. Any discovered incident or breach must be handled according to the OMB Memo M-17-12. Both Memo's are available near the top of this page.