About the Product Security Incident Response Team (PSIRT)
Last Modified: 2022-11-23 13:45:42 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
As of May 14, 2024, Knowledge Base (KB) articles will only be published and updated in our new Trellix Thrive Knowledge space.
Log in to the Thrive Portal using your OKTA credentials and start searching the new space. Legacy KB IDs are indexed and you will be able to find them easily just by typing the legacy KB ID.
About the Product Security Incident Response Team (PSIRT)
Technical Articles ID:
KB95564
Last Modified: 2022-11-23 13:45:42 Etc/GMT Summary
Contact PSIRT for Trellix and Skyhigh Security Submit security vulnerability reports through HackerOne. For other queries, you can reach the team over email at trellixpsirt@trellix.com. PSIRT Policy Statements
NOTE: Organizations, individuals, or both can be identified as discoverers.
Common Vulnerability Scoring System (CVSS) Scoring We use the most current CVSS version CVSS v3.1. All Security Bulletins must include the CVSS scores for each vulnerability and the associated CVSS vectors. The base score is needed. Both temporal and environmental scores are optional. Ideally, base scores should match the scores that the National Institute of Standards and Technology (NIST) assigns to CVEs. Support Notification Service (SNS) Emails An SNS email is needed for all Security Bulletins. To subscribe to SNS emails, go to the SNS Subscription Preferences site. Response Policy Our fix and alert response depends on the highest CVSS base score:
External Communication Mechanisms Our external communication mechanism depends on the CVSS base score, number of customer inquiries, and amount of media attention:
Crisis Scenarios For publicly known high-severity vulnerabilities that affect multiple products, we might publish a Security Bulletin with an update for one product, and then update the Security Bulletin as updates and descriptions for other products become available. Security Bulletins with multiple vulnerable products list all products with the following categories:
We don't usually publish Security Bulletins on Friday afternoons, unless it's a crisis scenario.
Vulnerability vs. Risk Scores We participate in the industry-standard CVSS vulnerability scoring system. CVSS scores should be considered as a starting point to determine what risk a particular vulnerability might pose to our customers. The CVSS score shouldn't be confused with a risk rating of the seriousness of vulnerabilities that might occur in our products or the associated runtime environments on which our products execute. The CVSS base score determines our initial response to a given incident. Security Bulletins with multiple vulnerable products list all products by category. The list below describes what each of the categories means in terms of potential customer impact:
Security Bulletins are available on our Knowledge Center. View Security Bulletins. Report a Vulnerability For information about how to report a vulnerability, see KB95563 - Report a vulnerability. Affected ProductsLanguages:This article is available in the following languages: |
|