The U.S. Department of Defense announced on Monday that it has created a new Vulnerability Disclosure Program to help guide researchers on how to report security flaws found in the DoD’s public websites.

Vulnerability Disclosure Program

Unlike the Hack the Pentagon and the Hack the Army program, this disclosure policy does not include any rewards. Instead, this policy provides researchers with a legal avenue for reporting security flaws.

Hackers who find any vulnerabilities in public websites owned, operated or controlled by the DoD, in particular, and .mil domains, can submit a report through HackerOne. The organization promises to acknowledge reports within three business days and publicly recognize those who submit valid issues.

Secretary of Defense, Ash Carter, claims, “The Vulnerability Disclosure Policy is a ‘see something, say something’ policy for the digital domain. We want to encourage computer security researchers to help us improve our defenses. This policy gives them a legal pathway to bolster the department’s cybersecurity and ultimately the nation’s security.”

This announcement comes after the recent success found in the Hack the Pentagon program. Over 1,400 hackers signed up for the initiative, 250 of which submitted one vulnerability report during the program and 138 of those submissions were eligible for a bounty. This initiative only cost $150,000, half of which represented the bounty rewards given to security researchers.

Hack the Army Program Kicks-Off

The Hack the Army program was also announced earlier this month, which offers cash rewards to hackers who find vulnerabilities in select, public-facing Army websites. This program offers dynamic exchanges of personally identifiable information, sites considered critical to the Army’s recruiting mission.

Registration for the program opened yesterday, November 21, at Registration is open until November 28 and will run between November 30 and December 21.

Army Secretary Eric Fanning explained, “Although we have a very well train, incredibly capable security team in the military, it’s not enough. The more different sets of eyes, more different teams that we can bring to this problem, the more secure we’re going to feel about our information.”

NNT & DISA STIG Compliance

As an OVAL Adopter, NNT Change Tracker can ingest SCAP and OVAL XCCDF content to generate reporting and monitoring templates for all STIGs and SCGs, as well as any other SCAP or OVAL checklist, like the CIS Benchmark Checklist for example.

More importantly, Change Tracker can create a non-stop monitoring template from the STIG compliance report checklist. This approach provides continuous, real-time monitoring for STIG compliance, reporting any drift within seconds of changes occurring. System-wide File Integrity Monitoring will also be operated continuously with changes reported in real-time to maximize breach detection awareness.


Read this article on SecurityWeek

Read the DoD’s Announcement here

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.