← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 40/100

Cybersecurity Briefing — CISA BOD 20-01 mandates federal vulnerability disclosure policies

CISA issued Binding Operational Directive 20-01 on 2 September 2020, requiring U.S. federal agencies to publish vulnerability disclosure policies and intake channels within 180 days.

Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

Executive briefing: CISA’s Binding Operational Directive 20-01 requires every U.S. federal civilian executive branch agency (FCEB) to publish a vulnerability disclosure policy (VDP) and expand its scope over time. Issued , the directive set a deadline to publish a public VDP covering internet-accessible systems and to stand up intake and remediation workflows. Scope must then widen every 90 days until all externally accessible systems are covered within two years. This briefing delivers a 5–7 minute read with compliance checkpoints, agency and vendor roles, evidence expectations, and navigation to the pillar hub, the vulnerability disclosure playbook, and related briefs on EO 14028 modernization and global enforcement readiness.

What BOD 20-01 mandates

  • Publish a public VDP within 180 days covering at least one internet-accessible system, with clear scope, testing authorization, safe-harbor language for good-faith research, reporting instructions, and disclosure handling rules.
  • Create a reporting channel (email alias or web form) monitored by the security team, including how to submit vulnerability details securely without sharing PII or exploitation data publicly.
  • Commit to intake and remediation by acknowledging researcher reports, triaging severity, assigning ownership, and deploying fixes; while BOD 20-01 does not set explicit remediation SLAs, agencies must act in a timely, risk-informed manner.
  • Expand scope every 90 days by adding more internet-accessible systems until all are in-scope within two years of issuance (by September 2022), tracking additions and exceptions.
  • Coordinate with CISA by sharing VDP URLs, points of contact, and implementation status so the agency can validate coverage and support coordination if active exploitation emerges.

Roles and responsibilities

  • Agency CIO/CISO: Own policy approval, publish VDP, ensure legal review, set escalation paths, and track scope expansion across bureaus.
  • Security operations: Monitor the reporting channel, acknowledge reports, validate findings, open tickets, and coordinate remediation and disclosure.
  • Product and system owners: Keep asset inventories current, accept testing windows, prioritize fixes, and confirm when scope can expand.
  • Legal and privacy: Review safe-harbor language, clarify prohibited testing (e.g., social engineering), and ensure no PII or mission-sensitive data is exposed during testing.
  • Vendors and integrators: Provide SBOMs and patch plans for hosted software, support mitigation, and align SLAs to agency triage timelines.

Readiness timeline

WindowActionArtifacts
Weeks 1–4Draft VDP language, select reporting channel, confirm legal review, and inventory internet-facing systems.VDP draft, asset list, counsel sign-off.
Weeks 5–8Publish initial VDP covering at least one system; configure mailbox or form with auto-acknowledgment; train SOC on intake workflow.Public VDP URL, mailbox runbook, SOC checklist.
Weeks 9–12Exercise the process with a tabletop, validate ticketing integration, and set scoring rubric (e.g., CVSS alignment) for triage.Tabletop report, ticket templates, triage rubric.
QuarterlyAdd additional internet-accessible systems to scope, update diagrams and DNS inventories, and review patterns from received reports.Scope-addition log, updated network map, lessons-learned memo.
AnnualReaffirm safe-harbor language, refresh contacts, and align with EO 14028 software supply chain requirements and SBOM intake.VDP revision, SBOM intake checklist, updated POCs.

Workflow diagram

        Reporter → VDP page → Secure form/email → Auto-ack
                                            ↓
                                     SOC triage → Validate → Severity score
                                            ↓
                                 Ticket → Owner assigned → Patch/mitigate
                                            ↓
                                 Verification → Researcher notified
                                            ↓
                                  Disclosure coordination (as needed)
            
VDP intake-to-remediation swimlane showing researcher submission, SOC triage, owner remediation, and coordinated disclosure.

Metrics and evidence

  • Time to acknowledge researcher reports and time to fix by severity.
  • Scope coverage: percentage of internet-accessible systems included in the VDP; number of systems added each 90-day increment.
  • Signal quality: ratio of valid to invalid reports; recurring root causes by service.
  • Remediation fidelity: fraction of fixes verified and tracked with rollback or mitigation steps.
  • Evidence: published VDP versions, scope-addition logs, acknowledgment samples (redacted), ticket closure summaries, and lessons-learned reports.

Controls and safeguards

  • Authorized testing rules that prohibit social engineering, denial of service, and data exfiltration.
  • Secure submission paths (TLS web form or encrypted email) with guidance to avoid PII and exploitation details in public channels.
  • Coordinated disclosure steps aligned to recent zero-day handling briefs, including embargo timelines and vendor coordination.
  • Patch governance linked to change management and configuration baselines so remediation is tracked in production, staging, and contingency environments.
  • Reporting to CISA with status on publication, scope growth, and constraints.

Day-one checklist

  • Confirm the public VDP URL is reachable, current, and indexed on the agency site.
  • Ensure the reporting alias/form is monitored and that auto-acknowledgment is live.
  • Verify scope wording is specific (systems, domains, APIs) and includes safe-harbor language.
  • Validate ticketing integration so SOC triage can open and route incidents in one step.
  • Publish a security.txt file pointing to the VDP.

Common pitfalls to avoid

  • Static scope: failing to add systems every 90 days, leaving shadow IT unaddressed.
  • Unclear rules of engagement that omit prohibited techniques or data-handling requirements.
  • Slow responses that discourage researchers; target acknowledging within days and fixing high-severity issues quickly.
  • Fragmented ownership when bureau systems lack clearly assigned remediation leads.
  • Missing evidence: inability to show VDP publication dates, scope expansion logs, or closure quality during oversight reviews.

Next actions

  1. Audit current VDP language against BOD 20-01 minimum elements and update where gaps exist.
  2. Publish the scope-addition schedule through September 2022 and align with asset owners.
  3. Run a researcher-driven tabletop to rehearse intake, triage, and remediation paths.
  4. Report VDP status and URL to CISA and coordinate on any exempted systems.
  5. Integrate lessons learned into zero trust and SBOM intake efforts under EO 14028.
Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • vulnerability disclosure
  • CISA
  • federal cybersecurity
  • coordinated disclosure
Back to curated briefings