|
|
CVE Board Meeting - 19 September 2018
Board Members in Attendance Andy Balinsky,
Cisco Systems, Inc. William Cox,
Synopsys, Inc. Kent Landfield,
McAfee Scott Lawler,
LP3 Art Manion,
CERT/CC (Software Engineering Institute, Carnegie Mellon University) Beverly Miller,
Lenovo Group Ltd. Scott Moore,
IBM Lisa Olson,
Microsoft Kurt Seifried,
Cloud Security Alliance David Waltermire,
National Institute of Standards and Technology (NIST)
Members of MITRE CVE Team in Attendance
Jo Bazar
Chris Coffin
Jonathan Evans
Joe Sain
George Theall
Other Attendees None Agenda
2:00 – 2:15:
Introductions, action items from the last meeting – Chris Coffin
2:15 – 2:30:
Working Groups
·
Strategic Planning – Kent Landfield / Chris Coffin
·
Automation – Chris Johnson / Dave Waltermire
2:30 – 2:45:
CNA Update
·
DWF – Kurt Seifried
·
MITRE – Jonathan Evans
·
JPCERT – Taki Uchiyama
2:45 – 3:50:
Open Discussion 3:50 – 4:00:
Action items, wrap-up – Chris Coffin
Review of Action Items from Last Meeting – 5 September 2018
o
Status: Done.
Initial response was belated due to automated tier 1 response system. HackerOne suggests private CNA email for future communications
o
We will explore the possibility of using Handshake to host the CNA email list and have the CNAs maintain it.
Working Group Updates
·
Strategic Planning – Kent Landfield / Chris
Coffin
o
Kick Off meeting will be September 20, 2018, 4pm – 5pm (EST)
·
Automation
– Chris Johnson / Dave Waltermire
o
Meeting was held on Monday Sept. 17th, to discuss the projects and their status.
o
A kick-off meeting will be set up to review the draft high-level requirements that were developed from the strategic working groups.
o
Kurt requested a “Code of Conduct” for the projects, since they are opening up to CNA’s and others.
CNA Updates
·
DWF – Kurt Seifried
·
MITRE – Jonathan Evans
o
Cybersecurity Philippines CERT is a new CNA, would like to be a Root CNA.
o
HCL requested to be a CNA. Met with CNCert last week about requirements for being a Root CNA. Training session needs to be schedules about the CVE rules.
o
IBM requested to have their X-Force Red team become a researcher CNA, MITRE advised IBM that researcher CNAs are currently on hold. Board (Kent)
felt that IBM could be trusted to assign out of their existing IBM CNA pool of CVE IDs.
o
Oracle updated their scope so that end of life products are no longer be covered.
o
ZTE plans on updating their scope, end of life products will not be covered.
·
JPCERT – Taki Uchiyama (not on call)
Open Discussion Items
End of Life Product Discussion
Update from
Briefing on the Hill
·
Chris Coffin provided an update on the response to the congressional letter regarding CVE funding and coverage received at the end of August. MITRE met with House
Energy and Commerce Committee staff members in Washington, D.C. The meeting went very well; they are
supportive of the changes that the CVE Board and MITRE have been making to the program and they appreciated the updates. They appreciate our efforts in evolving the program and producing
CVEs faster, they look forward to the changes in governance, operations, and infrastructure and for sharing metrics moving forward. They believe we have a great story and they appreciate the hard work that has beenput in. The committee have heard from others
in the community and from our sponsor expressing support and the direction the program is heading. The recommendation is to provide consistent funding to the program in the form of a line item in the budget to stabilize the funding. CVE Metrics should be shared
with the general public as well going forward. There was confusion among the staffers present regarding roles and responsibilities between CVE, NVD, and CERT.
Potential new board member
CVSS (Common Vulnerability Scoring System)
Meeting Action Items
·
Homework for the Board:
·
Art Manion to report back to the Board about the CVSS SIG Meeting.
·
Scott Moore to notify MITRE on how to handle IBM researcher CNA status
·
Chris Coffin - Add Andy
Balinsky to the Cloud Security Alliance working group to discuss CVE for services.
·
Andy Balinsky - Post message/document to the list as a foundational piece regarding Cloud Security Alliance.
·
Chris Coffin - Add CSA to the regular agenda for the board meeting (a readout from the last call).
·
MITRE (Chris C/Jonathan) to send out an email to the Board list to initiate the CNA Rules revision process.
·
Send out note to Board on CVE Quality WG (MITRE).
Board Decisions
·
Scott Moore (IBM) will be allowed to use his IBM CVE IDs or create an alternate IBM CNA to cover IBM researcher vulnerabilities.
Future Discussion Topics
4) CNA Scope Issues
The Board discussed that
CNA documentation around roles and responsibilities are needed, current documentation is not clear, CNA assign CVE within their scope. Scope may or may not cover CVE for their customers.
o
CNA Rules
- The rules state CNAs must be responsive but does not provide a specific timeframe. The rules state if a CNA plans to assign a CVE for a vulnerability another vendor’s product, to
the assigning CNA should contact the vendor. The vendor would then make a determination.
o
New Approach to CNAs and Roots - A given Root has a scope. A portion of the scope
gets delegated to a CNA (i.e., product or area of research). If a portion of the scope is not delegated to a CNA, that scope stays with the Root. It is the Root’s responsibility to do the CVE assignment as the CNA of last resort.
o
Action Item
– CNA Rules need to be updated to reflect this new approach.
5) Eliminate duplication CVE assignment discussion
o
The Board discussed that specifying CNA scope will help eliminate duplicate CVE assignments. Art explained that having open communication with other CNAs when
making CVE assignments is critical; keeping this communication at the CNA level (not at Root/Primary level) will help with duplication.
o
Recommendation 1:
Process recommendation needs to be added to CNA training.
o
Recommendation 2: CNA rules need to be updated to minimize duplicate assignments.
o
Johnathan explained that duplication of CVE assignments occurs the most with DWF.
6) Researcher CNAs
o
The Board discussed researcher CNAs that have with ambiguous scopes. These CNAs have issued thousands of CVEs.
o
Recommendation 1: Avoid adding any new researcher CNAs until there are specific
qualifications and guidelines for what qualifies as a researcher CNA. This includes defined scope rules yet to be discussed.
o
Recommendation 2: Make the scope naturally programmatic for researcher CNAs.
o
Recommendation 3: Change the process for researcher CNAs. Who is responsible for
coordinating the assignment of the IDs? Who issues the CVE ID and who populates the information? There should be an easier way for companies to request an CVE ID.
o
Recommendation 4:
Better define roles and responsibilities for researcher CNAs.
o
Recommendation 5:
Need to address the researcher CNA ambiguous scope issue before onboarding additional researcher CNAs.
o
Recommendation 6:
Explore the possibility of researchers participating in the CNA program without becoming CNAs.
o
Recommendation 7:
Need a testing/certification program for CNAs to make sure they can adequately perform their role, especially researchers.
o
The Board agreed to explore better solutions regarding the researcher CNA ambiguous scope issue.
7)
Operationalize Root CNAs effectively
o
Further discussion is needed regarding how we can operationalize Root CNAs more effectively.
o
Additional discussion regarding MITRE’s role in operationalizing roots is needed.
8)
Product Type Tagging/Categorization
o
As the production numbers for CVEs go up, there will be an increasing need to view a subset of the overall CVE master list
o
Define a list of common product areas/domains to be used for categorizing CVE entries (e.g.., Medical devices, automotive, industrial, etc.)
o
The tags/categories should be attached to the products and not to the CVE entries directly.
o
Product listings in CVE User Registry would be a potential location.
Meeting recordings available here:
https://handshake.mitre.org/file/group/15069086/all#15213189 |
Attachment:
CVE Board Meeting 19 September 2018.docx
Description: CVE Board Meeting 19 September 2018.docx