Cybersecurity: What to Know About the 'Vulnerabilities Equities Process'
They may not realize it, but any company hit by the WannaCry ransomware attack over the past several months was impacted firsthand by a secretive U.S. government policy mechanism known as the VEP.
November 22, 2017 at 03:26 PM
10 minute read
SAN FRANCISCO — They may not realize it, but any company hit by the WannaCry ransomware attack over the past several months was impacted firsthand by a secretive U.S. government policy mechanism known as the VEP.
Short for the “Vulnerabilities Equities Process,” the VEP is the procedure through which the government decides whether to hang on to knowledge of computer security flaws for offensive uses (i.e., hacking), or disclose them to ensure they get patched. In the case of WannaCry, news reports and comments by Microsoft's chief legal officer indicated that the NSA knew about the vulnerability at the root of the worm, but only told Microsoft after losing control of it.
In the wake of the ensuing controversy, White House Cybersecurity Coordinator Rob Joyce last week for the first time unveiled a public version of the VEP Charter in an effort to shed some light on the government's decision-making process. The 14-page document describes in broad strokes the balancing act government hackers must go through after they discover new vulnerabilities. Here are a few things you ought to know about it:
|1) The government will usually disclose the vulnerabilities it finds. Usually.
“The new charter makes an important policy decision that the presumption lies in favor of disclosing the vulnerabilities to the companies,” said Michelle Richardson, a deputy director at the Center for Democracy and Technology who has written about the VEP. “While several Obama officials had said as much in their personal capacities, it is crucial to have it be an official declaration from the whole of government.”
The relevant language from the charter reads: “In the course of carrying out USG missions, the USG may identify vulnerabilities that cyber actors could exploit. In the vast majority of cases, responsibly disclosing a newly discovered vulnerability is clearly in the national interest.”
The caveat? The charter adds that there are “legitimate advantages and disadvantages to disclosing vulnerabilities, and the trade-offs between prompt disclosure and withholding knowledge of some vulnerabilities … can have significant consequences.” (Clearly.) When the government decides to keep a vulnerability under wraps, the charter says it will reassess that determination on an annual basis “until dissemination is accomplished,” or until the vulnerability becomes public or is “otherwise mitigated.”
|2) There are a lot of cooks in the kitchen.
According to the charter, the body in charge of administering the VEP is known as the “Equities Review Board.” The board, which meets monthly, or more frequently as needed, comprises representatives from at least 10 different government agencies, including the Office of the Director of National Intelligence, the Department of State, the Department of Treasury, the Central Intelligence Agency, and the Department of Justice.
The National Security Agency “will support VEP governance by serving as the Executive Secretariat for the VEP, acting at all times under the authority, direction, and control of the Secretary of Defense,” the charter says. It adds that other agencies may become involved when “demonstrating responsibility for, or identifying equity in, a vulnerability under deliberation.”
The new charter requires the secretariat to submit an annual report to the various agency “points of contact” and the White House National Security Council, and create an executive summary written at an unclassified level. “As part of a commitment to transparency, annual reporting may be provided to the Congress,” it adds.
|3) The government will not bother reviewing vulnerabilities that result from poor design.
There are types of vulnerabilities that will not go through the VEP process, according to the charter. Those include misconfiguration or poor configuration of a device that “sacrifices security in lieu of availability, ease of use or operational resiliency”; misuse of “available device features that enables non-standard operation”; and “engineering and configuration tools, techniques and scripts that increase/decrease functionality of the device for possible nefarious operations.” (Phone jailbreaking would ostensibly fall into this category.)
Lastly—and perhaps obviously—the government will not go through a VEP review upon discovering that a “device/system has no inherent security features by design.”
|4) Companies should think about their patching policies.
Joyce, in his blog post, acknowledges that the risk of not disclosing a vulnerability that the government learns about is that it will be exploited by other actors “to harm legitimate, law-abiding users of cyberspace.” In weighing the various considerations, he says that one of the choices the government has is to disclose the security flaw to the vendor “with expectation that they will patch the vulnerability.”
Stewart Baker, a partner at Steptoe & Johnson LLP and a former Department of Homeland Security official, said the charter underscores that if the government tells a company about a security hole, the company better make sure it has a plan to respond. ”They're going to have to think, 'Am I somehow liable for failing to patch?'” Baker said.
SAN FRANCISCO — They may not realize it, but any company hit by the WannaCry ransomware attack over the past several months was impacted firsthand by a secretive U.S. government policy mechanism known as the VEP.
Short for the “Vulnerabilities Equities Process,” the VEP is the procedure through which the government decides whether to hang on to knowledge of computer security flaws for offensive uses (i.e., hacking), or disclose them to ensure they get patched. In the case of WannaCry, news reports and comments by
In the wake of the ensuing controversy, White House Cybersecurity Coordinator Rob Joyce last week for the first time unveiled a public version of the VEP Charter in an effort to shed some light on the government's decision-making process. The 14-page document describes in broad strokes the balancing act government hackers must go through after they discover new vulnerabilities. Here are a few things you ought to know about it:
|1) The government will usually disclose the vulnerabilities it finds. Usually.
“The new charter makes an important policy decision that the presumption lies in favor of disclosing the vulnerabilities to the companies,” said Michelle Richardson, a deputy director at the Center for Democracy and Technology who has written about the VEP. “While several Obama officials had said as much in their personal capacities, it is crucial to have it be an official declaration from the whole of government.”
The relevant language from the charter reads: “In the course of carrying out USG missions, the USG may identify vulnerabilities that cyber actors could exploit. In the vast majority of cases, responsibly disclosing a newly discovered vulnerability is clearly in the national interest.”
The caveat? The charter adds that there are “legitimate advantages and disadvantages to disclosing vulnerabilities, and the trade-offs between prompt disclosure and withholding knowledge of some vulnerabilities … can have significant consequences.” (Clearly.) When the government decides to keep a vulnerability under wraps, the charter says it will reassess that determination on an annual basis “until dissemination is accomplished,” or until the vulnerability becomes public or is “otherwise mitigated.”
|2) There are a lot of cooks in the kitchen.
According to the charter, the body in charge of administering the VEP is known as the “Equities Review Board.” The board, which meets monthly, or more frequently as needed, comprises representatives from at least 10 different government agencies, including the Office of the Director of National Intelligence, the Department of State, the Department of Treasury, the Central Intelligence Agency, and the Department of Justice.
The National Security Agency “will support VEP governance by serving as the Executive Secretariat for the VEP, acting at all times under the authority, direction, and control of the Secretary of Defense,” the charter says. It adds that other agencies may become involved when “demonstrating responsibility for, or identifying equity in, a vulnerability under deliberation.”
The new charter requires the secretariat to submit an annual report to the various agency “points of contact” and the White House National Security Council, and create an executive summary written at an unclassified level. “As part of a commitment to transparency, annual reporting may be provided to the Congress,” it adds.
|3) The government will not bother reviewing vulnerabilities that result from poor design.
There are types of vulnerabilities that will not go through the VEP process, according to the charter. Those include misconfiguration or poor configuration of a device that “sacrifices security in lieu of availability, ease of use or operational resiliency”; misuse of “available device features that enables non-standard operation”; and “engineering and configuration tools, techniques and scripts that increase/decrease functionality of the device for possible nefarious operations.” (Phone jailbreaking would ostensibly fall into this category.)
Lastly—and perhaps obviously—the government will not go through a VEP review upon discovering that a “device/system has no inherent security features by design.”
|4) Companies should think about their patching policies.
Joyce, in his blog post, acknowledges that the risk of not disclosing a vulnerability that the government learns about is that it will be exploited by other actors “to harm legitimate, law-abiding users of cyberspace.” In weighing the various considerations, he says that one of the choices the government has is to disclose the security flaw to the vendor “with expectation that they will patch the vulnerability.”
Stewart Baker, a partner at
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllDemocratic State AGs Revel in Role as Last Line of Defense Against Trump Agenda
7 minute readPa. Judicial Nominee Advances While Trump Demands GOP Unity Against Biden Picks
4 minute readThe Unraveling of Sean Combs: How Legislation from the #MeToo Movement Brought Diddy Down
'Radical Left Judges'?: Trump Demands GOP Unity Against Biden's Judicial Picks
4 minute readTrending Stories
- 1Zero-Dollar Verdict: Which of Florida's Largest Firms Lost?
- 2Appellate Div. Follows Fed Reasoning on Recusal for Legislator-Turned-Judge
- 3SEC Obtained Record $8.2 Billion in Financial Remedies for Fiscal Year 2024, Commission Says
- 4Judiciary Law §487 in 2024
- 5Polsinelli's Revenue and Profits Surge Amid Partner De-Equitizations, Retirements
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250