PSIRT Charter Template
A formal charter for establishing or formalising a Product Security Incident Response Team (PSIRT). Defines the team's mandate, authority, scope, membership, and operating procedures under the EU Cyber Resilience Act and ISO/IEC 30111.
Charter Purpose and Authority
Article 13(1)This charter establishes the [COMPANY NAME] Product Security Incident Response Team (PSIRT) and defines its mandate, authority, scope, and operating procedures.
The [COMPANY NAME] PSIRT is formally authorised by [CISO / CTO / BOARD] to act as the central function responsible for managing security vulnerabilities and incidents affecting [COMPANY NAME] products. The PSIRT operates under the authority of the [CISO / EXECUTIVE SPONSOR] and has the authority to escalate to any business unit necessary to protect [COMPANY NAME] customers.
This charter is effective as of [DATE] and supersedes any prior informal arrangements for vulnerability management.
A PSIRT without explicit executive authority is ineffective. The charter must name the executive sponsor and make clear that the PSIRT can compel action from engineering, legal, and communications. Board or C-suite sign-off signals that security is taken seriously.
Scope
Article 13The [COMPANY NAME] PSIRT is responsible for security vulnerabilities and incidents affecting:
- All [COMPANY NAME] products with digital elements placed on the EU market
- All [COMPANY NAME] cloud services, APIs, and associated infrastructure
- Open-source components maintained by [COMPANY NAME]
Out of scope:
- Physical security incidents (handled by [FACILITIES / CORPORATE SECURITY])
- Data breaches not involving product vulnerabilities (handled by [PRIVACY / LEGAL TEAM])
- Vulnerabilities in third-party products not distributed by [COMPANY NAME]
The PSIRT coordinates with adjacent teams for overlapping incidents.
A clear scope prevents both gaps and conflicts. Where scope overlaps with other teams (e.g. data breach response, physical security), define the handoff explicitly. Unclear scope leads to incidents falling through the cracks.
PSIRT Membership and Roles
Article 13(1), Article 14Core PSIRT Members
| Role | Name | Contact | Backup | |---|---|---|---| | PSIRT Lead | [NAME] | [EMAIL / PHONE] | [BACKUP NAME] | | Security Engineer | [NAME] | [EMAIL] | [BACKUP NAME] | | Engineering Liaison | [NAME] | [EMAIL] | [BACKUP NAME] | | Legal Counsel (advisory) | [NAME] | [EMAIL] | [BACKUP NAME] | | Communications Lead | [NAME] | [EMAIL] | [BACKUP NAME] |
Extended PSIRT Members (engaged as needed)
- Product managers for affected product lines
- Customer success and support leads
- External security advisors or researchers
PSIRT Lead responsibilities: Day-to-day PSIRT operations, Article 14 escalation authority, external communications with ENISA and national CSIRTs, final decision on disclosure timing.
Every role needs a named backup. PSIRT incidents do not wait for holiday returns. Review membership annually and whenever there is a staff change. The PSIRT Lead must have explicit Article 14 authority - this is a compliance requirement, not a preference.
Operating Procedures
Article 13, Article 14The PSIRT operates according to the following lifecycle:
- Intake - All vulnerability reports are received via the official disclosure portal or security alias and logged within 48 hours.
- Triage - Severity is assessed using CVSS 3.1 or 4.0 within 5 business days. Article 14 triggers are assessed at this stage.
- Remediation - Engineering is engaged with a target patch date based on severity SLAs.
- Article 14 notification - If triggered, ENISA early warning within 24 hours, full notification within 72 hours.
- Advisory publication - CSAF 2.0 advisory published at patch release.
- Post-incident review - Conducted for all Critical and High severity vulnerabilities within 30 days of closure.
Full operational procedures are documented in the [VULNERABILITY REPORTING PROCESS DOCUMENT LOCATION].
The charter should reference the full process document rather than repeat it in detail. Keep the charter strategic; keep the process document operational. This makes both easier to maintain.
Severity Classification and SLAs
Article 13, Article 14The PSIRT classifies vulnerabilities using CVSS base scores:
| Severity | CVSS Range | Patch SLA | Escalation | |---|---|---|---| | Critical | 9.0–10.0 | 7 days | CISO + Engineering VP immediately | | High | 7.0–8.9 | 30 days | PSIRT Lead within 24 hours | | Medium | 4.0–6.9 | 90 days | Standard sprint planning | | Low | 0.1–3.9 | Next minor release | Scheduled |
Article 14 notification is triggered when a vulnerability is actively exploited in the wild, or constitutes a severe security incident, regardless of CVSS score.
SLAs must be achievable. If Critical issues cannot realistically be patched in 7 days, adjust - but document your reasoning. Regulators will expect you to justify SLAs that are significantly longer than industry norms.
External Coordination
Article 14[COMPANY NAME] PSIRT coordinates with the following external parties as required:
- ENISA - Mandatory notification under CRA Article 14 via the Single Reporting Platform (SRP)
- National CSIRT ([COUNTRY CSIRT NAME and URL]) - Coordination on vulnerabilities affecting critical infrastructure or national security
- Upstream component vendors - For vulnerabilities originating in third-party components
- CVE Programme / MITRE - For CVE identifier assignment
- Security researchers - Via our public CVD policy at [PUBLIC POLICY URL]
- Sector-specific authorities - [ENISA / NCB / SECTOR REGULATOR] as applicable
The PSIRT Lead is the sole authorised spokesperson for external communications regarding product vulnerabilities.
Naming the external coordination contacts in the charter prevents delays when an incident occurs. Knowing which CSIRT to contact and having the ENISA SRP credentials ready are table-stakes for CRA compliance.
Charter Review and Maintenance
Article 13This charter will be reviewed:
- Annually by the PSIRT Lead and CISO
- Following any Critical severity incident
- Following material changes to [COMPANY NAME] product portfolio
- Following regulatory updates to the EU Cyber Resilience Act implementing acts
All revisions will be version-controlled and approved by [CISO / EXECUTIVE SPONSOR]. The current version of this charter is maintained at [INTERNAL LOCATION].
Version: [1.0] Effective date: [DATE] Next review: [DATE + 12 months]
An unreviewed charter becomes stale and unusable. Make review a standing agenda item in your annual security governance calendar. Post-incident reviews often surface charter gaps - capture them immediately.
Use this template automatically in CVD Portal
CVD Portal generates your CVD policy, tracks acknowledgments, and creates an audit trail — free for Article 14 compliance.
Set up your free portal