Vulnerability Reporting Process Template
An internal-facing vulnerability reporting process that documents how your security team handles incoming reports from intake through resolution. Complements your public CVD policy with operational procedures aligned to CRA Article 13 and 14.
Purpose
Article 13This document describes the internal process by which [COMPANY NAME] receives, triages, remediates, and discloses security vulnerabilities in its products and services. It is an internal operational document that supports our public Coordinated Vulnerability Disclosure Policy.
This process applies to all vulnerability reports received from external researchers, customers, partners, automated scanning tools, and internal discovery.
This is an internal document, not the public-facing policy. Keep it specific and operational. Vague processes are not followed - concrete steps with owners and deadlines are.
Step 1 - Intake and Acknowledgment
Article 13(1)Owner: [SECURITY CONTACT / PSIRT LEAD] SLA: 48 hours from receipt
All incoming vulnerability reports are received via:
- The vulnerability disclosure portal at [PORTAL URL]
- The security email alias [[email protected]]
- Escalations from customer support (tagged [SECURITY-ESCALATION])
Actions:
- Log the report in [ISSUE TRACKER / TICKETING SYSTEM] under the 'Vulnerability Reports' project.
- Assign a unique identifier (e.g. VUL-YYYY-NNNN).
- Send acknowledgment to the reporter within 48 hours using the acknowledgment template in [TEMPLATE LOCATION].
- If the report appears to be spam or not a security issue, close with a polite explanation and log the decision.
Every report must be logged, even invalid ones. This creates an audit trail that demonstrates you have a functioning programme under CRA Article 13. Assign an ID immediately - it prevents duplicate handling and helps cross-reference with CVEs later.
Step 2 - Initial Triage
Article 13, Article 14Owner: [SECURITY ENGINEER / PSIRT MEMBER] SLA: 5 business days from receipt
Actions:
- Attempt to reproduce the vulnerability in a controlled environment.
- Assign an initial CVSS 3.1 or 4.0 base score.
- Classify the vulnerability:
- Critical (CVSS 9.0–10.0): Escalate immediately to PSIRT lead and engineering VP
- High (CVSS 7.0–8.9): Assign to product security team within 1 business day
- Medium (CVSS 4.0–6.9): Add to current sprint planning cycle
- Low (CVSS 0.1–3.9): Schedule for next minor release
- Determine if the vulnerability is actively being exploited in the wild.
- If actively exploited or constitutes a severe security incident: trigger Article 14 Escalation (see Step 3a).
- Update the ticket with triage outcome and communicate to reporter.
Severity classification drives your remediation SLAs and determines whether Article 14 notification is required. Document your CVSS scoring rationale - auditors will ask.
Step 3a - Article 14 Escalation (if applicable)
Article 14Trigger: Vulnerability is actively exploited in the wild, OR constitutes a severe security incident as defined under CRA Article 14.
Owner: [PSIRT LEAD / CISO] SLA: Act within 1 hour of determination
Actions:
- Notify the PSIRT lead, CISO, and legal counsel immediately.
- Submit an early warning to ENISA via the Single Reporting Platform (SRP) within 24 hours of becoming aware.
- Submit a full notification to ENISA within 72 hours including: product details, CVSS score, affected user population, and initial mitigation steps.
- Coordinate with national CSIRT ([NATIONAL CSIRT NAME]) if required.
- Submit a final report to ENISA within 14 days (or agreed extended period) including root cause analysis and remediation steps.
- Log all ENISA submissions and reference numbers in the vulnerability ticket.
Article 14 escalation must be documented and rehearsed - it is a compliance obligation, not a best practice. The 24-hour early warning window is extremely tight. Assign a named owner and ensure they know where to find the ENISA SRP credentials.
Step 3b - Remediation
Article 13Owner: [ENGINEERING LEAD for affected product] SLA: Based on severity
| Severity | Patch SLA | |---|---| | Critical | 7 days | | High | 30 days | | Medium | 90 days | | Low | Next minor release |
Actions:
- Create a tracked engineering issue linked to the vulnerability ticket.
- Develop and test the fix in a private branch.
- Request security review of the patch from [SECURITY TEAM].
- Obtain CVE identifier from [CVE Numbering Authority / MITRE] if applicable.
- Prepare draft security advisory using the advisory template at [TEMPLATE LOCATION].
- Notify reporter of expected patch date and request confirmation of fix.
Remediation SLAs must be realistic and actually enforced. If your team consistently misses them, revise them rather than ignoring them - indefensible SLAs are worse than honest ones.
Step 4 - Disclosure and Advisory Publication
Annex I, Article 13Owner: [PSIRT LEAD / SECURITY COMMUNICATIONS] SLA: Publish advisory on or before patch release
Actions:
- Finalise the security advisory (CVE ID, CVSS score, affected versions, fix version, acknowledgment).
- Publish advisory at [ADVISORY URL] in both HTML and CSAF 2.0 format.
- Distribute advisory via [EMAIL LIST / RSS / SECURITY MAILING LIST].
- Notify the reporter that the issue is resolved and the advisory is published.
- Close the vulnerability ticket with reference to the published advisory.
- Update the public [ACKNOWLEDGMENTS PAGE] if the reporter has consented to credit.
- Conduct a 30-day post-incident review for Critical and High severity issues.
Publish the advisory at the same time as the patch - not before. CSAF 2.0 publication is increasingly expected by enterprise customers and aligns with CRA Annex I. CVD Portal generates CSAF 2.0 automatically.
Roles and Responsibilities
Article 13(1)| Role | Responsibility | |---|---| | PSIRT Lead | Overall process ownership; Article 14 escalation authority | | Security Engineer | Triage, reproduction, CVSS scoring | | Engineering Lead | Patch development and release | | CISO | Escalation for Critical issues; ENISA communications | | Legal Counsel | Notified for all Critical issues; advises on safe harbour | | Security Communications | Advisory drafting and publication |
PSIRT Contact: [NAME], [EMAIL], [PHONE] Backup contact: [NAME], [EMAIL]
Named owners with backup contacts are essential. When a Critical vulnerability lands, you do not want to be searching for who is responsible. Review this list whenever there is a staff change.
Use this template automatically in CVD Portal
CVD Portal generates your CVD policy, tracks acknowledgments, and creates an audit trail — free for Article 14 compliance.
Set up your free portal