Responsible Disclosure
It happens that a security researcher, organization, ethical hacker, or an accidental visitor discovers a flaw or vulnerability in a product or service. This flaw or vulnerability may allow people to access certain company systems, applications, or information to which they should not have access. A finder of such a vulnerability can handle this information in various ways. With a responsible disclosure policy, we invite the finder of a vulnerability to report this discovered vulnerability. This gives us time to solve the problem before information about the vulnerability is made public.
Responsible Disclosure Report
CloudSphere finds it essential that ICT systems are secure and strives for high security. However, it can happen that there is a weak spot in one of these systems.
Vulnerabilities in CloudSphere ICT systems
If you have found a weak spot in one of CloudSphere's ICT systems, we would like to hear from you. This way, we can take the necessary measures as soon as possible to fix the found vulnerability. To responsibly handle found vulnerabilities in ICT systems, there are agreements. You can hold CloudSphere to these agreements when you find a weak spot in one of the systems.
CloudSphere asks you to:
Email your findings to [email protected].
Provide sufficient information to reproduce the problem so that CloudSphere can solve it as quickly as possible. Usually, the IP address or URL of the affected system and a description of the vulnerability are sufficient, but more may be needed for complex vulnerabilities.
Leave contact details so that CloudSphere can contact you to work together on a secure result. Leave at least an email address or phone number.
Report the vulnerability as soon as possible after discovery.
Not share information about the security problem with others until it is resolved.
Handle the knowledge about the security problem responsibly by not performing actions that go beyond what is necessary to demonstrate the security problem.
Avoid the following actions:
Placing malware
Copying, modifying, or deleting data in a system (an alternative is to make a directory listing of a system).
Making changes to the system.
Repeatedly accessing the system or sharing access with others.
Using brute force to access systems.
Using denial-of-service or social engineering.
What you can expect:
If you meet the above conditions when reporting a vulnerability in a CloudSphere ICT system, CloudSphere will not attach legal consequences to this report.
For reports about third-party systems: