Security advisory policy
Through collaboration with the ForgeRock open source community and our customers, we strive to address security vulnerabilities transparently and rapidly.
Our ForgeRock security advisory policy describes how our community can engage ForgeRock on a security issue, as well as the process ForgeRock follows and the actions you can expect from us. ForgeRock customers should always raise a ticket with ForgeRock support for any security questions on our software. ForgeRock customers with questions that concern a code scanning report should refer to our Code Scanning Policy.
How to submit a security issue to ForgeRock
If you discover a security issue that affects a ForgeRock product, please email the details to email@example.com with the following information:
- How critical is the security issue?
- How did you become aware of the security issue?
- Did you discover the security issue yourself, or were you made aware of the issue through other means?
- A summary of the issue should contain the product that is affected, how the product is affected, and any known workarounds.
Upon receipt of the email, we will initiate our security process and will keep you informed about the progress of the issue.
Receipt of the security exploit
When ForgeRock receives notification of a new exploit or security issue within a ForgeRock product, the process of evaluation and resolution of a potential security issue is described below.
ForgeRock uses the following three key areas when assessing any potential security issue; Criticality, Customer Impact and Publicity. They are assessed in this order of precedence
- Criticality: Where does the exploit sit on the severity line?
- Customer Impact: What is the potential impact to the customer
- Publicity: Has the security issue been made public, is there an exploit that has also been made public?
If you have received an exploit, please read through the follow table; the threat level is determined by following severity level criteria:
|Severity Level||Criticality||Customer Impact||Publicity||Recommended Approach|
|Critical||Clear security risk without requiring existing access or accounts.||A risk exists that customer data could be exposed or system integrity compromised.||Details of an exploit is in the public domain.||Apply workaround or patches as soon as possible.|
|High||Threat exists, but prior knowledge of deployment/machine access/specific functionality/accounts would be required to exploit||There is no risk to customer data. No significant risk to system integrity.||Limited details of the issue, but the exploit is not in the public domain.||Assess the threat and apply workaround or patches as appropriate.|
|Medium||Only a risk in certain limited circumstances such as specific deployment or configuration.||A successful exploit has limited impact on the environment, no risk to customer data or system integrity.||Known to specific individuals and/or organisations, not in the public domain.||Determine if your deployment is at risk and apply workaround or patches as appropriate.|
|Low||Access to physical machine might be required to enable the exploit through configuration/customisation changes.||Very limited risk to the environment.||Not in the public domain.||Apply the workarounds or patches in your next software update cycle.|
The responsible product manager is ultimately responsible for deciding the appropriate severity level for the reported issue based on the aforementioned criteria.
- Critical: All known details are sent to ForgeRock’s internal security team, and the affected product manager is informed. The support-duty escalation manager is informed. An emergency meeting of the security council is convened at the earliest opportunity.
- High: All known details are sent to ForgeRock’s internal security team. The affected product manager and support-duty managers are informed. A combination of the duty manager, product manager, and product security lead develop an action plan on the issue to be reviewed by the wider security council.
- Medium/Low: Forward all details to the security alias to be covered in the next product management review meeting.
ForgeRock’s security council comprises product management, services, and engineering. It meets to plan the next steps for the evaluation and resolution of a security issue. The threat level will determine if an immediate fix and advisory is required, or if instead a bug needs to be filed. The delivery of the security advisory is owned by product management.
Publication process and timeline
Once the security advisory has been approved for publication, the publication announcement will be sent out via email to customers, partners, and community. A notification about the security advisory will also be included in the customer portal. Anyone who has registered with the customer portal will be able to access the contents of the security advisory.