This paper is published in Volume-8, Issue-3, 2022
Area
Cybersecurity
Author
Suresh K. P.
Org/Univ
Independent Researcher, India
Pub. Date
18 July, 2022
Paper ID
V8I3-1449
Publisher
Keywords
ISRS, Product Security, PSIRT, Responsible Disclosure

Citationsacebook

IEEE
Suresh K. P.. Intelligent security response system, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Suresh K. P. (2022). Intelligent security response system. International Journal of Advance Research, Ideas and Innovations in Technology, 8(3) www.IJARIIT.com.

MLA
Suresh K. P.. "Intelligent security response system." International Journal of Advance Research, Ideas and Innovations in Technology 8.3 (2022). www.IJARIIT.com.

Abstract

Secure product development is the mantra for having lesser vulnerabilities during the life cycle of a product. There are many well-known frameworks and policies companies have been following to ensure the same. E.g. Shift left security. While this is a proactive measure in ensuring security, the reactive support from the security response team also plays an equal role. The mission of any Security Response Team is to protect confidentiality, integrity, and availability of companies’ & customers' data by ensuring a responsible disclosure of security vulnerabilities reported by external/internal sources in the product portfolio and in the services portfolio. Through this study, an attempt is made to find out and list down the risks involved if there is a deviation from responsible disclosures by external researchers and along with that explore a technical solution that could help companies have the details of the risk, at first hand. The very reason to name this solution an “Intelligent Security Response System” is that it brings in that extra intelligence that sometimes slips out from normal proactive monitoring solutions. The solution also has the capability to intelligently identify risk ratings and filtering logic, from the historic data which gives it an upper hand in terms of quickly identifying and notifying a threat with a false positive. With the onset of the latest technological disruptions, and the bad actors using all means to exploit the product vulnerabilities, this study also intends to identify the possible shortfalls and opportunities for improvement.