HackerOne’s In-Depth Approach to Vulnerability Triage and Validation


Like triaging in a hospital emergency room, security issues must be diagnosed and handled by an expert as soon as they arrive. But it doesn’t stop there. Just as an ER needs good doctors, a triage team needs experienced security analysts to conduct a deep analysis and ask: 

  • What is the potential impact of an incident? 
  • Is this something that needs immediate escalation?
  • Do we have enough information to continue? 
  • How can we de-duplicate and validate the submitted vulnerability? 
  • Who is the right person to handle this issue? 
  • What is the right remediation advice to fix the issue effectively? 

At HackerOne, we realize that delivering the most effective triage experience for customers and hackers is a meticulous job and requires a team of experts who should function as an extension of your security or development team. That’s where HackerOne Security Analysts come in. 

Meet the Extension of Your Security Team

HackerOne’s Triage Services consists of over 45 highly-skilled in-house security analysts who triage approximately 3000 reports per week and 12,000 reports per month across five different continents. Our global coverage enables the triage team to deliver quicker results and faster resolution at scale. 

HackerOne’s Security Analysts have a broad range of technical skills and industry experience to cover a diverse range of assets, including web, mobile, API, binary, firmware, IoT, and hardware. All team members are active hackers with a finger on the pulse of high-volume reports, zero-days, and other vulnerabilities. Our team understands security concepts inside and out. They know how ethical hackers think and behave based on their own experience.

About the team:

  • Hundreds of years of combined experience in AppSec, hacking, and triaging.
  • A geographically diverse structure, covering all North American, South American, African, European, and Asian Pacific timezones, allowing the team to correspond with hackers in over ten languages.
  • In-depth knowledge with prior industry experience at global organizations such as Adobe, DoD, Dell, RSA, Microsoft, HP, GoDaddy, and more.
  • Average time to first response of 11 hours.

Triage is Just the First Step

HackerOne’s Security Analysts go far beyond triaging for our customers. The detail and quality of the validated vulnerability triage reports liberate our customers from the burden of bug confirmation. With this advantage, our team can fix verified vulnerabilities, reduce the time from report submission to code repair, and minimize the risk of attack with greater efficiency.

Here is a recap of HackerOne’s Triage Lifecycle to shed light on the process:

  1. Acknowledgment: First response by HackerOne security analysts. 
  2. Scope Check and De-duplication: Removal of false positives, de-duplication, scope check, and reproduction of every submitted bug.
  3. Validation: Verification of vulnerabilities using a detailed methodology that always includes the technical details, severity, business impact, and additional expert analysis.
  4. Prioritization: Triages and escalation of high-priority issues in collaboration with the customer’s team for a seamless hand-off.
  5. Hacker communications: Maintain constant communication with Hackers and Customers, provide clear and detailed explanations wherever required and keep everyone apprised of issue statuses.
  6. Remediation advice: Actionable guidance to effectively address risk and help customers close the risk gap.
  7. Retesting verification: Test implemented fixes in collaboration with hackers. HackerOne Retest becomes available for customers who want to ensure fixes have been made and are secure.
  8. Ongoing: Partner with HackerOne Customer Success Managers and Solution Architects to fine-tune and optimize bug bounty programs. 
Figure 1: How HackerOne triages vulnerability reports.

HackerOne Triage Services are among the key components of HackerOne Attack Resistance Management that help your organization protect an ever-expanding attack surface. Contact us to learn more about achieving attack resistance by engaging with HackerOne’s expert security analysts. Get started with world-class triage today.



Source link