Disclosure Model
All vulnerability research follows Coordinated Vulnerability Disclosure (CVD). Findings are reported to vendors and coordination bodies before public disclosure, with defined timelines to ensure remediation while protecting affected users.
Timeline
| Day | Action |
|---|---|
| 0 | Report submitted to vendor security team and/or coordination body |
| 7 | Follow-up if no acknowledgment received |
| 14 | Escalation if vendor unresponsive |
| 45-60 | Public disclosure deadline |
Default disclosure timeline is 45 days (CERT/CC standard) or 60 days (NCSC-NL standard), depending on coordination path.
Coordination Partners
CERT/CC (US) — Primary coordination for multi-vendor vulnerabilities and US-based vendors. Cases tracked through VINCE with VU# identifiers.
NCSC-NL (Netherlands) — European coordination path for vulnerabilities requiring independent CVE assignment. Cases coordinated under ENISA Root CNA authority.
ZDI (Zero Day Initiative) — Third-party coordination with vendor-independent CVE assignment and defined disclosure timelines.
Vendor Security Teams — Direct coordination for single-vendor issues with established security response programs (MSRC, GCP VRP, AWS Security, etc.).
Vulnerability Identifiers
Published vulnerabilities receive identifiers from recognized numbering authorities:
- CVE — Assigned via CERT/CC, NCSC-NL, ZDI, or vendor CNA
- VU# — CERT/CC vulnerability note identifier
- GCVE — Global CVE identifier (olearysec.com is a GCVE Numbering Authority)
All published advisories are available in machine-readable format at /advisories.json.
Scope
This policy applies to all vulnerability research conducted by olearysec.com, including:
- Cloud infrastructure (AWS, Azure, GCP)
- Kubernetes operators and controllers
- Identity and access management systems
- Cryptographic protocol implementations
Exceptions
Early Disclosure — Timeline may be shortened if:
- Evidence of active exploitation is discovered
- Vendor is unresponsive after multiple escalation attempts
- Public safety is at immediate risk
Extended Disclosure — Extensions granted when vendor demonstrates:
- Documented remediation progress
- Specific patch timeline
- Active communication
Contact
Security inquiries: [email protected]
PGP: Available upon request