Nasa VDP External Policy Final
Nasa VDP External Policy Final
Nasa VDP External Policy Final
Introduction
The NASA Mission is to drive advances in science, technology, aeronautics, and space
exploration to enhance knowledge, education, innovation, economic vitality and stewardship of
the Earth. A great deal of NASA work leverages information technology to capture, interpret,
and appropriately share scientific knowledge in the furtherance of its Missions and Programs.
NASA is committed to protecting the confidentiality (where appropriate), integrity, and
availability of its information and information systems.
NASA recognizes that external vulnerabilities can be discovered by anyone at any time and has
issued this policy in order to provide clear guidelines to security researchers so that they feel
comfortable reporting vulnerabilities they have discovered in good faith
• What systems and types of research are covered under this policy,
• General guidelines for demonstrating good faith,
• How to submit vulnerability reports, and
• What to expect following a vulnerability report.
Scope
The following subsections define the systems and types of testing that are and are not in scope
of this policy. If it is unclear whether a system or type of testing is or is not in scope, please
contact vulnerability-report@nasa.gov before commencing any research activities.
Systems
This policy applies to all NASA-managed systems that are accessible from the Internet. This
includes the registered domain name nasa.gov.
NASA internal-only services are not in scope and are not authorized for testing. Additionally,
vulnerabilities found in non-federal systems from our vendors and contractors fall outside of
this policy’s scope and should be reported directly to the vendor or contractor according to
their disclosure policy (if any).
Non-public NASA data is not authorized to reside on public third-party services. Although the
third-party services themselves are not in scope, please report these data issues to NASA. The
following types of non-public data are particularly sensitive, and warrant immediate reporting:
Types of testing
Guidelines
NASA requests that security researchers make every effort to:
Authorization
If a security researcher makes a good faith effort to comply with this policy during security
research, NASA will consider that research to be authorized, and will work with them to
understand and resolve the issue quickly. In addition, NASA will not recommend or pursue legal
action related to the research. Should legal action be initiated by a third party against a security
researcher for activities that were conducted in accordance with this policy, NASA will make
this authorization known.
Reporting a vulnerability
Information submitted under this policy will be used for defensive purposes only – to mitigate or
remediate vulnerabilities.
This reporting mechanism is not intended for use by NASA employees, contractors, and others
with authorized IT access at NASA. NASA personnel should use NASA-internal IT support and
reporting mechanisms rather than this program.
• Describe the vulnerability, where it was discovered, and the potential impact of
exploitation.
• Offer a detailed description of the steps needed to reproduce the vulnerability (proof of
concept scripts or screenshots are helpful).
• Be in the English language, if possible.
Please do not use this mechanism to report trivial system faults, such as typos or user interface
errors not resulting in a vulnerability.
NASA believes that public disclosure in the absence of a readily available mitigation will
increase risk to NASA Missions. As a result, NASA requests that researchers refrain from sharing
vulnerability reports with others for 90 days following the submission of the initial report,
unless otherwise coordinated with NASA.
When a security researcher chooses to share their contact information with NASA, NASA is
committed to coordinating a response with you as openly and as quickly as possible.
• Within three business days, NASA will acknowledge that the receipt of a report.
• NASA may contact you for further details when investigating the vulnerability.
• NASA may share vulnerability reports with the Cybersecurity and Infrastructure Security
Agency (CISA), as well as any affected vendors. NASA will not share names or contact
data of security researchers unless given explicit permission.