Skip to content

An index of vendors in the MSP space who have published their Vulnerability Disclosure Program and Bug Bounty Programs.

License

Notifications You must be signed in to change notification settings

DanaEpp/MSP-Vendors-VDP-BBP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MSP Vendors Vulnerability Disclosure Programs / Bug Bounty Programs

Introduction

This serves as a general index of vendors in the MSP space who may or may not have published their Vulnerability Disclosure Program (VDP) and Bug Bounty Programs (BBP) publicly.

Vendors, MSPs or security researchers who wish to have a company included in the list can ping me at [email protected] with the information to be added/updated, or provide a pull request for me to approve.

Methodology

  • Anyone who contacts me with links to a vendor offering products and services to MSPs may be included in the list.
  • Every vendor added gets run though an assessment against RFC8615 (see https://securitytxt.org/ for latest draft) and DNS Security TXT (see https://dnssecuritytxt.org/). This populates the corresponding columns.
  • All vendors are then automatically checked against webcrawl data for terms including "Vulnerability Disclosure Program", "VDP", "vulnerability", "disclosure", "bug bounty" and "BBP". Any results will be reviewed by a human, and corresponding links added if VDP / BBP data is found.
  • Some vendors who I have relationships with may be contacted over LinkedIn or by email.
  • Anyone who submits a Git pull request will be manually reviewed for accuracy and then considered for approval. All reasonable requests will be accepted as long as the vendor clearly offers services to MSPs.

Vendors

Company VDP BBP Safe Harbor? security.txt DNS security TXT
Acronis Yes Yes Yes Yes No
Addigy Yes No No No No
Amazon Yes Yes Yes Yes No
Amazon AWS Yes No Yes Yes No
Appgate No No No No No
Atera No No No No No
Auvik Yes No Yes Yes No
Axcient No No No No No
Barracuda Yes Yes Partial No No
Bitdefender Yes Yes No No No
BitTitan No No No No No
Blumira No No No Yes No
ConnectWise Yes No Yes No No
CyberCNS No No No No No
Datto Yes No Yes Yes No
Duo Yes No No Yes No
Egnyte No No No No No
Fortinet Yes No Yes Yes No
Google Yes Yes No Yes No
Gradient MSP Yes No Yes Yes No
Huntress No No No No No
Kaseya Yes No Yes No No
Liongard No No No No No
GoTo (formally LogMeIn) No No No No No
Malwarebytes Yes Yes No No No
Microsoft Yes Yes Yes No No
N-Able No No No No No
Naverisk No No No No No
NinjaOne No Yes No Yes No
nerdio No No No No No
OITVOIP No No No No No
ServiceNow Yes No No Yes No
Servosity No No No No No
SolarWinds Yes No No Yes No
Sonicwall Yes No Yes No No
Sophos Yes Yes Yes No No
Taylor Business Group No No No No No
ThreatLocker No No No No No
TrendMicro Yes No No No No
WebRoot No No No No No
Watchguard No No No No No
Xero Yes No No No No

Research Notes

  • Any bug bounty programs that are currently private, even if I know of them, will still be marked as "No". Any vendor that wishes to update that to a Yes simply has to provide me with a link to a landing page which offers security researchers a way to apply to the private program.
  • Checks against security.txt and DNS Security TXT is done with the python script included in this repo. If a vendor has a non-standard configuration, please contact me with the appropriate URL/DNS record info and it will be updated in the script to validate. (But why aren't you following the standards?)

Q&A

I'm not a vendor, why am I on this list?

If you are offering services to other MSPs, and have a web application/portal that you are asking MSPs to log into, then you are responsible for application security (appsec) of that app. That means you are a potential target in the supply chain, and should be thinking about how adversaries may leverage your digital assets to attack MSPs, and ultimately their customers. So where is YOUR VDP? Need help determining if you need one? I can help.

I'm a startup providing software to MSPs, why am I on this list?

Some MSP or security researcher felt they wanted to know if you have a VDP and asked me to check. It might very well be that your appsec maturity model isn't at the point you are ready for a VDP. If so, you should be honest with your customers about that. Otherwise, if it's very new to you and you need help, contact me.

Your assessment of my company is wrong

Could be. I'd be happy to update the index with proper data. Start by reviewing the methodology being used. If you have a proper security.txt and/or DNS Security TXT then I SHOULD be pulling the right data. In any case, send me a pull request, (or an email) and we can get the data updated with the correct information.

Why isn't "vendor" included?

Could be several reasons:

  1. No one has asked to review that company (yet)
  2. That company may be owned by another entity already in the list (ie: IT Glue/Kaseya, Autotask/Datto, Continuum/ConnectWise etc)
  3. I couldn't get clarity on their program(s), and I am still waiting to hear back from them.

If you want to see someone on the list, contact me.

I'm a vendor and I don't want to be on your list so security researchers can find and target me

If we want to find you, we will. OSINT this day and age is so bloody easy. If you are marketing to MSPs, you're probably already known if a security researcher cares to look.

The real question should be, "why are you scared to work with security researchers"?

Know that a VDP and BBP are NOT the same thing. You aren't forced to host bounty tables and pay us when we find vulnerabilities. It's appreciated, but not required. We don't have to look at your products/services either. Mutually beneficial relationships helps improve security for everyone, and attracts the right people to help you find and fix your vulnerabilities.

Consider this though.... if our intent wasn't good and ethical, do you think by not being on this list that bad actors wouldn't approach you as a target? Do you think security by obscurity is really going to work? No, neither do I.

You do want to make it easier for security researchers to contact and communicate with you if they DO find something. By defining your VDP and making clear of allowed scope, intentions and expectations we all know what to do and how to act.

About

An index of vendors in the MSP space who have published their Vulnerability Disclosure Program and Bug Bounty Programs.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages