2024-11-14
StateScoop Priorities Podcast: Maryland's Successful Bug Bounty
"There's no other state that's done a bug bounty with a scope this large," says Lance Cleghorn, Senior Director of State Cybersecurity for the state of Maryland. In an interview with StateScoop's Keely Quinlan, Cleghorn posits that the capability of bug bounty programs is unique, allowing them to find vulnerabilities that otherwise might go unnoticed. Tracing the development of Maryland's program out of his experiences with the Defense Digital Service and "Hack the Pentagon" program, he emphasizes "diversity of thought" and the human element in the program's success. He and Katie Savage, Maryland's chief information officer, look forward to applying lessons learned in the process, and may look into fostering a state vulnerability disclosure program.
Editor's Note
Well-managed bug bounty programs that are run by organizations have a good track record. But 'well-managed' also includes making sure your software inventory, update and configuration management processes are accurate, rapid and thorough. One of the common failings is updating all managed devices when vulnerabilities are found but a full network scan results in only 80% (or less!) of devices found showing up in Active Directory, etc. Another key point: have a plan in place about what to do when a vulnerability is discovered that cannot be fixed.
John Pescatore
'Well-managed' in this case should include a requirement that such activity be conducted under management and supervision and with the permission of the target. The line between research and hacking is thin and obscure. Those incenting such activity have a special responsibility to those that they encourage.
William Hugh Murray
Kudos to Maryland for finding a force multiplier. Note that if you're operating a bug bounty program, you need to be prepared to not only run the program, which can be outsourced, but also to remediate findings, including validation the issue is indeed fixed, which is trickier to outsource.
Lee Neely
Bug bounty programs have proven their worth over the past decade. It's also reassuring to see the concept applied at the State level. My only quibble is to ensure that you've done the basics well (patching, secure configuration, monitoring) before spending precious cybersecurity dollars on finding implementation bugs.