{"id":15848,"date":"2025-06-06T11:06:16","date_gmt":"2025-06-06T10:06:16","guid":{"rendered":"https:\/\/dide.org\/coordinated-vulnerability-disclosure-policy\/"},"modified":"2026-01-05T15:23:25","modified_gmt":"2026-01-05T14:23:25","slug":"coordinated-vulnerability-disclosure-policy","status":"publish","type":"page","link":"https:\/\/www.dide.org\/en\/coordinated-vulnerability-disclosure-policy\/","title":{"rendered":"Coordinated Vulnerability Disclosure Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15848\" class=\"elementor elementor-15848 elementor-15480\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1002cd6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1002cd6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-178bda3c\" data-id=\"178bda3c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b3e09de elementor-widget elementor-widget-text-editor\" data-id=\"3b3e09de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><b style=\"color: #000000; font-family: Arial; font-size: 14px; letter-spacing: normal; text-align: center;\">Coordinated Vulnerability Disclosure (CVD) Policy DIDE.ORG EDUCATIONAL TECHNOLOGY S.L.<\/b><\/h1><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Introduction<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">At DIDE.ORG EDUCATIONAL TECHNOLOGY S.L. (hereinafter, &#8220;DIDE&#8221;), we recognize the critical importance of cybersecurity in maintaining the trust and security of our users, customers, and stakeholders. In fulfilling our commitment to security, we have established a Coordinated Vulnerability Disclosure (CVD) Policy. This policy is designed to facilitate the responsible identification, notification, and resolution of vulnerabilities in our systems, products, and services.  <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Our policy encourages collaboration with the security research community and defines clear procedures for communicating and addressing vulnerabilities. By working together with researchers and stakeholders, we seek to minimize potential risks, ensuring that vulnerabilities are managed in an agile and transparent manner. This approach not only strengthens our security posture but also reinforces our commitment to a secure environment for all users of our products and services.  <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Scope<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">This CVD policy applies to all digital assets managed by DIDE, including software, hardware, and cloud services. It covers vulnerabilities that may affect the security, confidentiality, integrity, or availability of these assets. <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">The policy applies to all products and services offered on our main website, as well as related systems that interact with our infrastructure. Third-party products or services that are not under the direct control of DIDE are excluded from this policy. Vulnerabilities detected in such systems should be reported to their respective manufacturers. Similarly, issues in obsolete or unsupported versions of our products are out of scope, unless they represent a significant risk to the ecosystem.   <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Designation and express submission of CNA<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">DIDE formally designates <b>Edgewatch<\/b> as its CNA (CVE Numbering Authority), being the <b>sole and exclusive party responsible for coordinating, assigning, and publishing CVE identifiers<\/b> in relation to vulnerabilities affecting the products, systems, and services managed by DIDE.ORG EDUCATIONAL TECHNOLOGY S.L.<\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Edgewatch will be responsible for verifying, classifying, and documenting each reported vulnerability that meets the criteria of the CVE system, in accordance with the rules established by MITRE and following the secure coordination guidelines defined in the <b>National Cyber Incident Notification and Management Guide of the CCN-CERT<\/b>.<\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">DIDE is committed to actively collaborating with Edgewatch throughout the lifecycle of vulnerability management, providing the necessary technical information and acting on mitigation and response recommendations. The designation of Edgewatch as CNA will be public and effective from the entry into force of this policy. <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Notification Guidelines<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">DIDE facilitates a simple and secure vulnerability notification process. The preferred method for reporting vulnerabilities is through the secure form available at <a href=\"https:\/\/disclosurealert.com\/report\">https:\/\/disclosurealert.com\/report<\/a>. This form guides the user step by step, ensuring the efficient collection of the necessary information.  <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Reports are also accepted by email to the Edgewatch notification mailbox: <a href=\"mailto:security@edgewatch.com\">security@edgewatch.com<\/a>. We recommend encrypting messages using PGP. All notifications must include a detailed description of the vulnerability, the affected products or services, the steps to reproduce it, and, if possible, test code or screenshots.  <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Please refrain from making the vulnerability public until DIDE has had the opportunity to evaluate and remedy it. This approach allows us to protect users while collaborating with the reporting party. <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Admissibility and Scope of Reports<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">DIDE values and encourages the responsible reporting of vulnerabilities that may significantly impact the security of our products and services.<\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">However, certain types of vulnerabilities are out of scope due to their reduced impact. Examples: brute-force email enumeration, minor session management failures, and non-exploitable information leaks. For a complete list, see <a href=\"https:\/\/disclosurealert.com\/kb\/typically-out-of-scope-low-impact-vulnerabilities\">https:\/\/disclosurealert.com\/kb\/typically-out-of-scope-low-impact-vulnerabilities<\/a>.  <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Also not included are failures in third-party services or products, or problems in old or unsupported versions of our software.<\/p><p class=\"p3\" style=\"margin: 10px 0px 6px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Rules of Engagement<\/b><\/p><ul class=\"ul1\" style=\"color: #000000; font-size: medium; font-weight: 400; letter-spacing: normal;\"><li class=\"li2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial;\"><b>Do not perform Denial of Service (DoS) tests<\/b> that may degrade or disrupt services.<\/li><li class=\"li2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial;\"><b>Physical access or social engineering is prohibited<\/b>, including interactions with employees, customers, or collaborators.<\/li><li class=\"li2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial;\"><b>Do not test third-party services<\/b> integrated into our products or infrastructure.<\/li><li class=\"li2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial;\"><b>Do not upload content to external platforms<\/b> (such as GitHub, Dropbox, or YouTube) without prior authorization.<\/li><li class=\"li2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial;\"><b>Use professional language<\/b> in the attack vectors used for testing.<\/li><li class=\"li2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial;\"><b>Stop at the point of recognition<\/b> if a sensitive system or data is accessed, reporting immediately.<\/li><li class=\"li2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial;\"><b>Document discreetly<\/b> any findings without publicly identifying DIDE or its customers.<\/li><\/ul><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Acknowledgment and Response Process<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Upon receiving a report, the DIDE security team will confirm receipt within a maximum of three business days. This initial confirmation will indicate that the report has been received and is being evaluated. Subsequently, a preliminary assessment (triage) will be performed to verify the validity of the vulnerability and its potential impact on our systems and users.  <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Throughout the management process, open and regular communication will be maintained with the researcher, providing updates on the status of the analysis, corrective actions, and the final result. Once the vulnerability has been corrected, the reporting person will be informed, and the possible public disclosure will be coordinated within an agreed timeframe. <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Disclosure Policy<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">DIDE is transparent in its management of vulnerabilities. Vulnerabilities will be publicly disclosed only once they have been mitigated and protective measures have been applied. The decision on when to disclose will be agreed upon with the reporting person, taking into account the risk and the existence of a solution.  <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">In cases of immediate and significant risk, DIDE may expedite the disclosure process to alert users as soon as possible. If the risk is low, publication may be delayed until a comprehensive solution is available. <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Relevant notifications will adhere to the National Cyber Incident Notification and Management Guide of the CCN-CERT.<\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Legal Protection and Principles of Good Faith<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">DIDE protects researchers who act in good faith in accordance with this policy. No legal action will be taken against those who report in compliance with these guidelines and current regulations. This provision promotes an environment of collaboration and trust with the security community. The goal is that investigations can be carried out without fear of retaliation if they conform to the established legal and technical framework.   <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Communication and Coordination<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">DIDE actively collaborates with <b>Edgewatch, designated as a CVE Numbering Authority (CNA) by the CVE<\/b><b><sup>\u00ae<\/sup><\/b><b> Program under the tutelage of INCIBE.<\/b> If the report meets the requirements of the CVE system, Edgewatch will assign the corresponding identifier. This number allows it to be tracked in the cybersecurity community and facilitates a coordinated response both within DIDE and in the rest of the sector. <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">During the process, Edgewatch will coordinate with DIDE and maintain continuous and fluid communication with the researcher to inform them about the status of the evaluation, the possible assignment of a CVE identifier, as well as the remediation measures adopted. This communication will adhere to the principles of cooperation established by the National Cyber Incident Notification and Management Guide of the CCN-CERT, ensuring adequate, responsible, and coordinated management of the vulnerability. <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Remediation and Mitigation<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Once a vulnerability has been verified, DIDE is committed to addressing it as quickly as possible. Remediation begins with a technical assessment of the scope and severity of the failure, followed by the development and deployment of patches, updates, or other containment measures. <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">As part of the process, affected users will be notified with detailed instructions on how to apply these solutions or mitigate the risk temporarily. The goal is to ensure that vulnerabilities are not only resolved quickly but also that users can act informed and safely. <\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Review and Continuous Improvement<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">At DIDE, we believe that continuous improvement is essential to maintaining a strong cybersecurity posture. Therefore, this CVD policy is regularly reviewed to ensure its suitability to industry best practices, the evolving threat landscape, and current regulatory requirements. <\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">We encourage the research community to send comments and suggestions that help us improve our processes. With each review, we reinforce our commitment to the security and integrity of our products, services, and users. <\/p><p class=\"p5\" style=\"margin: 0px 0px 2.9px 201.2px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Coordinated Vulnerability Disclosure (CVD) Policy of DIDE.ORG EDUCATIONAL TECHNOLOGY S.L.<\/p><p class=\"p5\" style=\"margin: 0px 0px 2.9px 201.2px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Effective date: May 29, 2025<\/p><p class=\"p5\" style=\"margin: 0px 0px 2.9px 201.2px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Last updated: May 29, 2025<\/p><p class=\"p5\" style=\"margin: 0px 0px 2.9px 201.2px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">Version: 1.0<\/p><p class=\"p1\" style=\"margin: 8.5px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 12px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\"><b>Contact information<\/b><\/p><p class=\"p2\" style=\"margin: 0px 0px 2.9px; text-align: justify; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-size-adjust: none; font-kerning: auto; font-optical-sizing: auto; font-feature-settings: normal; font-variation-settings: normal; font-variant-position: normal; font-variant-emoji: normal; font-weight: 400; font-stretch: normal; font-size: 10px; line-height: normal; font-family: Arial; color: #000000; letter-spacing: normal;\">For any questions or to submit a vulnerability report, please contact the Edgewatch security team at <a href=\"mailto:security@edgewatch.com\">security@edgewatch.com<\/a> or visit our security page for more information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Coordinated Vulnerability Disclosure (CVD) Policy DIDE.ORG EDUCATIONAL TECHNOLOGY S.L. Introduction At DIDE.ORG EDUCATIONAL TECHNOLOGY S.L. (hereinafter, &#8220;DIDE&#8221;), we recognize the critical importance of cybersecurity in maintaining the trust and security of our users, customers, and stakeholders. In fulfilling our commitment to security, we have established a Coordinated Vulnerability Disclosure (CVD) Policy. This policy is designed [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-15848","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/pages\/15848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/comments?post=15848"}],"version-history":[{"count":1,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/pages\/15848\/revisions"}],"predecessor-version":[{"id":15849,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/pages\/15848\/revisions\/15849"}],"wp:attachment":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/media?parent=15848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}