@@ -2,9 +2,12 @@ PEP: 811
22Title: Defining Python Security Response Team membership and responsibilities
33Author: Seth Michael Larson <seth@python.org>
44Sponsor: Gregory P. Smith <greg@krypto.org>
5+ Discussions-To: Pending
56Status: Draft
67Type: Process
8+ Topic: Governance
79Created: 22-Oct-2025
10+ Post-History: Pending
811
912Abstract
1013========
@@ -248,23 +251,30 @@ Therefore, vulnerability reporting has additional requirements for PSF staff
248251detailed in CRA `Article 24 <https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202402847#art_24 >`_.
249252These requirements can be summarized as:
250253
251- ➤ Maintain a vulnerability disclosure policy fostering the voluntary reporting of vulnerabilities.
252- The policy shall include aspects related to documenting, addressing, and remediating vulnerabilities
253- and promote the sharing of information concerning discovered vulnerabilities within the open-source community.
254-
255- ➤ Cooperate with EU market surveillance authorities (ENISA and CSIRTs) to
256- mitigate cybersecurity risks.
257-
258- ➤ If a vulnerability is **known to be actively exploited ** EU market surveillance
259- authorities must be notified through the Single Reporting Platform (SRP)
260- within the following timelines:
261-
262- * **Within 24 hours of becoming aware of an actively exploited vulnerability: ** submit an early warning notification.
263- * **Within 72 hours of becoming aware of an actively exploited vulnerability: ** submit general information,
264- the product, general nature of the exploit and vulnerability, and mitigating measures taking or mitigating measures that users can take.
265- * **Within 14 days after a corrective or mitigating measure is available: ** a final report including a description
266- of the vulnerability including severity and impact, information concerning any malicious actor, and details
267- about the security update or other corrective measures available to remedy the vulnerability.
254+ * Maintain a vulnerability disclosure policy fostering the voluntary reporting
255+ of vulnerabilities. The policy shall include aspects related to documenting,
256+ addressing, and remediating vulnerabilities and promote the sharing of
257+ information concerning discovered vulnerabilities within the open-source
258+ community.
259+
260+ * Cooperate with EU market surveillance authorities (ENISA and CSIRTs) to
261+ mitigate cybersecurity risks.
262+
263+ * If a vulnerability is **known to be actively exploited ** EU market
264+ surveillance authorities must be notified through the Single Reporting
265+ Platform (SRP) within the following timelines:
266+
267+ * **Within 24 hours of becoming aware of an actively exploited
268+ vulnerability: ** submit an early warning notification.
269+ * **Within 72 hours of becoming aware of an actively exploited
270+ vulnerability: ** submit general information,
271+ the product, general nature of the exploit and vulnerability, and
272+ mitigating measures taking or mitigating measures that users can take.
273+ * **Within 14 days after a corrective or mitigating measure is available: ** a
274+ final report including a description of the vulnerability including
275+ severity and impact, information concerning any malicious actor, and details
276+ about the security update or other corrective measures available to remedy
277+ the vulnerability.
268278
269279Note that these additional responsibilities don't apply to all members of the
270280PSRT, only to PSF staff.
0 commit comments