The Beginners Guide To Bug Bounty Programs
The Beginners Guide To Bug Bounty Programs
Hacker: One who enjoys the intellectual challenge of Private Bug Bounty Program: A limited access
creatively overcoming limitations. program that select hackers are invited to
participate in for a chance at a bounty reward.
Hacker-Powered Security: Any goal-oriented
hacking technique that utilizes the external hacker Time-Bound Bug Bounty Challenge: A limited
community to find unknown security vulnerabilities access program with a pre-determined time frame
and reduce cyber risk. Common examples include where select hackers have a chance at earning a
private bug bounty programs, public bug bounty bounty award.
programs, time-bound bug bounty programs,
hacker-powered penetration testing for compliance, Vulnerability: Weakness of software, hardware or
and vulnerability disclosure policies. With hacker- online service that can be exploited.
powered security testing, organizations can identify
high-value bugs faster with help from the results- Vulnerability Disclosure Policy (VDP): An
driven ethical hacker community. organization’s formalized method for receiving
vulnerability submissions from the outside world,
Hacker-Powered Pentest: A limited access sometimes referred to as “Responsible Disclosure.”
program where select hackers apply a structured This often takes the form of a “security@” email
testing methodology and may be rewarded for address. The practice is outlined in the Department
completing security checks. of Justice (DoJ) Framework for a Vulnerability
Disclosure Program for Online Systems and defined
Hacktivity: Hacker activity published on the in ISO standard 29147.
HackerOne platform.
The bug bounty program is the most advanced form provide clear guidance for external parties to report
of hacker-powered security. It provides continuous security weaknesses to an organization so they can
security testing and vulnerability reports from the be resolved. The principal difference is that VDPs
hacker community. simply create a framework for interacting with and
accepting help from the security community, while
When a new bug bounty program is launched, in 77% bug bounty programs actively incentivize that
of the cases, hackers find the first valid vulnerability work by offering rewards for vulnerabilities that the
in the first 24 hours. That is how fast security can community discovers.
improve when hackers are invited to contribute.
Bug bounty programs include incentive structures
Bug bounty programs can be either public or private. and processes designed to encourage individuals
Public bug bounty programs, like Starbucks, GitHub, with a range of experience and talent to identify
and Airbnb, are open to everyone, while private and report potential security vulnerabilities so they
programs require organizations to invite hackers to can be safely resolved before they’re exploited. No
participate. Public programs are open to the widest money changes hands until after the vulnerability
range of hacker diversity and therefore produce is reported, validated, and determined to be in line
superior results. On average, public bug bounty with the program terms, as defined in the policy
programs have engaged six times the number or security page. Done properly, a bug bounty
of hackers reporting valid vulnerabilities. That program can be an enormous boost to your
number nearly doubled in 2019. organization’s security.
1 3 5
2 4
little effort and little disruption. Our experts work IN FORMATION SECURIT Y
with you to design, manage, and support your ENGI NEER , ABOUT YOU
We cannot prevent data breaches, reduce cyber Some points to keep in mind when discussing bug
crime, protect privacy or restore trust in society bounty programs and hackers with legal, finance
without pooling our defenses and asking for external and PR teams:
help. Cybersecurity has rightfully become a company-
• Current security measures can’t catch every
wide responsibility that goes beyond just security and
vulnerability. Bug bounty programs can catch
IT teams.
business logic issues that a scanner will miss.
A public-facing security solution, such as your bug • Bug bounty programs offer ongoing testing
bounty program, could involve buy-in from legal, unlike point-in-time testing.
Hack DHS: requires the ISO 29147: recommends NIST Cybersecurity Framework:
Department of Homeland Security vulnerability disclosure as a best Provisionally added RS.AN-5 which
to implement a VDP and Bug practice and offers guidelines on recommends that processes are
Bounty Program. how to include in their processes established to receive, analyze and
when receiving information respond to vulnerabilities disclosed
about potential vulnerabilities to the organization from internal
from external individuals or and external sources (e.g. internal
organizations. testing, security bulletins, or
security researchers).
The earliest recorded bug bounty program dates have awarded hackers over $70M in bug bounties
back to 1983. The practice was first scaled in the to hackers for safely reporting over 140,000
enterprise by Google, Facebook and Microsoft over vulnerabilities and to a growing community of
the past half-dozen years. As of 2019, more than 500,000 hackers.
1,600 active hacker-powered security programs
are run by organizations today including The Do you require strict finder verification capabilities?
U.S. Department of Defense, General Motors, Download this datasheet to learn about
Google, Goldman Sachs, PayPal, Hyatt, Twitter, HackerOne’s Advanced Vetting for organizations
GitHub, Nintendo, Lufthansa, Microsoft, MINDEF that require strict finder verification and enhanced
Singapore, Panasonic Avionics, Qualcomm, program controls.
Starbucks, Dropbox, and Intel. These organizations
As with anything new, it’s prudent to take a After running a private or time-bound bounty
methodical approach to hacker-powered security. program, you’re ready to open your technology up
As you learn from each step, you’ll be better able to to a continuous public bug bounty program. As we
understand resource constraints and needs. showcased in the 2019 Hacker-Powered Security
Report, Public bug bounty programs represent the
Once you’ve established a VDP, a private, targeted highest hacker diversity and therefore produce
bug bounty program is the next step in the hacker- superior results.
powered security journey. A private program allows
you to further hone and test your internal processes That’s the best part of hacker-powered security:
while limiting the number of hackers involved, the you’re always in control!
volume of incoming reports, and public awareness of
the program. A private program also lets you view the Let’s take a deeper dive into the different types of
potential size and cost of a broader bounty program, bug bounty programs and how HackerOne can help
giving you time to scale your internal teams and you on your journey.
processes to match.
4. DEVELOPMENT
Bug bounties reveal critical
vulnerabilities in your software.
This is the ultimate goal, to make
the unknown issues known and a
fix prioritized before criminals can
exploit them.
Private bug bounty programs currently make up 79% source infrastructure it uses. They recently
expanded the program with EU-FOSSA 2 .
of all bug bounty programs on HackerOne, down from
88% in 2017 and 92% in 2016 calendar years. You can
see more statistics and analysis in the 2019 Hacker- The benefits of hacker-powered security are many,
Powered Security Report. from improving on traditional penetration tests
by identifying 10-times the number of critical
No matter how you structure your bug bounty vulnerabilities, to identifying dozens or hundreds
program, you are in good company with organizations of vulnerabilities in a few days, to spending just
like Starbucks, GitHub, Airbnb and many others who a fraction of a security engineer’s salary while
trust HackerOne to be their bug bounty platform. paying only for validated results. Even government
regulators and industry groups are imploring
Featured case studies: organizations to use hacker-powered security,
publish VDPs, and consider bug bounty programs.
• Yelp: Read how Yelp transitioned from a private
bug bounty program to a public bug bounty
program and their learnings and statistics.
HackerOne is the #1 hacker-powered pentest & Do you require strict finder verification
bug bounty platform, helping organizations find capabilities? Download the datasheet to learn
and fix critical vulnerabilities before they can be about HackerOne’s Advanced Vetting.
exploited. More Fortune 500 and Forbes Global
1000 companies trust HackerOne than any other And we can help you, too! Learn more by visiting
hacker-powered security alternative. With over 1,600 our website or contacting us today.
customer programs, including The U.S. Department