diff --git a/SECURITY.md b/SECURITY.md index c8b6645c7167..3f9e48cc83d7 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -13,7 +13,8 @@ be sure it can be reproduced in the supported version. ## Reporting a Vulnerability If you have information about a security issue or vulnerability in the product, please -send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key. +send an e-mail to [secure@intel.com](mailto:secure@intel.com). Encrypt sensitive information +using our PGP public key. Please provide as much information as possible, including: @@ -25,3 +26,23 @@ Please provide as much information as possible, including: For more information on how Intel works to resolve security issues, see: [Vulnerability handling guidelines]() + +## Intel® Bug Bounty Program + +Intel Corporation believes that working with skilled security researchers across the globe +is a crucial part of identifying and mitigating security vulnerabilities in Intel products. + +Like other major technology companies, Intel incentivizes security researchers to report +security vulnerabilities in Intel products to us to enable a coordinated response. To +encourage closer collaboration with the security research community on these kinds of issues, +Intel created its Bug Bounty Program. + +If you believe you've found a security vulnerability in an Intel product or technology, we +encourage you to notify us through our program and work with us to mitigate and to coordinate +disclosure of the vulnerability. + +[Intel® Bug Bounty Program Terms]() + +Watch this video, [So You Found a Vulnerability](), +to find out what you can expect when participating in the Intel® Bug Bounty Program. +