PUBLIC FEEDBACK INTERFACE
Security researchers can notify Rakoit of security vulnerabilities in devices.
Rakoit official website :https://www.rakoit.com
Contact of Rakoit’s security department : email@example.com
SOFTWARE MAINTENANCE UPDATE STRATEGY
Monitor version updates for third-party components and update to the latest version to avoid the existence of known vulnerabilities.
Fixes for severity vulnerabilities will be bundled in existing updates.
When any vulnerability is identified, update the firmware as follows:
1. Vulnerabilities identified by customers, users, etc.
2. A security related review meeting must be held immediately and the corresponding solution needs to be presented. In particular, participants must include project development manager, Technical Director and outside party who is responsible for firmware development. CVSSv2 will be used as a reference standard for assessing and prioritizing vulnerability.
3. According to the solution, the developer performs the specific implementation.
4. Code review. Reviewers should include security technology manager and project development.
5. Release firmware.
6. QA team test the firmware. If there are any problems, go back to step three.
7. Code merged into trunk branch.
8. The project manager notified customers that they need to update the software and get customer’s upgrade confirmation.
9. Perform OTA on the corresponding project.
SECURITY RESPONSE PLAN
If a security incident arises, the incident must be treated as the highest priority. Top management must be aware of this incident and participate in incident handling.
If the incident is a software maintenance issue, then it will be handled according to the process of the “Software maintenance update strategy” in this document.
A internal meeting should be held immediately. The participants are Rakoit and the solution providers. The meeting needs to collect information, clarify the situation of the accident, and estimated timelines for remediation of an incident. If there is a special major impact incident, Rakoit will discuss the timelines for remediation with customers.
Rakoit will contact Amazon within 24 hours to notify security incident that could compromise the device or service associated with the device, including Alexa user tokens and commnunications with Alexa APIs.