Bug bounty programs rely on harnessing the skills of the world’s security talent, known as The Crowd. They offer continuous coverage for assets and quickly surface novel vulnerabilities, while pairing well with formal and compliance-based security such as pen testing. Making bug bounties work for you means knowing the strengths of the program and planning your brief and financial incentives to maximize these strengths. Getting the most out of the bug bounty platform means knowing the strengths and how to pair it with other solutions like PTaaS and Attack Surface Management.
Managing bug bounty platforms simplify execution by providing validation, triage, and integration with software development workflows.
In 1854, the window of Bramah and Co. at 124 Piccadilly in London sported a lock next to a small printed board, which stated: “The artist who can make an instrument that will pick or open this lock, shall receive 200 Guineas the moment it is produced.”
This is the first known example of a security bug bounty, where the lock’s manufacturers incentivized experts to find vulnerabilities in their product. It reassured the manufacturer that they should be among the first to know if their product had a weakness, and advertised the strength of their security to the wider public. And, of course, the lock was eventually picked, by the American proto-hacker and security professional, Alfred Charles Hobbs.
This blog will define bug bounty programs and cover what to expect when signing up for a bug bounty program, how they operate, and how security teams can make the most of them.
Bug bounties have evolved since the 1850s, really coming into their own 140 years later with the growth of the internet and Netscape’s decision to implement a bug bounty program in 1995, which offered financial rewards to developers who found and submitted security bugs in the browser Netscape Navigator 2.0. This approach was taken up by Mozilla, Google, and Facebook in the following years, before being formalized in a third party offering by Casey Ellis with the founding of Bugcrowd in 2012.
These programs are results-focused security initiatives that incentivize hackers or the bug bounty hunter to uncover and report security vulnerabilities. They provide ROI by offering financial rewards based on the criticality of bugs submitted, and simulate the actions of malicious actors to find and fix issues quickly.
Before getting into it, we should note that there are internally run bug bounties, just as there are internally run server farms, but this post will focus on managed programs, as they are almost universally considered more cost-effective and usable. If an AI company reportedly valued at $86 billion and focused on safety as a top concern works with a third party for its bug bounty program—not to mention tech giants like Microsoft and Google, plus highly-risk conscious government customers—then you can safely consider it to be best practice.
Bug bounty programs are effective because they:
Contributors to bounty programs are security experts, also called a security researcher, who like to find novel ways of using and considering tools and processes, or hackers. Like Mr. Hobbs mentioned above, they are passionate about using their skills to improve security and thwart crime, and in today’s digital world, their skills are sorely in demand.
Contrary to their depiction in the media, most hackers are ethically motivated, applying their skills to help companies protect themselves rather than pursuing more lucrative opportunities in the black and gray markets. Bugcrowd’s Inside the Mind of a Hacker shows that 75% of hackers identify non-financial factors as their main motives to hack, and 96% believe that they help companies fill their cybersecurity skills gap, so they are a considerable force for good.
Hackers or bug bounty hunters contribute to public bug bounty programs in a Darwinian market that is bottom-up, meritocratic and open to the world. This ensures program owners always have access to the latest skill sets and techniques, while incentivizing hackers to stay on top of the latest trends and developments.
You also have the option to buy private bug bounty programs, where only invited hackers can partake. This allows you to select for researchers from specific countries or backgrounds, with some providers even allowing you to restrict participants to those with security clearance.
Even the most sophisticated software and security companies work with third parties to manage their bug bounty programs. Handling the function internally means building and maintaining a software platform, as well as handling and triaging a potentially large volume of submissions. Add to this the need to staff the platform with security professionals in a market where talent is scarce, and it becomes apparent why so many companies opt for managed programs.
Overall there are several services that you should look for from a managed partner:
Penetration testing, or pen testing, is a service where external testers mimic attackers to identify security vulnerabilities in a company’s assets. These tests are typically time bound and work to established methodologies, and they provide a final report that can demonstrate compliance to regulatory bodies. This sets them apart from bug bounty programs, which identify vulnerabilities in a vulnerability report based only on hacker ingenuity and can operate continuously.
Penetration Testing as a Service (PTaaS) is an improvement to bring the practice in line with modern capabilities. It simplifies and accelerates onboarding, provides integration with the SDLC and other crowdsourced security services, and speeds up the reporting process, all while maintaining the core strengths of operating to defined methodologies and offering clear reporting.
Pen tests and PTaaS are more appropriate if you:
Bug bounty programs are more appropriate if you:
As you can see, these are complementary rather than competitive services, and companies that take security seriously will typically invest in both services and integrate them on a crowdsourced security platform. For more details on the differences and complements between pen testing and bug bounties, see the Bugcrowd blog on the topic.
There is enormous security talent available in The Crowd, but it’s only as useful as your ability to harness it. Getting the brief right sets expectations for hackers and gives direction on what success looks like. Providing a concise, unambiguous brief gets you results quickly and more effectively and reduces the need for triage.
The brief should set out the below.