{"id":15401,"date":"2025-06-10T19:37:43","date_gmt":"2025-06-10T19:37:43","guid":{"rendered":"https:\/\/www.deskcamera.com\/vulnerability-management-policy\/"},"modified":"2025-06-11T10:27:50","modified_gmt":"2025-06-11T10:27:50","slug":"vulnerability-management-policy","status":"publish","type":"page","link":"https:\/\/www.deskcamera.com\/ru\/vulnerability-management-policy\/","title":{"rendered":"Vulnerability Management Policy"},"content":{"rendered":"<p>[et_pb_section fb_built=&#187;1&#8243; _builder_version=&#187;4.7.7&#8243; _module_preset=&#187;default&#187;][et_pb_row _builder_version=&#187;4.7.7&#8243; _module_preset=&#187;default&#187;][et_pb_column type=&#187;4_4&#8243; _builder_version=&#187;4.7.7&#8243; _module_preset=&#187;default&#187;][et_pb_text _builder_version=&#187;4.9.4&#8243; _module_preset=&#187;default&#187; hover_enabled=&#187;0&#8243; sticky_enabled=&#187;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\"><b>Vulnerability Management Policy<\/b><\/h2>\n<p><b><br \/>1. Introduction<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">This document defines how vulnerabilities in the DeskCamera software are tracked, assessed, and resolved. DeskCamera is an offline, on-premises application that streams screen data locally to NVR\/VMS systems. <\/span><span style=\"font-weight: 400;\">It does not record video or audio and does not collect personal data. An optional connection to cloud infrastructure may occur solely for licensing or update-checking purposes. In no case is any personal data transmitted during such a connection.<\/span><\/p>\n<p><b>2. Purpose<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">Ensure the security and reliability of DeskCamera by minimizing exposure to known vulnerabilities through structured assessment, remediation, and updates.<\/span><\/p>\n<p><b>3. Scope<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">Applies to all versions of the DeskCamera software, internal development systems, code repositories, and all third-party components integrated into the software.<\/span><\/p>\n<p><b>4. Governance and Roles<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 <\/span><b>CTO<\/b><span style=\"font-weight: 400;\"> \u2013 Owns the policy and reviews critical vulnerabilities<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 <\/span><b>Development Team<\/b><span style=\"font-weight: 400;\"> \u2013 Responsible for monitoring, assessing, and resolving issues<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 <\/span><b>Security Lead<\/b><span style=\"font-weight: 400;\"> \u2013 Coordinates vulnerability response and external communication (if needed)<\/span><\/p>\n<p><b>5. Vulnerability Identification<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 Continuous monitoring of CVE feeds and vendor advisories for dependencies<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Internal code reviews and static analysis tools during development<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Bug reports from customers and ethical researchers via <strong>support@deskcamera.com<\/strong><\/span><\/p>\n<p><b>6. Classification and Risk Assessment<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 Vulnerabilities are categorized as <strong>Emergency<\/strong><\/span><span style=\"font-weight: 400;\">, <\/span><b>High<\/b><span style=\"font-weight: 400;\">, <\/span><b>Medium<\/b><span style=\"font-weight: 400;\">, or <\/span><b>Low<\/b><span style=\"font-weight: 400;\"> based on CVSS and business impact<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Risk score considers likelihood of exploitation, impact on functionality, and exposure surface<\/span><\/p>\n<p><b>7. Remediation Process<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 <\/span><b>Emergency\/High<\/b><span style=\"font-weight: 400;\"> vulnerabilities addressed within 5 working days<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Security patches integrated into next available release after testing<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Dependencies updated proactively if any known risk emerges<\/span><\/p>\n<p><b>8. Update and Release Process<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 Builds are signed using a secure certificate stored on offline USB media<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 New installers published to official DeskCamera website<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Customers are notified via the Security Advisories section (if applicable)<\/span><\/p>\n<p><b>9. Customer Responsibilities<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 Clients are responsible for downloading and installing updates manually<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 DeskCamera cannot push updates or access customer environments, reinforcing the need for clients to follow best security practices<\/span><\/p>\n<p><b>10. Review and Testing<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 This policy is reviewed <\/span><b>annually by the CTO<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 Version control maintained via GitHub<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Vulnerability management practices may be refined following any security incident or advisory<\/span><\/p>\n<p><b>11. Audit Logging and Change Tracking<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">\u2022 All code changes and access history are logged automatically via Azure DevOps Server source control<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Commit history, user activity, and permission changes are recorded in the internal SQL Server database of Azure DevOps Server<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 Git commit trails are retained for all versions, and role-based access control ensures traceability<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u2022 The audit trail aligns with ISO 27001 and SOC 2 recommendations for secure software development<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#187;1&#8243; _builder_version=&#187;4.7.7&#8243; _module_preset=&#187;default&#187;][et_pb_row _builder_version=&#187;4.7.7&#8243; _module_preset=&#187;default&#187;][et_pb_column type=&#187;4_4&#8243; _builder_version=&#187;4.7.7&#8243; _module_preset=&#187;default&#187;][et_pb_text _builder_version=&#187;4.9.4&#8243; _module_preset=&#187;default&#187; hover_enabled=&#187;0&#8243; sticky_enabled=&#187;0&#8243;] Vulnerability Management Policy 1. IntroductionThis document defines how vulnerabilities in the DeskCamera software are tracked, assessed, and resolved. DeskCamera is an offline, on-premises application that streams screen data locally to NVR\/VMS systems. It does not record video or audio and does not [&hellip;]<\/p>\n","protected":false},"author":2240,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/www.deskcamera.com\/ru\/wp-json\/wp\/v2\/pages\/15401"}],"collection":[{"href":"https:\/\/www.deskcamera.com\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.deskcamera.com\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.deskcamera.com\/ru\/wp-json\/wp\/v2\/users\/2240"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deskcamera.com\/ru\/wp-json\/wp\/v2\/comments?post=15401"}],"version-history":[{"count":0,"href":"https:\/\/www.deskcamera.com\/ru\/wp-json\/wp\/v2\/pages\/15401\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deskcamera.com\/ru\/wp-json\/wp\/v2\/media?parent=15401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}