Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Advanced Security Development Practices
  2. Intel Vulnerability Management Practices
  3. PSIRT: Industry Group Engagement

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

Industry Group Engagement

Leaders in the Security Community

The Intel PSIRT is a strong supporter and member of industry groups, which drive change for the information security community. 

Technology Standards

Intel leads and participates in industry consortia along with standard bodies shaping how technologies should be designed to meet security, privacy, and safety requirements. This engagement includes feature and mitigation requirements aligned to anticipated use cases, as well as the emerging threat landscape generated by our security research. Examples include:

  • Trusted Computing Group (TCG)
  • Confidential Computing Consortium (CCC)
  • 3rd Generation Partnership Project (3GPP)
  • National Institute of Standards and Technology (NIST)
  • International Organization for Standardization (ISO)
  •  

General Product Design, Assurance & Risk Management Standards
As vulnerability research methods become more sophisticated, often targeting hardware, Intel is at the forefront of advanced secure-by-design practices, systemic mitigations, automated vulnerability scanning tools, and hardware security training, among other efforts. Examples in this area include:
  • MITRE: Intel collaborated to extend existing community-driven software-oriented Common Weakness Enumeration (CWE) to include 75 hardware weaknesses and is involved in Common Vulnerabilities and Exposures (CVE) and Common Attack Pattern Enumeration and Classification (CAPEC).
  • Forum of Incident Response and Security Teams (FIRST): Intel contributes to the Common Vulnerability Scoring System (CVSS) and helps lead the Product Security and Incident Response Team (PSIRT) special interest group where Intel employees coauthored the PSIRT Services Framework as a contribution to the global security community. 
  • Bug Bounty Community of Interest (COI): Intel contributes to the Bug Bounty COI, which is comprised of a group of subject matter experts with a deep interest in the Bug Bounty ecosystem. 
     

More Information

Intel PSIRT Mission

Vulnerability Handling Processes

Intel Bug Bounty Program

Reporting a Security Vulnerability

Intel Product Security Center

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo