Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Advanced Security Development Practices
  2. Intel Vulnerability Management Practices
  3. Intel PSIRT Mission and Policies

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

 

 

PSIRT Mission

Minimizing Impact Through Vulnerability Mitigation and Disclosure

The Intel Product Security Incident Response Team (PSIRT) works to minimize customer impact through the mitigation and public disclosure of security vulnerabilities. Intel PSIRT supports and governs policies, processes, and guidelines for addressing security vulnerabilities that may affect Intel shipped and supported products.

Coordinated Vulnerability Disclosure

Intel is committed to rapidly addressing security vulnerabilities affecting our customers and providing clear guidance on the solution, impact, severity, and mitigation. Intel PSIRT policies, processes and guidelines are designed to support and encourage the principles and practices of Coordinated Vulnerability Disclosure (CVD).

PSIRT team members work with the security community, customers, and end users to help ensure that security vulnerabilities affecting Intel products in production are documented and solutions are released according to CVD principles. We follow and help lead this common industry practice for reported security vulnerabilities on Intel shipped and supported products, with the aim to reduce adversary advantage while a security vulnerability is being evaluated and, if appropriate and feasible, mitigated. 

In addition to practicing inbound CVD, and partnering with external security researchers, we coordinate outbound vulnerability disclosure with industry partners and external stakeholders, when appropriate. The goal is that all affected parties are disclosing in unison for an optimal defensive position.

 

Embargo

The multiparty coordinated vulnerability disclosure model puts Intel in a position of balancing between upstream security researchers and industry partners that use Intel technologies. This balance requires trust. Intel is committed to maintaining third-party embargos (i.e., vendor, supplier, security researcher, and third-party coordinator).

In cases where vulnerability information is under embargo and Intel suspects a partner company may be affected by the vulnerability, Intel submits a request to the coordinating or reporting party to report the issue under embargo to partners.

 

More Information

Reporting a Security Vulnerability

Intel PSIRT Processes

Intel Bug Bounty Program

Intel Product Security Center

Industry Group Engagement

Resources

2021 Intel Product Security Report

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information
  • Recycling

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo