<?xml version="1.0" encoding="UTF-8"?><toc><section id="foreword.nat"><title>Nationales Vorwort</title></section><section id="foreword.reg"><title>Europäisches Vorwort</title></section><section id="sub-endorsement.notice"><title>Anerkennungsnotiz</title></section><section id="foreword.int"><title>Vorwort</title></section><section id="introduction.int"><title>Einleitung</title></section><section id="sub-1"><label>1</label><title>Anwendungsbereich</title></section><section id="sub-2"><label>2</label><title>Normative Verweisungen</title></section><section id="sub-3"><label>3</label><title>Begriffe</title><section id="sub-3.1"><label>3.1</label><title>Schwachstelle</title></section><section id="sub-3.2"><label>3.2</label><title>Offenlegung</title></section><section id="sub-3.3"><label>3.3</label><title>Koordination</title></section><section id="sub-3.4"><label>3.4</label><title>Anbieter</title></section><section id="sub-3.5"><label>3.5</label><title>Berichtersteller</title></section><section id="sub-3.6"><label>3.6</label><title>Koordinator</title></section><section id="sub-3.7"><label>3.7</label><title>Problembehebung</title></section><section id="sub-3.8"><label>3.8</label><title>beratendes Dokument</title></section></section><section id="sub-4"><label>4</label><title>Abkürzungen</title></section><section id="sub-5"><label>5</label><title>Konzepte</title><section id="sub-5.1"><label>5.1</label><title>Allgemeines</title></section><section id="sub-5.2"><label>5.2</label><title>Struktur dieses Dokuments</title></section><section id="sub-5.3"><label>5.3</label><title>Zusammenhänge mit anderen Internationalen Normen</title><section id="sub-5.3.1"><label>5.3.1</label><title>ISO/IEC 30111</title></section><section id="sub-5.3.2"><label>5.3.2</label><title>ISO/IEC 27002</title></section><section id="sub-5.3.3"><label>5.3.3</label><title>Normenreihe ISO/IEC 27034</title></section><section id="sub-5.3.4"><label>5.3.4</label><title>ISO/IEC 27036-3</title></section><section id="sub-5.3.5"><label>5.3.5</label><title>ISO/IEC 27017</title></section><section id="sub-5.3.6"><label>5.3.6</label><title>Normenreihe ISO/IEC 27035</title></section><section id="sub-5.3.7"><label>5.3.7</label><title>Sicherheitsbewertung, Prüfung und Spezifikation</title></section></section><section id="sub-5.4"><label>5.4</label><title>Systeme, Komponenten und Dienstleistungen</title><section id="sub-5.4.1"><label>5.4.1</label><title>Systeme</title></section><section id="sub-5.4.2"><label>5.4.2</label><title>Komponenten</title></section><section id="sub-5.4.3"><label>5.4.3</label><title>Produkte</title></section><section id="sub-5.4.4"><label>5.4.4</label><title>Dienstleistungen</title></section><section id="sub-5.4.5"><label>5.4.5</label><title>Schwachstelle</title></section><section id="sub-5.4.6"><label>5.4.6</label><title>Wechselseitige Produktabhängigkeit</title></section></section><section id="sub-5.5"><label>5.5</label><title>Rollen der Beteiligten</title><section id="sub-5.5.1"><label>5.5.1</label><title>Allgemeines</title></section><section id="sub-5.5.2"><label>5.5.2</label><title>Anwender</title></section><section id="sub-5.5.3"><label>5.5.3</label><title>Anbieter</title></section><section id="sub-5.5.4"><label>5.5.4</label><title>Berichtersteller</title></section><section id="sub-5.5.5"><label>5.5.5</label><title>Koordinator</title></section></section><section id="sub-5.6"><label>5.6</label><title>Zusammenfassung des Schwachstellenbehandlungsprozesses</title><section id="sub-5.6.1"><label>5.6.1</label><title>Allgemeines</title></section><section id="sub-5.6.2"><label>5.6.2</label><title>Vorbereitung</title></section><section id="sub-5.6.3"><label>5.6.3</label><title>Empfang</title></section><section id="sub-5.6.4"><label>5.6.4</label><title>Verifizierung</title></section><section id="sub-5.6.5"><label>5.6.5</label><title>Entwickeln der Problembehebung</title></section><section id="sub-5.6.6"><label>5.6.6</label><title>Freigabe</title></section><section id="sub-5.6.7"><label>5.6.7</label><title>Nach der Freigabe</title></section><section id="sub-5.6.8"><label>5.6.8</label><title>Sperrfrist</title></section></section><section id="sub-5.7"><label>5.7</label><title>Informationsaustausch während der Offenlegung von Schwachstellen</title></section><section id="sub-5.8"><label>5.8</label><title>Vertraulichkeit von ausgetauschten Informationen</title><section id="sub-5.8.1"><label>5.8.1</label><title>Allgemeines</title></section><section id="sub-5.8.2"><label>5.8.2</label><title>Sichere Kommunikationswege</title></section></section><section id="sub-5.9"><label>5.9</label><title>Beratende Dokumente über Schwachstellen</title></section><section id="sub-5.10"><label>5.10</label><title>Ausnutzung einer Schwachstelle</title></section><section id="sub-5.11"><label>5.11</label><title>Schwachstellen und Risiko</title></section></section><section id="sub-6"><label>6</label><title>Empfangen von Schwachstellenberichten</title><section id="sub-6.1"><label>6.1</label><title>Allgemeines</title></section><section id="sub-6.2"><label>6.2</label><title>Schwachstellenberichte</title><section id="sub-6.2.1"><label>6.2.1</label><title>Allgemeines</title></section><section id="sub-6.2.2"><label>6.2.2</label><title>Fähigkeit zum Empfangen von Berichten</title></section><section id="sub-6.2.3"><label>6.2.3</label><title>Überwachung</title></section><section id="sub-6.2.4"><label>6.2.4</label><title>Berichtsverfolgung</title></section><section id="sub-6.2.5"><label>6.2.5</label><title>Bestätigung des Berichts</title></section></section><section id="sub-6.3"><label>6.3</label><title>Erstbeurteilung</title></section><section id="sub-6.4"><label>6.4</label><title>Weitere Untersuchungen</title></section><section id="sub-6.5"><label>6.5</label><title>Fortlaufende Kommunikation</title></section><section id="sub-6.6"><label>6.6</label><title>Beteiligung von Koordinatoren</title></section><section id="sub-6.7"><label>6.7</label><title>Betriebssicherheit</title></section></section><section id="sub-7"><label>7</label><title>Veröffentlichen von beratenden Dokumenten über Schwachstellen</title><section id="sub-7.1"><label>7.1</label><title>Allgemeines</title></section><section id="sub-7.2"><label>7.2</label><title>Beratendes Dokument</title></section><section id="sub-7.3"><label>7.3</label><title>Zeitplan für die Veröffentlichung von beratenden Dokumenten</title></section><section id="sub-7.4"><label>7.4</label><title>Elemente von beratenden Dokumenten</title><section id="sub-7.4.1"><label>7.4.1</label><title>Allgemeines</title></section><section id="sub-7.4.2"><label>7.4.2</label><title>Kennungen</title></section><section id="sub-7.4.3"><label>7.4.3</label><title>Datum und Uhrzeit</title></section><section id="sub-7.4.4"><label>7.4.4</label><title>Titel</title></section><section id="sub-7.4.5"><label>7.4.5</label><title>Überblick</title></section><section id="sub-7.4.6"><label>7.4.6</label><title>Betroffene Produkte</title></section><section id="sub-7.4.7"><label>7.4.7</label><title>Vorgesehene Zielgruppe</title></section><section id="sub-7.4.8"><label>7.4.8</label><title>Lokalisierung</title></section><section id="sub-7.4.9"><label>7.4.9</label><title>Beschreibung</title></section><section id="sub-7.4.10"><label>7.4.10</label><title>Auswirkung</title></section><section id="sub-7.4.11"><label>7.4.11</label><title>Schweregrad</title></section><section id="sub-7.4.12"><label>7.4.12</label><title>Problembehebung</title></section><section id="sub-7.4.13"><label>7.4.13</label><title>Verweisungen</title></section><section id="sub-7.4.14"><label>7.4.14</label><title>Anerkennung</title></section><section id="sub-7.4.15"><label>7.4.15</label><title>Kontaktinformationen</title></section><section id="sub-7.4.16"><label>7.4.16</label><title>Versionshistorie</title></section><section id="sub-7.4.17"><label>7.4.17</label><title>Nutzungsbedingungen</title></section></section><section id="sub-7.5"><label>7.5</label><title>Übermittlung des beratenden Dokuments</title></section><section id="sub-7.6"><label>7.6</label><title>Format des beratenden Dokuments</title></section><section id="sub-7.7"><label>7.7</label><title>Authentizität von beratenden Dokumenten</title></section><section id="sub-7.8"><label>7.8</label><title>Problembehebungen</title><section id="sub-7.8.1"><label>7.8.1</label><title>Allgemeines</title></section><section id="sub-7.8.2"><label>7.8.2</label><title>Authentizität der Problembehebung</title></section><section id="sub-7.8.3"><label>7.8.3</label><title>Durchführung von Problembehebungen</title></section></section></section><section id="sub-8"><label>8</label><title>Koordination</title><section id="sub-8.1"><label>8.1</label><title>Allgemeines</title></section><section id="sub-8.2"><label>8.2</label><title>Anbieter mit verschiedenen Rollen</title><section id="sub-8.2.1"><label>8.2.1</label><title>Allgemeines</title></section><section id="sub-8.2.2"><label>8.2.2</label><title>Schwachstellenberichterstattung zwischen Anbietern</title></section><section id="sub-8.2.3"><label>8.2.3</label><title>Berichten von Schwachstelleninformationen an andere Anbieter</title></section></section></section><section id="sub-9"><label>9</label><title>Richtlinie über die Offenlegung von Schwachstellen</title><section id="sub-9.1"><label>9.1</label><title>Allgemeines</title></section><section id="sub-9.2"><label>9.2</label><title>Erforderliche Richtlinienelemente</title><section id="sub-9.2.1"><label>9.2.1</label><title>Allgemeines</title></section><section id="sub-9.2.2"><label>9.2.2</label><title>Bevorzugte Kontaktaufnahmeverfahren</title></section></section><section id="sub-9.3"><label>9.3</label><title>Empfohlene Richtlinienelemente</title><section id="sub-9.3.1"><label>9.3.1</label><title>Allgemeines</title></section><section id="sub-9.3.2"><label>9.3.2</label><title>Inhalte des Schwachstellenberichts</title></section><section id="sub-9.3.3"><label>9.3.3</label><title>Sichere Kommunikationsoptionen</title></section><section id="sub-9.3.4"><label>9.3.4</label><title>Festlegen von Anforderungen an die Kommunikation</title></section><section id="sub-9.3.5"><label>9.3.5</label><title>Anwendungsbereich</title></section><section id="sub-9.3.6"><label>9.3.6</label><title>Veröffentlichung</title></section><section id="sub-9.3.7"><label>9.3.7</label><title>Würdigung</title></section></section><section id="sub-9.4"><label>9.4</label><title>Optionale Richtlinienelemente</title><section id="sub-9.4.1"><label>9.4.1</label><title>Allgemeines</title></section><section id="sub-9.4.2"><label>9.4.2</label><title>Rechtliche Aspekte</title></section><section id="sub-9.4.3"><label>9.4.3</label><title>Zeitplan für die Offenlegung</title></section></section></section><section id="sub-a"><label>Anhang A</label><title>Beispiele für Richtlinien über die Offenlegung von Schwachstellen (informativ)</title><section id="sub-a.1"><label>A.1</label><title>Facebook</title></section><section id="sub-a.2"><label>A.2</label><title>CERT/CC</title></section><section id="sub-a.3"><label>A.3</label><title>Zero Day Initiative</title></section><section id="sub-a.4"><label>A.4</label><title>Cisco</title></section><section id="sub-a.5"><label>A.5</label><title>NCSC-FI</title></section><section id="sub-a.6"><label>A.6</label><title>NCSC-NL</title></section><section id="sub-a.7"><label>A.7</label><title>Rapid7</title></section></section><section id="sub-b"><label>Anhang B</label><title>In einem Bericht erforderliche Informationen (informativ)</title></section><section id="sub-c"><label>Anhang C</label><title>Beispiele für beratende Dokumente (informativ)</title><section id="sub-c.1"><label>C.1</label><title>Beispiel für ein beratendes Dokument</title></section><section id="sub-c.2"><label>C.2</label><title>Beschädigung des Heap-Speichers in ASN.1-Parsing-Code, der durch Objective Systems Inc. ASN1C-Compiler für C/C++ generiert wurde</title></section><section id="sub-c.3"><label>C.3</label><title>Mehrere Schwachstellen im Network Time Protocol Daemon, die sich auf Cisco-Produkte auswirken: November 2016</title></section><section id="sub-c.4"><label>C.4</label><title>RHSA-2017:0057 — Beratendes Sicherheitsdokument</title></section><section id="sub-c.5"><label>C.5</label><title>Warnmeldung (TA10-159A) Adobe Flash, Reader, und Acrobat Schwachstelle</title></section></section><section id="sub-d"><label>Anhang D</label><title>Zusammenfassung der normativen Elemente (informativ)</title></section><section id="sub-annex.bibliography.int"><title>Literaturhinweise (informativ)</title></section><section id="sub-na"><label>Nationaler Anhang NA</label><title>Literaturhinweise (informativ)</title></section></toc>