search menu icon-carat-right cmu-wordmark

Steps in the Process for Becoming an Authorized User

February 2013 Brochure

This procedure describes the steps that incident response teams must take to apply for using the CERT mark in their name.

Publisher:

Software Engineering Institute

Abstract

Computer security incident response teams who apply for authorization to use the "CERT" mark in their names can expect to follow this processes outlined in this document.