--- /dev/null
+# Security Policy
+
+## Reporting a Vulnerability
+
+Please report any security-relevant flaw to security@strongswan.org. Whenever
+possible encrypt your email with the [PGP key](https://pgp.key-server.io/0x1EB41ECF25A536E4)
+with key ID 0x1EB41ECF25A536E4.
+
+## Severity Classification
+
+* **High Severity Flaw**
+
+ * Allows remote access to the VPN with improper, missing, or invalid
+ credentials
+ * Allows local escalation of privileges on the server
+ * Plain text traffic on the secure interface
+ * Key generation and crypto flaws that reduce the difficulty in decrypting
+ secure traffic
+
+* **Medium Severity Flaw**
+
+ * Remotely crashing the strongSwan daemon, which would allow DoS attacks on
+ the VPN service
+
+* **Low Severity Flaw**
+
+ * All other minor issues not directly compromising security or availability
+ of the strongSwan daemon or the host the daemon is running on
+
+## Action Taken
+
+For **high** and **medium** severity vulnerabilities we are generally going to
+apply for a [CVE Identifier](https://cve.mitre.org/cve/identifiers/) first.
+Next we notify all known strongSwan customers and the major Linux
+distributions, giving them a time of about three weeks to patch their software
+release. On a predetermined date, we officially issue an advisory and a patch
+for the vulnerability and usually a new stable strongSwan release containing
+the security fix.
+
+Minor vulnerabilities of **low** severity usually will be fixed immediately
+in our repository and released with the next stable release.
+
+## List of Reported and Fixed Security Flaws
+
+A list of all reported strongSwan high and medium security flaws may be
+found in the [CVE database](https://nvd.nist.gov/vuln/search/results?query=strongswan).
+
+The corresponding security patches are published on https://download.strongswan.org/security/.