Revert "Tweaking the security site"
diff --git a/content/security/committers.md b/content/security/committers.md
index 0f2ae8c..a123c38 100644
--- a/content/security/committers.md
+++ b/content/security/committers.md
@@ -54,9 +54,11 @@
 
 ### Report
 
-1. The person discovering the issue, the _reporter_, identifies the mailing list to report to. If the project the issue relates to has a security@*[project]*.apache.org mailing list listed on [security projects list](https://security.apache.org/projects/), use that mailing list. Otherwise, use `security@apache.org`.
+1. The person discovering the issue, the _reporter_, reports the
+vulnerability privately to `security@project.apache.org` or to
+`security@apache.org`.
 
-2. Note that the Security teams will ignore all messages that do not relate to reporting or managing an
+2. The Security team ignores any message to this inbox that does not relate to reporting or managing an
 undisclosed security vulnerability in Apache software.
 
 3. If the report comes to `security@apache.org`, the security team forwards
@@ -64,21 +66,17 @@
 have a security list, to the project's private (PMC) mailing list.
 The Security Team responds to the original reporter that they have done this.
 
-4. If the project does not have a dedicated `security@project.apache.org`
-mailing list, all further communication regarding the vulnerability should be copied to `security@apache.org`. There is no need to do this for messages
-sent to `security@project.apache.org` since these are automatically copied to `security@apache.org`.
-
 ### Acknowledge
 
-4. The project team sends an e-mail to the original reporter to acknowledge the report, with a copy to the relevant security mailing list.
+4. The project team sends an e-mail to the original reporter to acknowledge the report, with a copy to `security@project.apache.org` if it exists, or to
+`security@apache.org`.
 
-5. The project team investigates the report and either rejects or accepts it.
-
-6. Project team members may share information about the vulnerability with domain experts (including colleagues at their
-employer) at the discretion of the project's security team, providing that they make clear that the information is not for public disclosure.
+5. The project team investigates the report and either rejects or accepts
+it.
 
 6. If the project team **rejects** the report, the team writes to the reporter to
-explain why, with a copy to the relevant security mailing list.
+explain why, with a copy to `security@project.apache.org` if it exists, or to
+`security@apache.org`.
 
 7. If the project team **accepts** the report, the team writes to the reporter to let them
 know that they have accepted the report and that they are working on a fix.
@@ -150,6 +148,16 @@
 
 19. If the project repository is in Subversion, add the CVE ID to the log for the commit that applied the fix. Do **not** try to do this if your project uses a Git repository, as editing a pushed commit causes all sorts of problems.
 
+If the project does not have a dedicated `security@project.apache.org`
+mailing list, copy all communication regarding the vulnerability to `security@apache.org`. There is no need to do this for messages
+sent to `security@project.apache.org` since these are automatically copied to
+`security@apache.org`.
+
+Share information about the vulnerability with domain experts (or colleagues at your
+employer) at the discretion of the project's security team, providing that
+you make clear that the information is not for public disclosure and that you copy to
+`security@apache.org` or the project's security mailing list any communication regarding the vulnerability.
+
 <h2 id="ids">CVE IDs<a class="headerlink" href="#ids" title="Permanent link">&para;</a></h2>
 
 [CVE](https://cve.org/)
diff --git a/content/security/index.md b/content/security/index.md
index ccade4f..6bfd529 100644
--- a/content/security/index.md
+++ b/content/security/index.md
@@ -94,7 +94,3 @@
 
 Committers should read a [more detailed description of the process](committers.html). Reporters of security vulnerabilities may also find
 it useful.
-
-## Discussion
-
-Committers and Security Researchers are encouraged to join our [community discuss list](https://lists.apache.org/list.html?security-discuss@community.apache.org).