- Gov answer to Cybersecurity
- Automated Indicator Sharing (AIS)
- More about AIS
- Participate in AIS
- The Cybersecurity Information Sharing Act of 2015
- Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015
- Privacy and Civil Liberties Guidelines: Cybersecurity Information Sharing Act of 2015
- Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government under the Cybersecurity Information Sharing Act of 2015
- Final Procedures Related to the Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Government
- AIS Documents for More Information
- AIS Community Feedback
Gov answer to Cybersecurity
Act of 2015 is the last cybersecurity act. God help us.
Automated Indicator Sharing (AIS)
Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enablereal-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations. AIS helps to protect the participants of the service and ultimately reduce the prevalence of cyberattacks.
The AIS community includes private sector entities; federal agencies; state, local, tribal, and territorial (SLTT) governments; information sharing and analysis centers (ISACs) and information sharing and analysis organizations (ISAOs); and foreign government partners and companies.
AIS, offered at no cost to participants, is part of CISA’s mission to collaborate with public and private sector partners to identify and help mitigate cyber threats through information sharing. The AIS ecosystem empowers participants to share cyber threat indicators and defensive measures such as information about attempted adversary compromises as they are being observed. These real-time insights help protect other participants of the AIS community and ultimately limit the adversary’s use of an attack method.
As more information is shared, more organizations become informed and better equipped to prevent further damage from vicious cyber-attacks.
More about AIS
How AIS Works
AIS enables the real-time exchange of machine-readable cyber threat indicators through a server/client architecture for communications.
How to share Cyber Threat Information through AIS
CISA highly encourages AIS participants to share cyber threat indicators (CTIs) and defensive measures (DMs) via the bidirectional AIS TAXII connection.
AIS Participant Protections
CISA has taken careful measures to ensure that participants’ privacy and protections are implemented and respected.
Other Ways to Connect: ISACs, ISAOs, Threat Providers
Share AIS cyber threat indicators and defensive measures through a participating ISAC or ISAO or via an AIS-integrated commercial product or service.
Federal Bridge Certificate Authority
DHS-approved PKI CA providers that currently offer a medium assurance Federal Bridge Certificate Authority supported PKI certificate.
Participate in AIS
AIS is a free service. To participate, please complete the following steps:
- Contact cyberservices@cisa.dhs.gov for engagement information and taxiiadmins@us-cert.gov for technical assistance during your onboarding.
- Agree to a brief Terms of Use for non-federal organizations or the Multilateral Information Sharing Agreement (MISA) for federal organizations.
- Acquire a STIX/TAXII capability: use an open source TAXII 2.1 client, provided by DHS or others in the community (e.g., ISACs, ISAOs), or obtain access via a commercial solution.
- Get a PKI certificate from a Federal Bridge Certificate Authority (you may need to purchase if you do not have one already).
- Sign an Interconnection Agreement and provide your IP address to CISA.
The Cybersecurity Information Sharing Act of 2015
CISA is the designated hub for the sharing of cyber threat indicators and defensive measures between the federal government and private sector pursuant to the Cybersecurity Information Sharing Act of 2015 (CISA 2015). This law grants liability protection, privacy protections, and other protections to organizations that share cyber threat indicators and defensive measures through AIS in accordance with the Act’s requirements.
As mandated by CISA 2015, DHS certified the operation of AIS in March 2016 and released a series of guidance, in conjunction with the Department of Justice, to help private and public sector entities share cyber threat indicators with the Federal Government.
Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015
PUBLICATION
Guidance to assist Non-Federal entities in sharing Cyber Threat Indicators and Defensive Measures
Download File (PDF, 751.14 KB)
Privacy and Civil Liberties Guidelines: Cybersecurity Information Sharing Act of 2015
PUBLICATION
Establishes privacy and civil liberties guidelines governing the receipt, retention, use, and dissemination of cyber threat indicators by a federal entity.
Download File (PDF, 372.05 KB)
Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government under the Cybersecurity Information Sharing Act of 2015
PUBLICATION
Guidance to assist Federal entities to share Cyber Threat Indicators and Defensive Measures.
Download File (PDF, 602.76 KB)
Final Procedures Related to the Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Government
PUBLICATION
Consistent with section 105(a)(2) and (3) of the Cybersecurity Information Sharing Act of 2015 (CISA), this document establishes procedures relating to the receipt of cyber threat indicators and defensive measures by all federal entities under CISA.
Download File (PDF, 415.06 KB)
AIS Documents for More Information
AIS TAXII 2.1 Capability Documents for More Information
Discover Automated Indicator Sharing (AIS) AIS TAXII 2.1 Capability
AIS Community Feedback
In the future, CISA intends to provide additional AIS features to allow participants to identify the most operationally relevant indicators. As CISA receives participant feedback, it will continue to perform updates to make AIS as useful and relevant to the community as possible. Please send any feedback to cyberservices@cisa.dhs.gov