Be patient!

We are updating old articles and new articles. Hope you this of interest. Please feel free to comment on articles

Gov answer to Cybersecurity

Act of 2015 is the last cybersecurity act. God help us.

obama internetcartoon
obama internetcartoon

Automated Indicator Sharing (AIS)

Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enablereal-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations. AIS helps to protect the participants of the service and ultimately reduce the prevalence of cyberattacks.

The AIS community includes private sector entities; federal agencies; state, local, tribal, and territorial (SLTT) governments; information sharing and analysis centers (ISACs) and information sharing and analysis organizations (ISAOs); and foreign government partners and companies.  

AIS, offered at no cost to participants, is part of CISA’s mission to collaborate with public and private sector partners to identify and help mitigate cyber threats through information sharing. The AIS ecosystem empowers participants to share cyber threat indicators and defensive measures such as information about attempted adversary compromises as they are being observed. These real-time insights help protect other participants of the AIS community and ultimately limit the adversary’s use of an attack method.

As more information is shared, more organizations become informed and better equipped to prevent further damage from vicious cyber-attacks.

More about AIS

How AIS Works

AIS enables the real-time exchange of machine-readable cyber threat indicators through a server/client architecture for communications. 

How to share Cyber Threat Information through AIS

CISA highly encourages AIS participants to share cyber threat indicators (CTIs) and defensive measures (DMs) via the bidirectional AIS TAXII connection.

AIS Participant Protections

CISA has taken careful measures to ensure that participants’ privacy and protections are implemented and respected.

Other Ways to Connect: ISACs, ISAOs, Threat Providers

Share AIS cyber threat indicators and defensive measures through a participating ISAC or ISAO or via an AIS-integrated commercial product or service.

Federal Bridge Certificate Authority

DHS-approved PKI CA providers that currently offer a medium assurance Federal Bridge Certificate Authority supported PKI certificate. 

Participate in AIS

AIS is a free service. To participate, please complete the following steps:

  1. Contact cyberservices@cisa.dhs.gov for engagement information and taxiiadmins@us-cert.gov for technical assistance during your onboarding.
  2. Agree to a brief Terms of Use for non-federal organizations or the Multilateral Information Sharing Agreement (MISA) for federal organizations.
  3. Acquire a STIX/TAXII capability: use an open source TAXII 2.1 client, provided by DHS or others in the community (e.g., ISACs, ISAOs), or obtain access via a commercial solution.
  4. Get a PKI certificate from a Federal Bridge Certificate Authority (you may need to purchase if you do not have one already).
  5. Sign an Interconnection Agreement and provide your IP address to CISA.

The Cybersecurity Information Sharing Act of 2015

CISA is the designated hub for the sharing of cyber threat indicators and defensive measures between the federal government and private sector pursuant to the Cybersecurity Information Sharing Act of 2015 (CISA 2015). This law grants liability protection, privacy protections, and other protections to organizations that share cyber threat indicators and defensive measures through AIS in accordance with the Act’s requirements.

As mandated by CISA 2015, DHS certified the operation of AIS in March 2016 and released a series of guidance, in conjunction with the Department of Justice, to help private and public sector entities share cyber threat indicators with the Federal Government. 

Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015

PUBLICATION

Guidance to assist Non-Federal entities in sharing Cyber Threat Indicators and Defensive Measures

Download File (PDF, 751.14 KB)

Privacy and Civil Liberties Guidelines: Cybersecurity Information Sharing Act of 2015

PUBLICATION

Establishes privacy and civil liberties guidelines governing the receipt, retention, use, and dissemination of cyber threat indicators by a federal entity.

Download File (PDF, 372.05 KB)

Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government under the Cybersecurity Information Sharing Act of 2015

PUBLICATION

Guidance to assist Federal entities to share Cyber Threat Indicators and Defensive Measures.

Download File (PDF, 602.76 KB)

Final Procedures Related to the Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Government

PUBLICATION

Consistent with section 105(a)(2) and (3) of the Cybersecurity Information Sharing Act of 2015 (CISA), this document establishes procedures relating to the receipt of cyber threat indicators and defensive measures by all federal entities under CISA.

Download File (PDF, 415.06 KB)

AIS Documents for More Information

AIS TAXII 2.1 Capability Documents for More Information

Discover Automated Indicator Sharing (AIS) AIS TAXII 2.1 Capability 

AIS Community Feedback

In the future, CISA intends to provide additional AIS features to allow participants to identify the most operationally relevant indicators. As CISA receives participant feedback, it will continue to perform updates to make AIS as useful and relevant to the community as possible. Please send any feedback to cyberservices@cisa.dhs.gov


Danwillie’s Social Networking