Automated Indicator Sharing (AIS) TAXII 2.1 Capability Documents for More Information
Automated Indicator Sharing (AIS) Terms of Use (TOU)
PUBLICATION
The Terms of Use (TOU) give the basic rules and responsibilities for connecting to the TAXII Server as well as some basic terminology that is used in the program.
Automated Indicator Sharing (AIS) Terms of Use Addendum for Data Aggregators
PUBLICATION
This addendum to the AIS Terms of Use sets forth the terms and conditions governing use of AIS-derived data by Data Aggregators
AIS Fact Sheet
CISA’s' free Automated Indicator Sharing (AIS) program enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real time to monitor and defend their networks against relevant known threats.
CISA Automated Indicator Sharing (AIS) TAXII Server Connection Guide
PUBLICATION
FAQs and guidance to help support customers in successfully connecting to the TAXII server.
Automated Indicator Sharing (AIS) Frequently Asked Questions (FAQ)
PUBLICATION
The FAQ regarding the implementation of Automated Indicator Sharing (AIS).
Automated Indicator Sharing (AIS) Privacy Impact Assessment
PUBLICATION
Privacy Impact Assessment regarding AIS.
Automated Indicator Sharing (AIS) Federal Multilateral Information Sharing Agreement (MISA)
PUBLICATION
An overview of the MISA to enhance cybersecurity information sharing among federal agencies.
Automated Indicator Sharing (AIS) Interconnection Agreement
PUBLICATION
The Interconnect Agreement explains the responsibilities on both sides of the sharing relationship.
Automated Indicator Sharing (AIS) 2.0 Submission Guidance
PUBLICATION
Guidance for AIS participants when submitting CTIs and DMs in the Structured Threat Information Expression (STIX) format via the Trusted Automated Exchange of Intelligence Information (TAXII).
Automated Indicator Sharing (AIS) 2.0 STIX Profile
PUBLICATION
Examines the formal set of submission requirements for AIS Participants when submitting CTIs and DMs to AIS using the Structured Threat Information Expression (STIX) format via the Trusted Automated Exchange of Intelligence Information (TAXII).
OASIS STIX 2.1 Best Practice Guide v1.0.0
PUBLICATION
This guide developed by the OASIS Cyber Threat Intelligence (CTI) Technical Committee suggests best practices to use for STIX content, both for some non-MUST normative statements and for considerations beyond the specification.
Information Sharing Architecture (ISA) Access Control Specification (ACS) v3.0a
SEP 01, 2019
| PUBLICATION
This Access Control Specification (ACS) document, the result of that collaboration, specifies the data elements required to implement automated access control systems based on the relevant policies governing sharing between participants.
Automated Indicator Sharing (AIS) Brokering Between the Non-Federal Entities Sharing Community and the Federal Entities Sharing Community
PUBLICATION
Provides significant information on the brokering functions provided by DHS.
Automated Indicator Sharing (AIS) Status Service
PUBLICATION
This guide demonstrates how the AIS status service works.
Filtering Automated Indicator Sharing (AIS) Content Based on Specified Criteria
PUBLICATION
This guide provided examples of common use cases and illustrates how TAXII filtering functions.
Automated Indicator Sharing (AIS) 2.0 Public Facing Test Environment (PFTE)
PUBLICATION
This document indicates multiple features and use-cases available to AIS participants to be better informed before participation in the AIS production environment.
CISA FLARE TAXII Client for Automated Indicator Sharing (AIS) 2.0
EXTERNAL
Open-source TAXII graphical user interface client able to poll and publish to/from the AIS TAXII server.
Cybersecurity Information Sharing Act of 2015
Cybersecurity Information Sharing Act of 2015
PUBLICATION
Cybersecurity Information Sharing Act of 2015 Original Act from the Government Printing Office.
Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015
PUBLICATION
Guidance to assist Non-Federal entities in sharing Cyber Threat Indicators and Defensive Measures
Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government under the Cybersecurity Information Sharing Act of 2015
PUBLICATION
Guidance to assist Federal entities to share Cyber Threat Indicators and Defensive Measures.
Privacy and Civil Liberties Guidelines: Cybersecurity Information Sharing Act of 2015
PUBLICATION
Establishes privacy and civil liberties guidelines governing the receipt, retention, use, and dissemination of cyber threat indicators by a federal entity.
Final Procedures Related to the Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Government
PUBLICATION
Consistent with section 105(a)(2) and (3) of the Cybersecurity Information Sharing Act of 2015 (CISA), this document establishes procedures relating to the receipt of cyber threat indicators and defensive measures by all federal entities under CISA.