
Federal Government
CISA partners with other government agencies to help them manage their cyber risk.
Report a Cyber Issue
Organizations should report anomalous cyber activity and/or cyber incidents 24/7 to report@cisa.gov or 1-844-Say-CISA.
CISA partners with other government agencies to protect our nation’s cyber and physical critical infrastructure. CISA has the mission to provide a common baseline of security across the Federal Civilian Executive Branch (FCEB) and to help agencies manage their cyber risk. Resources include tools, trainings, and information materials to prevent, protect against, and mitigate security incidents.
Featured Content

Solutions for Federal Agencies
The CDM Program helps federal civilian agencies better understand and improve their network defense strategies.
Government Coordinating Councils
Government Coordinating Councils (GCCs), comprised of representatives from across various levels of government, are formed to enable interagency and cross-jurisdictional coordination.
Featured Articles
Alerts & Directives
CISA and Partners Release Call to Action to Close the National Software Understanding Gap
JAN 16, 2025
| ALERT
This report further explores the opportunity for enhanced coordination to strengthen technical foundations and progress towards a more vigorous understanding of software on a national scale.
CISA Releases Best Practice Guidance for Mobile Communications
DEC 18, 2024
| ALERT
CISA strongly urges highly targeted individuals to immediately review and apply the best practices provided in the guidance to protect mobile communications, including consistent use of end-to-end encryption.
CISA Issues BOD 25-01, Implementing Secure Practices for Cloud Services
DEC 17, 2024
| ALERT
This Directive requires federal civilian agencies to identify specific cloud tenants, implement assessment tools, and align cloud environments to CISA’s SCuBA secure configuration baselines.
Contact Your Regional Office
Services
CISA has compiled a list of free tools and services to help government agencies further advance their security capabilities. This living repository includes services provided by CISA, widely used open-source tools, and other free tools and services offered by private and public sector organizations.
Automated Indicator Sharing (AIS) Service
INCREASE YOUR RESILIENCE
Contact: cyberservices@cisa.dhs.gov
Automated Indicator Sharing (AIS) is a service that enables participants in the service to exchange cyber threat indicators with State, Local, Territorial, and Tribal governments and the private sector at machine speed.
Foundational, Intermediate, Advanced

CISA Gateway
Contact: CISA-Gateway@mail.cisa.dhs.gov
The CISA Gateway provides various data collection, analysis, and response tools in one integrated system through a single user registration, management, and authentication process.

CISA Tabletop Exercise Packages
INCREASE YOUR RESILIENCE
Contact: cisa.exercises@mail.cisa.dhs.gov
A comprehensive set of resources designed to assist stakeholders in conducting their own exercises and initiating discussions within their organizations about their ability to address a variety of threat scenarios.
Foundational
Publications
Partnering to Safeguard Localities from Cybersecurity Threats Toolkit
PUBLICATION
Municipalities across the United States are at risk of cyber intrusions,
with recent incidents demonstrating both potential impacts to critical
functions and unauthorized access to sensitive information.