Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

 
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based Community
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
    Work @ CISA
  • About
    Culture
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    Reporting Employee and Contractor Misconduct
    CISA GitHub
    Contact Us
Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
  1. Home
Share:

Automated Indicator Sharing (AIS) TAXII 1.1 Capability Documents for More Information

Automated Indicator Sharing (AIS) Terms of Use (TOU) 

PUBLICATION
The Terms of Use (TOU) give the basic rules and responsibilities for connecting to the TAXII Server as well as some basic terminology that is used in the program.
Download File (PDF, 207.81 KB)

AIS Fact Sheet

CISA’s' free Automated Indicator Sharing (AIS) program enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real time to monitor and defend their networks against relevant known threats.
Download File (PDF, 253.07 KB)

AIS Frequently Asked Questions (FAQ)

The FAQ provides a list of frequently asked questions and answers from stakeholders to assist new participants in understanding how Automated Indicator Sharing (AIS) is implemented.  
Download File (PDF, 1.55 MB)

AIS Privacy Impact Assessment

PUBLICATION
Privacy Impact Assessment for the Automated Indicator Sharing (AIS) Program.
Download File (PDF, 293.21 KB)

AIS Federal Multilateral Information Sharing Agreement (MISA)

PUBLICATION
Multilateral Information Sharing Agreement (MISA), herein referred to as the “Agreement,” is to enhance cybersecurity information sharing among federal agencies in order to better protect the United States from malicious cyber actors.
Download File (PDF, 480.85 KB)

AIS Submission Guidance

PUBLICATION
The Submission Guidance provides details for crafting cyber threat indicators in Structured Threat Information Expression (STIX) format, along with explanation of how to use Traffic Light Protocol (TLP).
Download File (PDF, 776.73 KB)

AIS Submission Guidance Appendix A (AIS STIX Profile)

PUBLICATION
In Appendix A, all the STIX indicator fields from the AIS profile are included with information and examples for each.
Download File (PDF, 576.67 KB)

Automated Indicator Sharing (AIS) Brokering Between the Non-Federal Entities Sharing Community and the Federal Entities Sharing Community

PUBLICATION
Provides key details on the brokering functions provided by DHS and guidance for federal entities to mark information with ACS markings they intend to share with the non-federal and federal entities via AIS.
Download File (PDF, 1.25 MB)

AIS ACS Marking Guidance

PUBLICATION
This document is intended for federal sharing community readers who have some familiarity with AIS, STIX, and xml and wish to create and mark STIX documents in xml for sharing with AIS.
Download File (PDF, 1.88 MB)

Information Sharing Architecture (ISA) Access Control Specification (ACS) v3.0a

SEP 01, 2019 | PUBLICATION
This Access Control Specification (ACS) document, the result of that collaboration, specifies the data elements required to implement automated access control systems based on the relevant policies governing sharing between participants.
Download File (PDF, 1.88 MB)

CISA Automated Indicator Sharing (AIS) TAXII Server Connection Guide

PUBLICATION
FAQs and guidance to help support customers in successfully connecting to the TAXII server.
Download File (PDF, 1.71 MB)

Cybersecurity Information Sharing Act of 2015

Cybersecurity Information Sharing Act of 2015

PUBLICATION
Cybersecurity Information Sharing Act of 2015 Original Act from the Government Printing Office.
Download File (PDF, 485.24 KB)

Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015

PUBLICATION
Guidance to assist Non-Federal entities in sharing Cyber Threat Indicators and Defensive Measures
Download File (PDF, 751.14 KB)

Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government under the Cybersecurity Information Sharing Act of 2015

PUBLICATION
Guidance to assist Federal entities to share Cyber Threat Indicators and Defensive Measures.
Download File (PDF, 602.76 KB)

Privacy and Civil Liberties Guidelines: Cybersecurity Information Sharing Act of 2015

PUBLICATION
Establishes privacy and civil liberties guidelines governing the receipt, retention, use, and dissemination of cyber threat indicators by a federal entity.
Download File (PDF, 372.05 KB)

Final Procedures Related to the Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Government

PUBLICATION
Consistent with section 105(a)(2) and (3) of the Cybersecurity Information Sharing Act of 2015 (CISA), this document establishes procedures relating to the receipt of cyber threat indicators and defensive measures by all federal entities under CISA.
Download File (PDF, 415.06 KB)
Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 888-282-0870 Central@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Accessibility
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback