Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Automated Indicator Sharing (AIS) TAXII 1.1 Capability Documents for More Information
Share:

Automated Indicator Sharing (AIS) TAXII 1.1 Capability Documents for More Information

Automated Indicator Sharing (AIS) Terms of Use (TOU) 

PUBLICATION
The Terms of Use (TOU) give the basic rules and responsibilities for connecting to the TAXII Server as well as some basic terminology that is used in the program.
Download File (PDF, 207.81 KB)

AIS Fact Sheet

CISA’s' free Automated Indicator Sharing (AIS) program enables organizations to share and receive machine-readable cyber threat indicators (CTIs) and defensive measures (DMs) in real time to monitor and defend their networks against relevant known threats.
Download File (PDF, 253.07 KB)

AIS Frequently Asked Questions (FAQ)

The FAQ provides a list of frequently asked questions and answers from stakeholders to assist new participants in understanding how Automated Indicator Sharing (AIS) is implemented.  
Download File (PDF, 1.55 MB)

AIS Privacy Impact Assessment

PUBLICATION
Privacy Impact Assessment for the Automated Indicator Sharing (AIS) Program.

AIS Federal Multilateral Information Sharing Agreement (MISA)

PUBLICATION
Multilateral Information Sharing Agreement (MISA), herein referred to as the “Agreement,” is to enhance cybersecurity information sharing among federal agencies in order to better protect the United States from malicious cyber actors.

AIS Submission Guidance

PUBLICATION
The Submission Guidance provides details for crafting cyber threat indicators in Structured Threat Information Expression (STIX) format, along with explanation of how to use Traffic Light Protocol (TLP).

AIS Submission Guidance Appendix A (AIS STIX Profile)

PUBLICATION
In Appendix A, all the STIX indicator fields from the AIS profile are included with information and examples for each.

Automated Indicator Sharing (AIS) Brokering Between the Non-Federal Entities Sharing Community and the Federal Entities Sharing Community

PUBLICATION
Provides key details on the brokering functions provided by DHS and guidance for federal entities to mark information with ACS markings they intend to share with the non-federal and federal entities via AIS.

AIS ACS Marking Guidance

PUBLICATION
This document is intended for federal sharing community readers who have some familiarity with AIS, STIX, and xml and wish to create and mark STIX documents in xml for sharing with AIS.

Information Sharing Architecture (ISA) Access Control Specification (ACS) v3.0a

SEP 01, 2019 | PUBLICATION
This Access Control Specification (ACS) document, the result of that collaboration, specifies the data elements required to implement automated access control systems based on the relevant policies governing sharing between participants.
Download File (PDF, 1.88 MB)

CISA Automated Indicator Sharing (AIS) TAXII Server Connection Guide

PUBLICATION
FAQs and guidance to help support customers in successfully connecting to the TAXII server.
Download File (PDF, 1.71 MB)

Cybersecurity Information Sharing Act of 2015

Cybersecurity Information Sharing Act of 2015

PUBLICATION
Cybersecurity Information Sharing Act of 2015 Original Act from the Government Printing Office.
Download File (PDF, 485.24 KB)

Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015

PUBLICATION
Guidance to assist Non-Federal entities in sharing Cyber Threat Indicators and Defensive Measures
Download File (PDF, 1.25 MB)

Sharing of Cyber Threat Indicators and Defensive Measures by the Federal Government under the Cybersecurity Information Sharing Act of 2015

PUBLICATION
Guidance to assist Federal entities to share Cyber Threat Indicators and Defensive Measures.
Download File (PDF, 602.76 KB)

Privacy and Civil Liberties Guidelines: Cybersecurity Information Sharing Act of 2015

PUBLICATION
Establishes privacy and civil liberties guidelines governing the receipt, retention, use, and dissemination of cyber threat indicators by a federal entity.
Download File (PDF, 432.52 KB)

Final Procedures Related to the Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Government

PUBLICATION
Consistent with section 105(a)(2) and (3) of the Cybersecurity Information Sharing Act of 2015 (CISA), this document establishes procedures relating to the receipt of cyber threat indicators and defensive measures by all federal entities under CISA.
Download File (PDF, 415.06 KB)
Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback