




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
TLP:CLEAR
TLP:CLEAR
JCDCAICybersecurityCollaborationPlaybook
JointCyberDefenseCollaborative
CybersecurityandInfrastructureSecurityAgency
January14,2025
ThisdocumentismarkedTLP:CLEAR:Disclosureisnotlimited.FormoreinformationontheTrafficLightProtocol,see
/tlp.
JCDCAICybersecurityCollaborationPlaybookTLP:CLEAR
Page2of33
TLP:CLEAR
TableofContents
Acknowledgements 3
QuestionsandFeedback 5
Disclaimer 5
Audience 6
Background 6
Purpose 6
KeyDefinitions 7
InformationSharing:ProtectionsandMechanisms 8
Information-SharingProtections 8
Information-SharingMechanisms 9
InformationSharingWithinJCDC 9
NewlyIdentifiedVulnerabilityCoordination 10
IncidentReporting 10
ProactiveInformationSharing 11
InformationSharingRegardinganIncidentorVulnerability 12
CISA’sInformationAnalysisandOperationalUse 17
EnhancedCoordination 18
CalltoAction 19
AppendixA:PopulatedExampleofChecklistsforInformationHandlingRestrictionsandVoluntary
InformationSharing 21
AppendixB:CaseStudiesforProactiveInformationSharingandEnhancedCoordination 26
ProactiveInformationSharingExample:ClearviewAIMisconfigurationCaseStudy 26
EnhancedCoordinationExample:CompromisedPyTorchDependencyChain 27
AppendixC:AdditionalAvenuesforVoluntaryInformationSharing 29
AppendixD:AdditionalResources 32
Page3of33
TLP:CLEAR
Acknowledgements
TheCybersecurityandInfrastructureSecurityAgency(CISA)
1
ledthedevelopmentoftheArtificialIntelligence(AI)CybersecurityCollaborationplaybookincollaborationwithfederal,international,andprivatesectorpartnersthroughtheJointCyberDefenseCollaborative(JCDC).
2
JCDCisa
public-privatecollaborativewithinCISAthatleveragesauthoritiesgrantedbyCongressinthe
2021NationalDefenseAuthorizationAct(NDAA)tounitetheglobalcybercommunityindefenseofcyberspace.TheJCDClogoonthisdocumentsignifiesthecontributionstothisplaybookmadebyJCDCpartners
3
,particularlyJCDC.AIpartners
4
,incollaborationwithCISA.JCDCpartnersarelistedbelow.
TheJCDCAICybersecurityCollaborationPlaybookwasdevelopedasadirectresultoftwo
tabletop
exercises
(TTXs)heldin2024,whichbroughttogetherfederal,industry,andinternational
partners.ThefirstTTX,hostedinJune2024atMicrosoftinReston,Virginia,laidthegroundworkbyaddressingtheuniquechallengesposedbyartificialintelligence(AI)cybersecurityincidents.Thisfoundationalexerciseinformedtheearlystagesoftheplaybook’sdevelopment.ThesecondTTX,hostedinSeptember2024atScaleAI’sheadquartersinSanFrancisco,California,helpedparticipantsfurtherrefinetheplaybookbysimulatinganAIcybersecurityincidentinthefinancialservicessector.CISAincorporatedreal-timefeedbackintotheplaybookfromapproximately150participants,includingrepresentativesfromU.S.federalagencies,theprivatesector,and
internationalgovernmentorganizations.Theseexerciseshighlightedtheneedforenhancedoperationalcollaborationandinformationsharing,ultimatelyshapingthefinalversionoftheplaybook.
Thefollowingpartnerscontributedtothedevelopmentofthisplaybook:
FederalGovernmentPartners
?FederalBureauofInvestigation(FBI)
?NationalSecurityAgency(NSA)ArtificialIntelligenceSecurityCenter(AISC)
1“AboutCISA,”CybersecurityandInfrastructureSecurityAgency,accessedNovember20,2024,
/about.
2“JointCyberDefenseCollaborative,”CybersecurityandInfrastructureSecurityAgency,accessedNovember20,2024,
/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative.
3EntitiesacrosstheU.S.federalgovernment;industry;state,local,tribal,andterritorial(SLTT)entities;andinternational
governmentsintegratedintoJCDCcorefunctions,suchascyberdefenseplanning,operationalcollaboration,andcybersecurityguidanceproduction.Email
cisa.jcdc@
tolearnmoreaboutbecomingaJCDCpartner.
4JCDC.AIisanoperationalcommunitythatincludesU.S.federalgovernmentagencies,privatesectorentities(suchasAIproviders,developers,andadopters),andinternationalgovernmentorganizationsfocusedoncollaborationregardingrisks,threats,
vulnerabilities,andmitigationsconcerningAI-enabledsystems.Tolearnmore,emailjcdc.ai@.
Page4of33
TLP:CLEAR
IndustryPartners
?Anthropic?AWS
?Cisco
?Cranium
?Fortinet
?GitHub
?HiddenLayer?IBM
?IntercontinentalExchange(ICE)
?JPMorganChase
?Microsoft
?NVIDIA
?OpenAI
?PaloAltoNetworks
?ProtectAI
?RobustIntelligence(nowpartofCisco)
?ScaleAI
?StabilityAI
?U.S.Bank
?Zscaler
InternationalPartners
?AustralianSignalsDirectorate’sAustralianCyberSecurityCentre(ASD’sACSC)
?UKNationalCyberSecurityCentre(NCSC)
Page5of33
TLP:CLEAR
QuestionsandFeedback
Thisplaybookwillbeupdatedasneededtoreflectstakeholderfeedback,changesinthethreatlandscape,orshiftsintheoperatingenvironment.Stakeholdersareencouragedtoprovide
feedbackaboutthisplaybookto
CISA.JCDC@
withthesubjectline:“Feedback:AICybersecurityCollaborationPlaybook.”
Disclaimer
AIsafetytopics,suchasriskstohumanlife,health,property,ortheenvironment,areoutsidetheintendedscopeoftheJCDCAICybersecurityCollaborationPlaybook.Stakeholdersshould
addressanyrisksorthreatsinvolvinghumanlife,health,property,ortheenvironmentinatimelyandappropriatemannerinaccordancewiththeirownapplicableprocessorproceduresforsuchevents.Similarly,issuesrelatedtoAIfairnessandethicsarealsooutsidethescopeofthis
playbook.Thisplaybookdoesnotcreatepolicies,imposerequirements,mandateactions,oroverrideexistinglegalorregulatoryobligations.Allactionstakenunderthisplaybookare
voluntary.
Thisdocumentisforinformationalpurposesonlyandisnotintendedtobindthepublicorcreateanyrequirementwithwhichthepublicmustcomply.Theauthoringagenciesdonotendorseanycommercialentity,product,company,orservice,includinganyentities,products,orservices
linkedorreferencedwithinthisdocument.Anyreferencetospecificcommercialentities,
products,processes,orservicesbyservicemark,trademark,manufacturer,orotherwise,doesnotconstituteorimplyendorsement,recommendation,orfavoringbytheauthoringagencies.
Note:Thecyberincidentreportinglandscapeisconstantlyevolving.
5
Thisguideisnotintendedtoprovideacomprehensiveoverviewofallpossiblereportingchannels.Instead,thisguideis
intendedtosupplementanorganization’sexistingcyberincidentresponseresourceswith
potentialillustrativeexamplesofkeyreportingavenuestoconsider.Organizationsshouldconsultwiththeirlegalcounseltoidentifyrelevantstatutory,contractual,regulatory,andotherlegal
reportingrequirementsthatmayapplyatthetimeofthecyberincident.
5FurtherinformationaboutU.S.federalcyberincidentreportingrequirementseitherineffectorproposedacrosstheU.S.federal
governmentasofSeptember2023isincludedatAppendixBoftheDHSReportonHarmonizationofCyberIncidentReportingto
theFederalGovernment,availableat
/publication/harmonization-cyber-incident-reporting-federal-
government.
Page6of33
TLP:CLEAR
Audience
Thisplaybookinformsoperationalcybersecurityprofessionals,includingincidentresponders,
securityanalysts,andothertechnicalstaff,onhowtocollaborateandshareinformationwithCISAandJCDCaboutAI-relatedcybersecurityincidentsandvulnerabilities.
Background
CISA,asAmerica’scyberdefenseagencyandtheNationalCoordinatorforcriticalinfrastructuresecurityandresilience,playsacriticalroleinaddressingAI-specificcybersecuritychallenges.ThroughJCDC.AI,CISAbuildspublic-privatepartnershipstoimproveinformationsharingand
developsplanstofacilitatecoordinatedresponsestocyberthreatstargetingsoftwaresystems,includingAIsystems.AsAIbecomesincreasinglyintegratedintocriticalinfrastructure,
understanding,andaddressingitsdistinctchallengesandcomplexitiesareessentialtobolsteringdefensesagainstmaliciouscyberactors.
AIsystemsintroduceuniquecomplexitiesduetotheirrelianceondata-driven,non-deterministicmodels,makingthemvulnerabletomaliciouscyberactivitysuchasmodelpoisoning,data
manipulation,andadversarialinputs.
6
Thesevulnerabilities,coupledwiththerapidadoptionofAIsystems,demandcomprehensivestrategiesandpublic-privatepartnershiptoaddressevolvingrisks.CISAcollaborateswithJCDCpartnersleveragingsharedknowledgeandcapabilitiesto
confrontmaliciouscyberactorsandstrengthencollectiveresiliency.
Purpose
TheJCDCAICybersecurityCollaborationPlaybookfacilitatesvoluntaryinformationsharingacrosstheAIcommunity,includingAIproviders,developers,andadopters,tostrengthencollectivecyberdefensesagainstemergingthreats.Theplaybookisintendedtofosteroperationalcollaborationamonggovernment,industry,andinternationalpartnersandwillbeperiodicallyupdatedto
ensureadaptabilitytothedynamicthreatlandscapeasAIadoptionaccelerates.
Thisplaybookaimsto:
?GuideJCDCpartnersonhowtovoluntarilyshareinformationrelatedtoincidentsandvulnerabilitiesassociatedwithAIsystems.
?OutlineCISA’sactionsuponreceivingsharedinformation.
6ApostolVassilevetal.,“AdversarialMachineLearning:ATaxonomyandTerminologyofAttacksandMitigations,”NationalInstituteofStandardsandTechnology,January2024,
/nistpubs/ai/NIST.AI.100-2e2023.pdf.
Page7of33
TLP:CLEAR
?Facilitatecollaborationbetweenfederalagencies,privateindustry,internationalpartners,andotherstakeholderstoraiseawarenessofAIcybersecurityrisksandimprovethe
resilienceofAIsystems.
WhilefocusedonstrengtheningcollaborationwithinJCDC,theplaybookdefineskeycategoriesofinformationapplicabletootherinformation-sharingmechanisms(AppendixC)suchasinformationsharingandanalysiscenters(ISACs).CISAencouragesorganizationstoadopttheplaybook’s
guidancetoenhancetheirowninformation-sharingpractices,contributingtoaunifiedapproachtoAI-relatedthreatsacrosscriticalinfrastructure.
KeyDefinitions
TheJCDCAICybersecurityCollaborationPlaybookincorporatesdefinitionsfromkeylegislativeandtechnicalframeworkstoestablishafoundationforaddressingAIcybersecuritychallenges.
?AIsystem:Machine-basedsystemthat,foragivensetofhuman-definedobjectives,makespredictions,recommendations,ordecisionsthatinfluencerealorvirtualenvironments.
TheseAIsystemsusebothmachine-andhuman-basedinputstoperceiveenvironments,abstractthoseperceptionsintomodelsthroughautomatedanalysis,andusemodel
inferencetoprovideoptionsforinformationoraction.
7
?Incident:Theterm‘‘incident’’meansanoccurrencethatactuallyorimminently
jeopardizes,withoutlawfulauthority,theintegrity,confidentiality,oravailabilityof
informationonaninformationsystem,oractuallyorimminentlyjeopardizes,withoutlawfulauthority,aninformationsystem.
8
Withthesedefinitions,CISAdevelopedthisworkingdefinitionforAIcybersecurityincidents:
“Anoccurrencethatactuallyorimminentlyjeopardizes,withoutlawfulauthority,the
confidentiality,integrity,oravailabilityoftheAIsystem,anyothersystemenabledand/orcreatedbytheAIsystem,orinformationstoredonanyofthesesystems.”
Cybersecurityincidentstypicallyresultfromvulnerabilitiesinsoftwareorsystems.Vulnerabilities,definedbytheNationalInstituteofStandardsandTechnology(NIST)as“weaknessesinan
informationsystem,systemsecurityprocedures,internalcontrols,orimplementationthatcould
715U.S.C.9401(3).
8Section2200oftheHomelandSecurityActof2002,asamended(P.L.107-296)(codifiedat6U.S.C.650).
Page8of33
TLP:CLEAR
beexploitedortriggeredbyathreatsource,”
9
arecentraltothecybersecurityofAIsystems.ThisplaybookalsofacilitatesthecoordinateddisclosureofvulnerabilitiesassociatedwithAIsystemsincriticalinfrastructure.
InformationSharing:ProtectionsandMechanisms
BysharinginformationthroughJCDC,companiesbenefitfromenhancedcoordination,
governmentsupport,andgaintheabilitytocollaborateonAIcybersecurityissueswithinatrustedenvironment.JCDCprovidesamechanismforcommunicationonvitalcybersecuritymatters
acrosscriticalinfrastructuresectors,enablingcompaniestodiscussandaddressshared
challengesonAIcybersecurity.JCDC’sconveningcapabilitieshelporganizationsaccessvaluablethreatintelligence,mitigationstrategies,andacollaborativecybersecurityenvironment.
Throughtheinformationshared,JCDCexpeditescoordinatedresponsestocyberthreatsand
helpsgovernmentpartnersgatherinformationnecessarytodeterminewhethernationalincidentresponsemechanismsshouldbeactivated.Additionally,JCDCproducesanddistributesrelevant
cyberthreatintelligence,vulnerabilitymanagementinsights,andmitigationstrategies,empoweringcompaniestobettermanageandneutralizeemergingthreats.
Information-SharingProtections
TheCybersecurityInformationSharingActof2015(CISA2015)(6U.S.C.§§1501-1533)createsprotectionsfornon-federalentitiestosharecyberthreatindicatorsanddefensivemeasuresforacybersecuritypurposeinaccordancewithcertainrequirementswiththegovernmentandprovidesthattheymaydosonotwithstandinganyotherlaw.Suchprotectionsincludethenon-waiverof
privilege,protectionofproprietaryinformation,exemptionfromdisclosureundertheFreedomofInformationAct(FOIA),prohibitiononuseinregulatoryenforcement,andmore.
10
CISA2015alsorequiresDHStooperateacapabilityandprocessforsharingcyberthreatindicatorswithboththefederalgovernmentandprivatesectorentitiesandprovidesforliabilityprotectionforinformationsharedthroughthisprocess.Thestatutealsocreatesprotectionsforcyberthreatindicatorsanddefensivemeasuressharedinaccordancewiththestatutoryrequirementswithstate,local,tribal,andterritorial(SLTT)entities,includingthattheinformationshallbeexemptfromdisclosure
underSLTTfreedomofinformationlaws.CISA2015doesnotcoverinformationsharedthatisnotacyberthreatindicatorordefensivemeasure,asdefinedbythelaw.AI-relatedinformationis
9JointTaskForce,“SecurityandPrivacyControlsforInformationSystemsandOrganizations.NISTSpecialPublication800-53r5,”NationalInstituteofStandardsandTechnology,September2020,
/10.6028/NIST.SP.800-53r5.
ThisdefinitionisusedacrossmanyotherNISTdocuments;seethe
vulnerabilityentryintheComputerSecurityResourceCenterGlossary.
10IntheeventthatCISAreceivesaFreedomofInformationAct(FOIA)requestforinformationthatisnotcoveredunderCISA2015,CISAwillnotdiscloseanyinformationthatmaybewithheldfromdisclosureunderFOIA’sexemptions.
Page9of33
TLP:CLEAR
coveredundertheActtotheextenttheinformationqualifiesasacyberthreatindicatoror
defensivemeasure.Theseaspectsarefurtherdetailedinmultipleguidancedocuments,
especiallytheDHS-DOJ
GuidancetoAssistNon-FederalEntitiestoShareCyberThreatIndicators
andDefensiveMeasureswithFederalEntitiesundertheCybersecurityInformationSharingActof
2015.
Information-SharingMechanisms
CISAhasestablishedprocessestomanageandsafeguarddatasharedbyJCDCpartners.
InformationSharingWithinJCDC
CISAleveragestheTrafficLightProtocol(TLP)
11
asitsprimarydisseminationcontrolmarkingsystem.AlldatasharedwithinJCDCviaemailshouldbeclearlymarkedwiththerelevantTLPdesignation.Similarly,otherstakeholderscanshareinformationwithJCDCviaemailat
CISA.JCDC@
followingtheTLPmarkingsystem.SomeTLPdesignationsrequire
obtainingpermissionfromthesourcebeforedisseminatingoutsideone’sorganization.All
organizationsshouldseekappropriatepermissionsbeforesharing.Additionalguidanceonthe
typesofinformationthatarevaluabletosharewithJCDCisprovidedinthe
ProactiveInformation
Sharing
and
InformationSharingRegardingandIncidentorVulnerability
sectionsbelow.
Attimes,JCDCpartnersmaywishtoshareinformationwithoutattribution.Insuchcircumstances,thesepartnerscansharedirectlywithCISA,forCISAtoshareonwardswithoutattribution.
Partnersshouldprovidedetailedinstructionsonhowtheirinformationshouldbehandledand
specifyanyrestrictionsonitsusewhensharingitwithCISA,asoutlinedin
Checklist1.
Withthesesafeguardsandprotocols,CISAfostersasecureenvironmentforsharingcriticalcybersecurity
informationwithinJCDC,encouragingactiveparticipation,andsafeguardingsensitivedata.
AppendixA
providesapopulatedexampleofChecklist1.
Checklist1:Information-HandlingRestrictionsandContext
ChecklistforInformationHandlingRestrictions
Expectedfeedbackrequested
oIncludespecificquestionsforCISA.
oProvideexpectationsaboutfeedback(i.e.,foractionorforawarenessonly).
oAreyousharinginformationorsubmittingarequestforinformation(RFI)?
11“TrafficLightProtocol(TLP)DefinitionsandUsage,”
/news-events/news/traffic-light-protocol-tlp-definitions-
and-usage.
Page10of33
TLP:CLEAR
ChecklistforInformationHandlingRestrictions
TLPmarkingandcaveats
oIncludeTLPmarking.
oMayCISA/JCDCsharewithotherindustrypartners,otherU.S.federalgovernmentpartners,and/orinternationalpartners?
oAreyourequestingunattributedsharing?
oDetailanycaveatstosharingwithotherpartners(i.e.,industry,international,and/orU.S.federalgovernment).
NewlyIdentifiedVulnerabilityCoordination
Toreportnewlyidentifiedcybersecurityvulnerabilitiesinproductsandservices,JCDCpartners
shoulduseCISA’scoordinatedvulnerabilitydisclosureprocess.Partnerscansecurelysubmitthevulnerabilitythroughthe
“ReportaVulnerability”
linkon
CISA’sCoordinatedVulnerability
Disclosurepage.
JCDCpartnerswhohavequestionsorconcernsrelatedtothisprocessare
encouragedtocontactaJCDCrepresentative.TherepresentativecanconnectpartnerswithCISAVulnerabilityManagementstaff.
Othervulnerabilitycoordinationbestpracticestoconsider:
?Establishandoperateavulnerabilitydisclosurepolicy(VDP)sosecurityresearchersandotherscanunderstandwhattypesoftestingareauthorizedforwhichsystemsandwheretosendvulnerabilityreports.See
BindingOperationalDirective20-01
foranexampleofaVDPthatCISAsharedwithfederalagencies.JCDCpartnersshouldmodifythetemplateVDPasappropriate.
?IfavulnerabilityisfoundinasystemoperatedbyaJCDCpartner,entitiesshouldfollowthatpartner’sVDPtoreporttheissueaccordingtotheirspecificguidelines.
?IfaJCDCpartnernoticesavulnerabilityinadeployedfederalgovernmentsystem,notify
thesystemownerasrequestedintheirVDP.Asalastresort,theseissuesmaybereportedtoCISAthroughthe
CarnegieMellonUniversitySoftwareEngineeringInstitute(SEI)CERT
CoordinationCenter.
IncidentReporting
Toreportanincident,JCDCpartnersshoulduse
CISA’sVoluntaryCyberIncidentReporting
portal.ReportingentitiesshoulddescribeanyAI-relatedaspectsoftheincidentintheexplanatorytextboxesprovidedintheform.
Page11of33
TLP:CLEAR
ProactiveInformationSharing
JCDCstronglyencouragespartnerstoproactivelyshareactionableinformationasearlyas
possibleforanAIcybersecurityincidentorvulnerability.GiventhecomplexityofAIsystemsandthechallengesinidentifyingsecurityissuesandtheirrootcauses,JCDCpartnersshould
consistentlyandproactivelysharekeyinformationonmaliciousactivity,trends,pre-release
publications,andassessments.Ongoinginformationsharingallowsallpartnerstomaintain
situationalawarenessoftheevolvinglandscape,enablingtheearlydetection,identification,andremediationofcriticalthreats.Byfosteringawell-informedandcollaborativecyberdefense
network,JCDCstrengthenstheprotectionandresilienceofAIsystemsacrossallcriticalinfrastructuresectors.
Proactiveinformation-sharingcategoriesasoutlinedin
Table1
helpCISAandJCDCpartners
evaluaterelevantinformationthathasbeenobserved,understandthecomplexityoftheoperatingenvironment,andmakeinformeddecisionsaboutpotentialdefensiveactions.Seealso
AppendixB
foranexampleofanincidentwherepartnerswouldbeencouragedtoshareinformationproactively.
Table1:ProactiveInformationCategories
ProactiveInformationCategories
Ifsharing
Thenprovidedetailsabout
Observedmaliciousactivitytargeting
JCDCpartnerorothers
Attemptedintrusionsorattacks.
Malwareartifacts.
Claimsmadebymaliciousactorsrelatedtotargeting,plannedattacks.
Maliciousactorindicatorsofcompromise(IOCs)and
tactics,techniques,andprocedures(TTPs)discovered
throughthreatintelligence,observedactivity/targeting,orothermeans.
Otherobservablesand/orevidencerelatedtomaliciousactivity.
Page12of33
TLP:CLEAR
ProactiveInformationCategories
Suspiciousbehavior
Activitythatappearspotentiallymaliciousbutmaynotbeconfirmedasmalicious.Forexample,anIPaddressthatisobservedconductingabnormalactivitythatcannotbe
explained,evenafterinternalreviews.
JCDCpartner
priorities(tellCISAwhatyoucare
about)
Maliciousactorsthatarebeingtrackedclosely.
Incidentsofconcern.
Threatactivityofconcern(i.e.,aspecificthreatactoridentifiedthroughknowntargetingofAIinfrastructure).
Incidentandvulnerabilitytrends(i.e.,commonlytargeteddigitaltrends,numberofincidentshandledin-house).
Threatassessments
Yearlyreviewsandretrospectives.
Threatactorprofiles.
System
configurationinformation
Softwarebillsofmaterials(SBOM)foryourorganization’srespectiveproducts.
Blogsandpublications
RelatedtoAIcybersecurityissuesandconcerns.
RelatedtoorincludingmaliciousactivityorthreatactorIOCs/TTPs.
Relatedtoknownincidentsorvulnerabilities.
★Newbestsecuritypracticesand
lessonslearned
Publishedguidance,bestpractices,post-mortems,andlessonslearnedbyaJCDCpartneronAIcybersecurityissues.
InformationSharingRegardinganIncidentorVulnerability
JCDCpartnersshouldconsult
Checklist2
tovoluntarilyshareinformationregardinganAI
cybersecurityincidentorvulnerability.OtherstakeholderscansharevoluntaryinformationwithJCDCviaemailat
CISA.JCDC@.
Thischecklisthelpshighlightactionabledatato
streamlinethesharingprocessamongstJCDCandpartners.
AppendixA
providesapopulatedexampleofChecklist2.WhileJCDCencouragespartnerstofollowthechecklist,itwelcomesanyrelevantsharedinformation,evenifnotallchecklistpointsaremet.
Page13of33
TLP:CLEAR
Additionally,usingthewebformto
voluntarilyreportanincident
ora
vulnerabilityinaproductor
service
isagoodwaytoprovideallrelevantinformationtoCISAviaanencryptedchannel.Ifusingthewebform,JCDCpartnersshouldnotifyaJCDCrepresentativeviaemail.
Checklist2:VoluntaryInformationSharing
ChecklistforVoluntaryInformationSharing
Descriptionoftheincidentor
vulnerability
oIsthisinformationrelatedtoanincident,anattemptedattack,scanningactivity,orsuspiciousactivity?
oIsthisinformationrelatedtoavulnerability?Includethe
CommonVulnerabilitiesandExposures(CVE)assignment,ifavailable.
oWasthisinformationobtaineddirectlyorindirectly(viaanotherorganization)?
oWasthisinformationobtainedfromaprivilegedornon-publicsource?
oWhatistheconfidencelevelofthisinformation?Isthis
informationconfirmedtoberelatedtomaliciousactivityorisitunconfirmed(i.e.,suspiciousactivity)?
Howtheincidentorvulnerability
wasfirstdetected
oInitialaccessvector.
oDetectionmethod(e.g.,STIXindicators).
oIOCs.
oIndicatorsofattack.
oSampleattackinformationorscreenshots.
oIP(InternetProtocol)addresses,domains,andhashes.
oTimestampstoincludedates/timesrelatedtowhentheinformationwasactiveorobserved.
oWhataretheIOCsbeingusedfor(e.g.,initialaccess,commandandcontrol[C2]infrastructure)?
Page14of33
TLP:CLEAR
ChecklistforVoluntaryInformationSharing
Systemandnetwork
vulnerabilities
oKnownandpreviouslydisclosedvulnerabilitiesbeingmaliciouslyexploitedinthewild.
oVulnerabilitiesofcriticalconcern(fromaJCDCpartner’sperspective),evenifexploitationevidencehasnotbeenfoundyet.
oPubliclyknownproofsofconceptinopen-sourceplatforms(i.e.,newsreporting,socialmedia).
oNote:Duetosensitivityconcerns,non-publicorlesser-knownproofsofconceptshouldbesharedwithCISAthroughthe
“ReportaVulnerability”linkon
CISA’sCoordinated
VulnerabilityDisclosureProcesspage,
whichincludesa
sectiontoreportexploitationinformation.Seealsothe
“NewlyIdentifiedVulnerabilityCoordination”
section.
AffectedAI
artifact(s)andsystems
oAnyknownmodelinformationaboutthetrainingdataset:
modelname,modelversion,modeltask,modelarchitecture,modelsource(authororlocation),andlifecyclephase.
oAnyknowninformationabouttheAImodeldeveloper.
oAnyagentic,copilot,orthird-partyplatformsinuse.
oAnyknowninformationaboutApplicationProgrammingInterface(API)andlibraries.
oSoftware/hardwareconfigurationandaccessspecifictotheAImodel.
oThesoftwareunderpinningtheaffectedsystem(s).
oAIapplicationinformation(i.e.,authorinformation,AIapplicationaccesses).
Page15of33
TLP:CLEAR
ChecklistforVoluntaryInformationSharing
Affectedusersorvictims
oIfknown,specificortype(i.e.,sector)ofvictimstargetedbasedonJCDCpartner’sinteractionsand/orcampaignattribut
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年中國汽車熱系統(tǒng)行業(yè)市場調(diào)查研究及投資戰(zhàn)略研究報告
- 2025年度企業(yè)并購合同解除及資產(chǎn)清算協(xié)議
- 2025年度人合伙經(jīng)營管理農(nóng)業(yè)項目合作協(xié)議書
- 2025年中國大拉簧行業(yè)市場發(fā)展前景及發(fā)展趨勢與投資戰(zhàn)略研究報告
- 2025年度個人養(yǎng)老產(chǎn)業(yè)投資合作協(xié)議
- 消費者信任在網(wǎng)絡(luò)直播帶貨中的作用研究
- 2024年職業(yè)教育行業(yè)市場前景預(yù)測及投資方向研究報告
- 樂器行改造合同模版
- 2025年度房產(chǎn)抵押權(quán)抵押權(quán)合同
- 民宿裝飾工程合同樣本
- 心靈手巧織美好-精美掛件我會編 (教案)-二年級下冊勞動浙教版
- IPO項目律師盡職調(diào)查查驗計劃表模版
- 醫(yī)院信息系統(tǒng)HIS知識培訓教學課件-HIS的主要內(nèi)容
- 經(jīng)濟法通論債權(quán)法總論
- 合成聚氨酯原料及助劑生產(chǎn)項目
- 鼻部整形隆鼻術(shù)精選PPT
- 微信個人簡歷
- 軟件測試jmeter中英文對照
- 反假貨幣培訓考試題庫-相關(guān)法律法規(guī)及規(guī)范性文件知識考題
- 鉆井安全操作規(guī)程中英文
- 體育《網(wǎng)球正手擊球》教學PPT
評論
0/150
提交評論