Cyber-attacks continue to increase in frequency and sophistication, presenting significant challenges for organizations that must defend their data and systems from capable threat actors. These actors range from individual, autonomous attackers to well-resourced groups operating in a coordinated manner as part of a criminal enterprise or on behalf of a nation-state. Threat actors can be persistent, motivated and agile, and they use a variety of tactics, techniques, and procedures (TTPs) to compromise systems, disrupt services, commit financial fraud, and expose or steal intellectual property and other sensitive information. Given the risks these threats present, it is increasingly important that organizations share cyber-threat information, and use the community’s experience to improve their security posture. Cyber-threat information is any information that can help an organization to identify, assess, monitor, and respond to cyber-threats. Examples of cyber-threat information include indicators (system artifacts or observables associated with an attack), TTPs, security alerts, threat intelligence reports, and recommended security tool configurations. Most organizations already produce multiple types of cyber-threat information that are available to share internally as part of their information technology and security operations efforts. By exchanging cyber-threat information within a sharing community, organizations can leverage the collective knowledge, experience and capabilities of that sharing community to gain a more complete understanding of the threats the organization may face. Using this knowledge, an organization can make threat-informed decisions regarding defensive capabilities, threat detection techniques and mitigation strategies. By correlating and analyzing cyber-threat information from multiple sources, an organization can also enrich existing information and make it more actionable. This enrichment may be achieved by independently confirming the observations of other community members, and by improving the overall quality of the threat information through the reduction of ambiguity and errors. Organizations that receive threat information and subsequently use this information to remediate a threat confer a degree of protection to other organizations by impeding the threat’s ability to spread. Additionally, sharing of cyber-threat information allows organizations to better detect campaigns that target industry sectors, business entities, or institutions. NIST has published Special Publication (SP) 800-150, Guide to Cyber-Threat Information Sharing, to assist organizations in establishing and participating in cyber-threat information sharing relationships. The publication describes the benefits and challenges of sharing, clarifies the importance of trust, and introduces specific data handling considerations. To show how sharing and coordination can increase the efficiency and effectiveness of an organization’s cybersecurity capabilities, NIST SP 800-150 presents some scenarios that describe threat information sharing in real-world applications. The goal of the new publication is to provide guidelines that improve cybersecurity operations and risk management activities through safe and effective information sharing practices, and help organizations to plan, implement, and maintain information sharing. Basics of Cyber-threat information sharing NIST SP 800-150 introduces basic cyber-threat information sharing concepts including types of cyber-threat information and common terminology. The publication also examines potential uses for shared cyber-threat information and explores the benefits and challenges of threat information sharing. Threat information is any information related to a threat that might help an organization protect itself against a threat or detect the activities of an actor. Major types of threat information include the following: Indicators are technical artifacts or observables that suggest an attack is imminent or is currently underway or that a compromise may have already occurred. Tactics, techniques, and procedures (TTPs) describe the behavior of an actor. Security alerts, also known as advisories, bulletins, and vulnerability notes, are brief, usually human-readable, technical notifications regarding current vulnerabilities, exploits, and other security issues. Threat intelligence reports are generally prose documents that describe TTPs, actors, types of systems and information being targeted, and other threat-related information that provides greater situational awareness to an organization. Threat intelligence is the threat information that has been aggregated, transformed, analyzed, interpreted, or enriched to provide the necessary context for decision-making processes. Tool configurations are recommendations for setting up and using tools that support the automated collection, exchange, processing, analysis, and use of threat information. The primary goal of the publication is to foster similar threat information sharing practices across organizational boundaries – both acquiring threat information from other organizations, and providing internally-generated threat information to other organizations. Threat information sharing provides access to threat information that might otherwise be unavailable to an organization. Using shared resources, organizations can enhance their security posture by leveraging the knowledge, experience, and capabilities of their partners in a proactive way. Allowing ‘one organization’s detection to become another’s prevention’ is a powerful paradigm that can advance the overall security of organizations that actively share threat information. Organizations that share cyber-threat information will benefit by gaining situational awareness, which will, in turn, help to improve security posture and risk management practices. As seemingly unrelated observations are shared and analyzed, those can be correlated with data collected by others, helping to mature community knowledge. This improved community understanding helps organizations remain better informed about changing TTPs and how to rapidly detect and respond to threats. Such agility creates economies of scale for network defenders while increasing actors’ costs by forcing them to develop new TTPs. While sharing threat information clearly has benefits, certain challenges remain. Some challenges that apply both to consuming and to producing threat information are: Establishing trust; Achieving interoperability and automation; Safeguarding sensitive information; Protecting classified information; and Enabling information consumption and publication. NIST SP 800-150 identifies several information challenges that apply only to the consuming of threat information and other challenges that apply only if an organization wants to provide its own information to other organizations. Establishing sharing relationships NIST SP 800-150 recommends the following planning and preparation activities in relation to launching a threat information sharing capability: Define the goals and objectives of information sharing; Identify internal sources of threat information; Define the scope of information sharing activities; Establish information sharing rules; Join a sharing community; and Plan to provide ongoing support for information sharing activities. Throughout this process, organizations are encouraged to consult with subject matter experts both inside and outside their organization. Such sources include: Experienced cybersecurity personnel; Members…