Use cases for structured threat information expression |
 |
Recommendation ITU-T X.1215 provides various use cases for how the structured threat information expression (STIX) language may be used to support cyber threat intelligence (CTI) and information sharing.
This Recommendation also describes concepts and functionality of the STIX language. It is targeted to support a range of use cases involved in cyber threat management, including analysing cyber threats, specifying indicator patterns for cyber threats, managing response activities and sharing cyber threat information. With this kind of information, a security decision can be made on how to best defend against the threat. It is intended to support both more effective analysis and the continued exchange of cyber threat information. The STIX suite of specifications [b-STIX2.0] is maintained under the responsibility of the Organization for the Advancement of Structured Information Standards (OASIS).
|
|
Citation: |
https://handle.itu.int/11.1002/1000/13849 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1200-X.1229: Cybersecurity |
Approval date: |
2019-01-30 |
Provisional name: | X.ucstix |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1215 (01/2019)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|