1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
7 Capabilities scenarios
7.1 General scenario
7.2 Operational policies
7.3 Regional policies
7.4 Exchange format
7.5 Privacy protection
7.6 Access granularity
7.7 Source verification
7.8 Multichannel distribution
7.9 Backwards compatibility
8 Capabilities
8.1 Format/encoding capabilities
8.2 Transfer/exchange capabilities
8.3 Security capabilities
8.4 Policy capabilities
8.5 Vendor neutrality capabilities
9 Applicability of capabilities
9.1 Format/encoding capabilities
9.2 Transfer/exchange capabilities
9.3 Security capabilities
9.4 Policy capabilities
9.5 Vendor neutrality capabilities
Appendix I – Introduction to cybersecurity information sharing and exchange
Appendix II – Related activities
II.1 Common security information
II.2 Novel security information
II.3 Related activities to share security information
Appendix III – Related activities
Bibliography