CONTENTS

 1     Scope         
 2     References
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation         
 4     Abbreviations and acronyms           
 5     Conventions           
 6     Introduction           
 7     Capabilities scenarios         
        7.1     General scenario       
        7.2     Operational policies  
        7.3     Regional policies        
        7.4     Exchange format       
        7.5     Privacy protection     
        7.6     Access granularity     
        7.7     Source verification    
        7.8     Multichannel distribution      
        7.9     Backwards compatibility        
 8     Capabilities             
        8.1     Format/encoding capabilities
        8.2     Transfer/exchange capabilities           
        8.3     Security capabilities  
        8.4     Policy capabilities      
        8.5     Vendor neutrality capabilities             
 9     Applicability of capabilities
        9.1     Format/encoding capabilities
        9.2     Transfer/exchange capabilities           
        9.3     Security capabilities  
        9.4     Policy capabilities      
        9.5     Vendor neutrality capabilities             
Appendix I – Introduction to cybersecurity information sharing and exchange    
Appendix II – Related activities    
       II.1     Common security information             
       II.2     Novel security information     
       II.3     Related activities to share security information            
Appendix III – Related activities    
Bibliography