Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Overview   
        6.1     Types of threat information on connected vehicles      
        6.2     Benefits and challenges of sharing threat information on connected vehicles   
 7     Principles of sharing threat information on connected vehicles          
        7.1     Mutual benefit            
        7.2     Categorization and classification          
        7.3     Data security 
 8     Organization, role and partnership  
        8.1     Organizations and their roles 
        8.2     Sharing scopes among organizations  
        8.3     Information sharing rules among organizations             
        8.4     Establishing a sharing community        
 9     Procedures and guidance for sharing threat information on connected vehicles         
        9.1     Introduction  
        9.2     Procedures of threat information sharing activities      
        9.3     Guidance during phases in the procedure        
Appendix I – Best practice of Auto-ISAC's threat information sharing activities    
Appendix II – Methodology for evaluating the value of threat information    
Bibliography