1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
6.1 Types of threat information on connected vehicles
6.2 Benefits and challenges of sharing threat information on
connected vehicles
7 Principles of sharing threat information on connected vehicles
7.1 Mutual benefit
7.2 Categorization and classification
7.3 Data security
8 Organization, role and partnership
8.1 Organizations and their roles
8.2 Sharing scopes among organizations
8.3 Information sharing rules among organizations
8.4 Establishing a sharing community
9 Procedures and guidance for sharing threat information on connected
vehicles
9.1 Introduction
9.2 Procedures of threat information sharing activities
9.3 Guidance during phases in the procedure
Appendix I – Best practice of Auto-ISAC's threat information sharing
activities
Appendix II – Methodology for evaluating the value of threat information
Bibliography