CISA AI Playbook
CISA AI Playbook
JCDC AI Cybersecurity
Collaboration Playbook
Joint Cyber Defense Collaborative
Cybersecurity and Infrastructure Security Agency
This document is marked TLP: CLEAR: Disclosure is not limited. For more information on the Traffic Light Protocol,
see https://www.cisa.gov/tlp.
TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Table of Contents
Acknowledgements .................................................................................................................................3
Questions and Feedback ........................................................................................................................5
Disclaimer ................................................................................................................................................5
Audience ..................................................................................................................................................6
Background ..............................................................................................................................................6
Purpose ....................................................................................................................................................6
Key Definitions .........................................................................................................................................7
Information Sharing: Protections and Mechanisms..............................................................................8
Information-Sharing Protections.............................................................................................................8
Information-Sharing Mechanisms ..........................................................................................................9
Information Sharing Within JCDC ...................................................................................................9
Newly Identified Vulnerability Coordination ................................................................................ 10
Incident Reporting ........................................................................................................................ 10
Proactive Information Sharing ............................................................................................................. 11
Information Sharing Regarding an Incident or Vulnerability.............................................................. 12
CISA’s Information Analysis and Operational Use .............................................................................. 17
Enhanced Coordination........................................................................................................................ 18
Call to Action ......................................................................................................................................... 19
Appendix A: Populated Example of Checklists for Information Handling Restrictions and Voluntary
Information Sharing.............................................................................................................................. 21
Appendix B: Case Studies for Proactive Information Sharing and Enhanced Coordination............ 26
Proactive Information Sharing Example: Clearview AI Misconfiguration Case Study .............. 26
Enhanced Coordination Example: Compromised PyTorch Dependency Chain ........................ 27
Appendix C: Additional Avenues for Voluntary Information Sharing ................................................. 29
Appendix D: Additional Resources ...................................................................................................... 32
Page 2 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Acknowledgements
The Cybersecurity and Infrastructure Security Agency (CISA) 1 led the development of the Artificial
Intelligence (AI) Cybersecurity Collaboration playbook in collaboration with federal, international,
and private sector partners through the Joint Cyber Defense Collaborative (JCDC). 2 JCDC is a
public-private collaborative within CISA that leverages authorities granted by Congress in the
2021 National Defense Authorization Act (NDAA) to unite the global cyber community in defense
of cyberspace. The JCDC logo on this document signifies the contributions to this playbook made
by JCDC partners 3, particularly JCDC.AI partners 4, in collaboration with CISA. JCDC partners are
listed below.
The JCDC AI Cybersecurity Collaboration Playbook was developed as a direct result of two tabletop
exercises (TTXs) held in 2024, which brought together federal, industry, and international
partners. The first TTX, hosted in June 2024 at Microsoft in Reston, Virginia, laid the groundwork
by addressing the unique challenges posed by artificial intelligence (AI) cybersecurity incidents.
This foundational exercise informed the early stages of the playbook’s development. The second
TTX, hosted in September 2024 at Scale AI’s headquarters in San Francisco, California, helped
participants further refine the playbook by simulating an AI cybersecurity incident in the financial
services sector. CISA incorporated real-time feedback into the playbook from approximately 150
participants, including representatives from U.S. federal agencies, the private sector, and
international government organizations. These exercises highlighted the need for enhanced
operational collaboration and information sharing, ultimately shaping the final version of the
playbook.
The following partners contributed to the development of this playbook:
Federal Government Partners
• Federal Bureau of Investigation (FBI)
• National Security Agency (NSA) Artificial Intelligence Security Center (AISC)
1 “About CISA,” Cybersecurity and Infrastructure Security Agency, accessed November 20, 2024, https://www.cisa.gov/about.
2 “Joint Cyber Defense Collaborative,” Cybersecurity and Infrastructure Security Agency, accessed November 20, 2024,
https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative.
3
Entities across the U.S. federal government; industry; state, local, tribal, and territorial (SLTT) entities; and international
governments integrated into JCDC core functions, such as cyber defense planning, operational collaboration, and cybersecurity
guidance production. Email [email protected] to learn more about becoming a JCDC partner.
4 JCDC.AI is an operational community that includes U.S. federal government agencies, private sector entities (such as AI providers,
developers, and adopters), and international government organizations focused on collaboration regarding risks, threats,
vulnerabilities, and mitigations concerning AI-enabled systems. To learn more, email [email protected].
Page 3 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Industry Partners
• Anthropic
• AWS
• Cisco
• Cranium
• Fortinet
• GitHub
• Google
• HiddenLayer
• IBM
• Intercontinental Exchange (ICE)
• JPMorgan Chase
• Microsoft
• NVIDIA
• OpenAI
• Palo Alto Networks
• Protect AI
• Robust Intelligence (now part of Cisco)
• Scale AI
• Stability AI
• U.S. Bank
• Zscaler
International Partners
• Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
• UK National Cyber Security Centre (NCSC)
Page 4 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Disclaimer
AI safety topics, such as risks to human life, health, property, or the environment, are outside the
intended scope of the JCDC AI Cybersecurity Collaboration Playbook. Stakeholders should
address any risks or threats involving human life, health, property, or the environment in a timely
and appropriate manner in accordance with their own applicable process or procedures for such
events. Similarly, issues related to AI fairness and ethics are also outside the scope of this
playbook. This playbook does not create policies, impose requirements, mandate actions, or
override existing legal or regulatory obligations. All actions taken under this playbook are
voluntary.
This document is for informational purposes only and is not intended to bind the public or create
any requirement with which the public must comply. The authoring agencies do not endorse any
commercial entity, product, company, or service, including any entities, products, or services
linked or referenced within this document. Any reference to specific commercial entities,
products, processes, or services by service mark, trademark, manufacturer, or otherwise, does
not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.
Note: The cyber incident reporting landscape is constantly evolving. 5 This guide is not intended to
provide a comprehensive overview of all possible reporting channels. Instead, this guide is
intended to supplement an organization’s existing cyber incident response resources with
potential illustrative examples of key reporting avenues to consider. Organizations should consult
with their legal counsel to identify relevant statutory, contractual, regulatory, and other legal
reporting requirements that may apply at the time of the cyber incident.
5 Further information about U.S. federal cyber incident reporting requirements either in effect or proposed across the U.S. federal
government as of September 2023 is included at Appendix B of the DHS Report on Harmonization of Cyber Incident Reporting to
the Federal Government, available at https://www.dhs.gov/publication/harmonization-cyber-incident-reporting-federal-
government.
Page 5 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Audience
This playbook informs operational cybersecurity professionals, including incident responders,
security analysts, and other technical staff, on how to collaborate and share information with CISA
and JCDC about AI-related cybersecurity incidents and vulnerabilities.
Background
CISA, as America’s cyber defense agency and the National Coordinator for critical infrastructure
security and resilience, plays a critical role in addressing AI-specific cybersecurity challenges.
Through JCDC.AI, CISA builds public-private partnerships to improve information sharing and
develops plans to facilitate coordinated responses to cyber threats targeting software systems,
including AI systems. As AI becomes increasingly integrated into critical infrastructure,
understanding, and addressing its distinct challenges and complexities are essential to bolstering
defenses against malicious cyber actors.
AI systems introduce unique complexities due to their reliance on data-driven, non-deterministic
models, making them vulnerable to malicious cyber activity such as model poisoning, data
manipulation, and adversarial inputs. 6 These vulnerabilities, coupled with the rapid adoption of AI
systems, demand comprehensive strategies and public-private partnership to address evolving
risks. CISA collaborates with JCDC partners leveraging shared knowledge and capabilities to
confront malicious cyber actors and strengthen collective resiliency.
Purpose
The JCDC AI Cybersecurity Collaboration Playbook facilitates voluntary information sharing across
the AI community, including AI providers, developers, and adopters, to strengthen collective cyber
defenses against emerging threats. The playbook is intended to foster operational collaboration
among government, industry, and international partners and will be periodically updated to
ensure adaptability to the dynamic threat landscape as AI adoption accelerates.
This playbook aims to:
• Guide JCDC partners on how to voluntarily share information related to incidents and
vulnerabilities associated with AI systems.
• Outline CISA’s actions upon receiving shared information.
6 Apostol Vassilev et al., “Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations,” National
Page 6 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Key Definitions
The JCDC AI Cybersecurity Collaboration Playbook incorporates definitions from key legislative and
technical frameworks to establish a foundation for addressing AI cybersecurity challenges.
• AI system: Machine-based system that, for a given set of human-defined objectives, makes
predictions, recommendations, or decisions that influence real or virtual environments.
These AI systems use both machine- and human-based inputs to perceive environments,
abstract those perceptions into models through automated analysis, and use model
inference to provide options for information or action. 7
• Incident: The term ‘‘incident’’ means an occurrence that actually or imminently
jeopardizes, without lawful authority, the integrity, confidentiality, or availability of
information on an information system, or actually or imminently jeopardizes, without lawful
authority, an information system. 8
With these definitions, CISA developed this working definition for AI cybersecurity incidents:
“An occurrence that actually or imminently jeopardizes, without lawful authority, the
confidentiality, integrity, or availability of the AI system, any other system enabled and/or
created by the AI system, or information stored on any of these systems.”
7 15 U.S.C. 9401(3).
8 Section 2200 of the Homeland Security Act of 2002, as amended (P.L. 107- 296) (codified at 6 U.S.C. 650).
Page 7 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
be exploited or triggered by a threat source,” 9 are central to the cybersecurity of AI systems. This
playbook also facilitates the coordinated disclosure of vulnerabilities associated with AI systems
in critical infrastructure.
Information-Sharing Protections
The Cybersecurity Information Sharing Act of 2015 (CISA 2015) (6 U.S.C. §§ 1501-1533) creates
protections for non-federal entities to share cyber threat indicators and defensive measures for a
cybersecurity purpose in accordance with certain requirements with the government and provides
that they may do so notwithstanding any other law. Such protections include the non-waiver of
privilege, protection of proprietary information, exemption from disclosure under the Freedom of
Information Act (FOIA), prohibition on use in regulatory enforcement, and more. 10 CISA 2015 also
requires DHS to operate a capability and process for sharing cyber threat indicators with both the
federal government and private sector entities and provides for liability protection for information
shared through this process. The statute also creates protections for cyber threat indicators and
defensive measures shared in accordance with the statutory requirements with state, local, tribal,
and territorial (SLTT) entities, including that the information shall be exempt from disclosure
under SLTT freedom of information laws. CISA 2015 does not cover information shared that is not
a cyber threat indicator or defensive measure, as defined by the law. AI-related information is
9 Joint Task Force, “Security and Privacy Controls for Information Systems and Organizations. NIST Special Publication 800-53r5,”
National Institute of Standards and Technology, September 2020, https://doi.org/10.6028/NIST.SP.800-53r5. This definition is
used across many other NIST documents; see the vulnerability entry in the Computer Security Resource Center Glossary.
10 In the event that CISA receives a Freedom of Information Act (FOIA) request for information that is not covered under CISA 2015,
CISA will not disclose any information that may be withheld from disclosure under FOIA’s exemptions.
Page 8 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
covered under the Act to the extent the information qualifies as a cyber threat indicator or
defensive measure. These aspects are further detailed in multiple guidance documents,
especially the DHS-DOJ Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators
and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of
2015.
Information-Sharing Mechanisms
CISA has established processes to manage and safeguard data shared by JCDC partners.
Page 9 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Incident Reporting
To report an incident, JCDC partners should use CISA’s Voluntary Cyber Incident Reporting portal.
Reporting entities should describe any AI-related aspects of the incident in the explanatory text
boxes provided in the form.
Page 10 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 11 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Suspicious behavior Activity that appears potentially malicious but may not be
confirmed as malicious. For example, an IP address that is
observed conducting abnormal activity that cannot be
explained, even after internal reviews.
Page 12 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Additionally, using the web form to voluntarily report an incident or a vulnerability in a product or
service is a good way to provide all relevant information to CISA via an encrypted channel. If using
the web form, JCDC partners should notify a JCDC representative via email.
Checklist 2: Voluntary Information Sharing
Page 13 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 14 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 15 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 16 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 17 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Enhanced Coordination
Triage Further
Collaboration Collaboration
Channels
Analysis Enrichment
Analytic
Exchanges
Dotted Line = As Needed Process Flow
Page 18 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
• Expose and disrupt adversary tactics and infrastructure: Expose and potentially mitigate
risks from tactics, techniques, and infrastructure used by adversaries through public
cybersecurity advisories, TLP: CLEAR or TLP: GREEN reporting, or small group sharing.
• Coordinate on strategies to address malicious infrastructure: Collaborate with relevant
partners to identify adversary-controlled infrastructure used in cyberattacks and develop
effective mitigation strategies.
• Identify and notify victim entities: Identify organizations impacted or potentially impacted
by cyber incidents and promptly alert them, allowing for swift protective measures.
• Share detection capabilities: Provide JCDC partners strategies to improve their ability to
identify and mitigate cyber threats within their own networks.
• Produce and distribute relevant threat intelligence products: Create actionable products,
such as threat advisories and intelligence reports, which include analysis, mitigation
recommendations, and updates on the current threat landscape.
• Offer proactive services and engagements: Engage partners proactively, offering tailored
recommendations, vulnerability management strategies, and best practices to strengthen
their defenses before incidents occur.
• Assess evolving threats with responsive engagements: Facilitate real-time responsive
engagements, such as calls and coordination meetings, to help partners better understand
the threat environment and determine the appropriate next steps. This helps ensure
partners know what actions to expect and how to respond effectively.
As part of enhanced coordination, JCDC works closely with federal government partners to provide
a unified response to major AI cybersecurity issues. This collaboration allows for the alignment of
federal government capabilities, ensuring that all available resources and expertise are
considered when addressing significant threats or vulnerabilities. Coordinating with federal
government partners helps ensure that actions taken by CISA and JCDC are complementary to
broader government efforts, strengthening the overall effectiveness of incident response and
remediation strategies.
Call to Action
The JCDC AI Cybersecurity Collaboration Playbook provides essential guidance for voluntary
information sharing across the AI community—including AI providers, developers, and adopters—to
bolster collective defenses against evolving cyber threats. As AI adoption accelerates, the
expanding threat landscape for AI-enabled systems introduces new vulnerabilities and security
challenges. This playbook will undergo periodic updates, evolving to address these challenges
through active collaboration among government, industry, and international partners.
Page 19 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
JCDC partners should integrate the playbook into their incident response and information-sharing
processes, make iterative improvements as needed, and provide feedback. Please see
instructions under “Questions and Feedback section.” This continuous input strengthens and
adapts the playbook through ongoing collaboration and practical application.
To strengthen collaboration and engagement, JCDC invites AI security specialists and
stakeholders to consider the following actions:
• Flag opportunities for technical exchanges: JCDC partners should identify and share
opportunities for technical exchanges related to emerging threats, adversaries, or
vulnerabilities affecting the AI community. These exchanges provide essential insights that
enable JCDC and CISA to respond proactively to shared risks.
• Identify priority issues for the AI community: Highlighting key issues and risks helps ensure
that JCDC’s priorities align with the most pressing challenges identified by the AI
community. This alignment supports more targeted and effective efforts to address critical
AI security needs.
• Promote post-mortem analyses and knowledge sharing: Developing and sharing post-
mortem analyses, case studies, and educational content within the community fosters a
proactive approach to AI security challenges. Sharing lessons learned strengthens
collective resilience and enhances readiness for future incidents.
• Become a JCDC partner: Join a diverse team of cyber defenders from organizations
worldwide focused on proactively gathering, analyzing, and sharing actionable cyber risk
information to enable synchronized cybersecurity planning, cyber defense, and response.
To learn more about JCDC, please visit CISA’s JCDC webpage and email
[email protected].
This playbook will be a dynamic resource for addressing the future AI security landscape through
active participation from the AI community. As critical infrastructure owners and operators
increasingly use AI tools, operational collaboration plays a crucial role in reinforcing cybersecurity
and advancing the safe adoption of AI technology.
Page 20 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Although the MathGPT team has since mitigated the vulnerabilities identified in this incident, the
case study is used here to populate the voluntary information-sharing checklist. This example is
written from the perspective of a MathGPT developer responding to the attack shortly after its
detection, as if the incident were still active.
Expected feedback Sharing information for awareness only with no expectations for
requested feedback.
Specific questions:
• Are there existing CVEs or community bulletins that indicate this
might be part of a bigger attack against U.S. critical
infrastructure?
• Any recommended mitigations?
TLP marking and TLP: GREEN may share with other industry partners, federal
caveats government partners, and international partners.
12 “Achieving Code Execution in MathGPT via Prompt Injection, MITRE ATLAS, accessed November 20, 2024,
https://atlas.mitre.org/studies/AML.CS0016.
Page 21 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Description of the An attacker was able to execute arbitrary code on our MathGPT web
incident or application via a prompt injection attack. This allowed the user to
vulnerability access the MathGPT OpenAI API key and perform a DoS attack,
bringing down our servers.
How the incident or MathGPT became unresponsive due to a DoS attack and was hanging
vulnerability while executing non-terminating code beginning Jan. 28, 2023.
exploitation was
first detected Our team confirmed through manual human review that the site was
down.
Page 22 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Affected users or Affected users/victims: All MathGPT users, as well as our organization
victims Types/scope of information lost or exploited: Access to our host
system’s environment variables and GPT-3 API key
Harms: Financial and reputational; Moderate severity
Estimated number of directly impacted users: Unknown
List of possible external systems the AI model had direct access to:
Unknown/Not Willing to Share
Broader impacts of Business operations for the MathGPT were completely shut down as
the attack the application continued to execute non-terminating code until the
host server was restarted.
Mitigations The application host server was restarted on Jan. 30, 2023.
Page 23 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Motivation: Unclear
Page 24 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 25 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 26 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 27 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
additional code that would upload sensitive data pulled from machines
where it was installed.
● Tactic: Collection
o Technique: Data from Local System
▪ The malicious package surveyed the affected systems for basic
fingerprinting information such as IP address and username as well as other
sensitive data.
● Tactic: Exfiltration
o Technique: Exfiltration via Cyber Means
▪ All gathered information, including file contents, was uploaded via encrypted
Domain Name System queries to an outside domain.
The MITRE ATLAS website hosts a full list of evolving TTPs that a threat actor might use against an
AI-enabled system, as informed by real-world attacks and realistic red teaming exercises shared
by the AI security community. 16
Page 28 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
FBI The FBI has trained cyber squads Internet Crime Complaint Center (IC3)
in each of its 56 field offices. FBI Field Offices
Cultivating relationships with National Cyber Investigative Joint
these field offices during routine Task Force: [email protected] or (855)
operations can improve 292-3937
communication practices when an
incident occurs.
Page 29 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 30 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Page 31 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Additional Resources
Executive Order 14110 U.S. Office of the Policy for the use and development of AI by
on the Safe, Secure, President the Federal Government. Among other
and Trustworthy things, Executive Order 14110 focuses on
Development and Use AI safety and security.
of Artificial Intelligence
Page 32 of 33 TLP:CLEAR
JCDC AI Cybersecurity Collaboration Playbook TLP:CLEAR
Additional Resources
Deploying AI Systems NSA AISC, CISA, the Outlines best practices for organizations
Securely: Best FBI, the ASD’s ACSC, deploying AI to use to secure the
Practices for Deploying the Canadian Centre deployment environment, continuously
Secure and Resilient AI for Cyber Security protect the AI system, and securely operate
Systems (CCCS), the New and maintain the AI system.
Zealand National
Cyber Security Centre
(NCSC-NZ), and the
UK NCSC.
Page 33 of 33 TLP:CLEAR