The US Cybersecurity and Infrastructure Security Agency (CISA) this week published a user guide to help organizations prepare for the November 1, 2022, move from Traffic Light Protocol (TLP) version 1.0 to TLP 2.0.
TLP is used to inform recipients of sensitive information on the extent to which they may share the provided data, and relies on four labels to indicate sharing boundaries that recipients can apply.
In TLP 1.0, these four labels are TLP:RED, TLP:AMBER, TLP:GREEN, and TLP:WHITE, and restrict the sharing of information to specific participants only, to participants’ organizations, to the community, or allow full disclosure, respectively.
Changes that TLP 2.0 brings include the replacement of TLP:WHITE with TLP:CLEAR and the inclusion of TLP:AMBER+STRICT to supplement TLP:AMBER.
Thus, starting with TLP 2.0, the sharing of information will be restricted to individual recipients only, to the recipient’s organization and its clients (TLP:AMBER+STRICT will restrict the sharing to the organization only), or to the recipient’s community, or can be shared to the world.
The TLP labels can be inserted within documents (in the header and footer of each page), in automated information exchanges, emails and chats (directly prior to the information itself), and even in verbal discussions, the fact sheet on moving to TLP 2.0 explains.
While the move to TLP 2.0 is planned for November 1, CISA will not update its Automated Indicator Sharing (AIS) capability until March 2023.
CISA is urging organizations to take note of the upcoming move to TLP 2.0 and to adopt the newer version to “facilitate greater information sharing and collaboration”.
This TLP system of markings, which is managed by the Forum of Incident Response and Security Teams (FIRST), is not legally binding, the agency also notes.
Related: US Agencies Publish Security Guidance on Implementing Open RAN Architecture
Related: AMTSO Publishes Guidance for Testing IoT Security Products
Related: US, UK, New Zealand Issue PowerShell Security Guidance
Related: CISA Releases Final IPv6 Security Guidance for Federal Agencies

More from Ionut Arghire
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- Critical QNAP Vulnerability Leads to Code Injection
- GitHub Revokes Code Signing Certificates Following Cyberattack
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
