Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Traffic Light Protocol 2.0 Brings Wording Improvements, Label Changes

The Forum of Incident Response and Security Team (FIRST) announced on Thursday the release of Traffic Light Protocol version 2.0, which brings important updates to the widely used sensitive information classification system.

The Forum of Incident Response and Security Team (FIRST) announced on Thursday the release of Traffic Light Protocol version 2.0, which brings important updates to the widely used sensitive information classification system.

The Traffic Light Protocol (TLP) was established by the UK’s National Infrastructure Security Co-ordination Center (NISCC) in 1999, and FIRST released its first version of TLP in August 2016. In 2019, a special interest group comprising more than 50 industry professionals started working on improving the TLP content, language, accessibility and supporting materials. The result of their work is TLP 2.0, which FIRST officially launched on August 5, 2022.TLP 2.0

The TLP defines labels for indicating whether and how much sensitive information can be shared. The four labels are TLP:RED (for the individual recipient only), TLP:AMBER (can be distributed on a need-to-know basis with the organization and its clients), TLP:GREEN (can be shared within the community), and TLP:CLEAR (no limit on disclosure).

TLP:CLEAR was named TLP:WHITE in the previous version of the protocol. TLP 2.0 also includes the TLP:AMBER+Strict label, which is used for information that is restricted to the recipient’s organization only and it cannot be shared with clients.

TLP 2.0 also removes synonyms and colloquialisms in an effort to make translations easier and to improve accessibility for non-native English speakers. The updated version also has more consistent language and terminology, as well as some new definitions.

Another modification is related to the introduction of RGB, CMYK and HEX color codes for font and background, with recommendations for accommodating people with low vision.

FIRST, which is also in charge of the Common Vulnerability Scoring System (CVSS), pointed out that some of the changes introduced by TLP 2.0 could cause issues for current tools and firmware, but the organization is hoping for it to be fully in use by January 2023.

“We are increasingly spreading more confidential and sensitive information inside our community, inside companies, inside business sectors, inside countries, and worldwide,” said Don Stikvoort of the Open CSIRT Foundation, one of the people involved in the development of TLP 2.0. “We need systems that are easy to use, simple to understand, and straightforward enough that translation does not impact the meaning to ensure that we share sensitive information with the appropriate audience. The updated and modernized TLP version 2.0 does just that.”

Related: FIRST Announces CVSS Version 3.1

Related: NIST Releases New macOS Security Guidance for Organizations

Related: PCI Data Security Standard v4.0 Released to Address Emerging Threats

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.