US Cyber Threat Intelligence Sources and Feeds

The US cyber threat intelligence landscape encompasses a structured ecosystem of government agencies, information-sharing bodies, and standardized data feeds that provide actionable indicators, threat actor profiles, and vulnerability data to organizations across the public and private sectors. This reference covers the major source categories, how feeds are produced and consumed, representative operational scenarios, and the decision criteria used to select or integrate intelligence sources. For organizations navigating the digital security service sector, understanding the authoritative sources in this space is foundational to any threat-informed defense posture.

Definition and scope

Cyber threat intelligence (CTI) is structured, contextualized information about adversaries, their capabilities, infrastructure, and intentions — produced and distributed in formats that enable defensive action. In the US context, the scope spans federal government dissemination programs, sector-specific information sharing and analysis centers (ISACs), machine-readable indicator feeds, and open standards for structured threat data.

The Cybersecurity and Infrastructure Security Agency (CISA) functions as the primary federal coordinator for civilian threat intelligence sharing. The National Institute of Standards and Technology (NIST SP 800-150) provides the authoritative federal framework for CTI sharing programs, defining sharing relationships, data formats, and operational scope. The Office of the Director of National Intelligence (ODNI) and its Cyber Threat Intelligence Integration Center (CTIIC) coordinate intelligence across the broader national security community.

CTI is formally classified by production tier:

  1. Strategic intelligence — high-level assessments of threat actor motivations, geopolitical context, and long-term trends; intended for executive and policy audiences.
  2. Operational intelligence — information about specific campaigns, attack timelines, and threat actor targeting patterns; used by security operations leadership.
  3. Tactical intelligence — technical indicators of compromise (IoCs), malware signatures, and adversary TTPs (tactics, techniques, and procedures); consumed directly by security tools and analysts.
  4. Technical intelligence — raw machine-readable feeds, STIX/TAXII packages, and vulnerability data; integrated into SIEM platforms, firewalls, and endpoint tools.

How it works

The production and delivery of CTI follows a defined intelligence cycle. Collection draws from endpoint telemetry, network sensors, dark web monitoring, government sensors, and open-source intelligence (OSINT). Analysis normalizes raw data into structured formats. Distribution delivers finished intelligence to consumers via automated feeds or manual reports.

The dominant machine-readable standard in the US is STIX (Structured Threat Information eXpression) paired with the TAXII (Trusted Automated eXchange of Intelligence Information) transport protocol — both maintained by OASIS Open. CISA operates the Automated Indicator Sharing (AIS) program, which uses STIX 2.1 over TAXII 2.1 to distribute IoCs to enrolled participants at no cost. As documented by CISA's AIS program, over 300 private-sector and government entities participate in the AIS ecosystem.

ISACs provide sector-specific sharing channels. The Financial Services ISAC (FS-ISAC), Health-ISAC, and the Electricity ISAC (E-ISAC) operate under the National Council of ISACs (NCI) framework, each maintaining dedicated feeds, threat reports, and member portals aligned to their regulated sector. These sector bodies often integrate with CISA's Multi-State ISAC (MS-ISAC), which serves state, local, tribal, and territorial (SLTT) governments.

The how-to-use-this-digital-security-resource reference explains how this provider network structures access to service providers operating across these intelligence layers.

Common scenarios

Three operational scenarios represent the primary use patterns for CTI sources and feeds in the US market:

Scenario 1 — Federal contractor compliance. Organizations operating under CMMC (Cybersecurity Maturity Model Certification) or FedRAMP requirements must demonstrate active threat intelligence integration. NIST SP 800-171 control 3.14.6 requires monitoring of organizational systems for indicators of compromise, creating a direct compliance driver for CTI feed subscription. The Defense Contract Management Agency (DCMA) and DoD supply chain assessors reference CTI capabilities during audits.

Scenario 2 — Critical infrastructure protection. Operators of systems covered by the 16 critical infrastructure sectors defined in Presidential Policy Directive 21 (PPD-21) are eligible for CISA threat briefings, sector-specific ISAC membership, and access to the Traffic Light Protocol (TLP)-marked reports distributed through the Homeland Security Information Network (HSIN). Energy sector operators, for example, receive E-ISAC GridEx exercise intelligence and NERC CIP-aligned threat updates.

Scenario 3 — Enterprise SOC enrichment. Security operations centers integrate public and commercial CTI feeds into SIEM platforms (such as Splunk or Microsoft Sentinel) using STIX/TAXII connectors. CISA's Known Exploited Vulnerabilities (KEV) catalog — maintained at cisa.gov/known-exploited-vulnerabilities-catalog — provides a free, continuously updated list of CVEs under active exploitation, which SOC teams use to prioritize patching queues.

The page covers how service categories in this network map to these operational functions.

Decision boundaries

Selecting CTI sources requires matching feed characteristics to operational requirements across four dimensions:

Organizations regulated under HIPAA (HHS enforcement), GLBA (FTC/OCC enforcement), or sector-specific rules must also evaluate whether CTI sharing agreements constitute information-sharing under applicable data protection statutes — a determination that falls to legal and compliance functions, not to feed selection alone.

References