TAXII Version 2.1 from CTI TC approved as a Committee Specification

OASIS is pleased to announce that TAXII Version 2.1 from the OASIS Cyber Threat Intelligence (CTI) TC [1] has been approved as an OASIS Committee Specification.

Trusted Automated Exchange of Intelligence Information (TAXII) is an application layer protocol used to exchange cyber threat intelligence (CTI) over HTTPS. It enables organizations to share CTI by defining an API that aligns with common sharing models. This specification defines the TAXII RESTful API and its resources along with the requirements for TAXII Client and Server implementations.

TAXII is specifically designed to support the exchange of CTI represented in STIX. As such, the examples and some features in the specification are intended to align with STIX. This does not mean TAXII cannot be used to share data in other formats; it is designed for STIX, but is not limited to STIX.

This Committee Specification is an OASIS deliverable, completed and approved by the TC and fully ready for testing and implementation.

The prose specifications and related files are available here:

TAXII Version 2.1
Committee Specification 01
27 January 2020

Editable source (Authoritative):
https://docs.oasis-open.org/cti/taxii/v2.1/cs01/taxii-v2.1-cs01.docx
HTML:
https://docs.oasis-open.org/cti/taxii/v2.1/cs01/taxii-v2.1-cs01.html
PDF:
https://docs.oasis-open.org/cti/taxii/v2.1/cs01/taxii-v2.1-cs01.pdf

For your convenience, OASIS provides a complete package of the prose document and any related files in ZIP distribution files. You can download the ZIP file at:
https://docs.oasis-open.org/cti/taxii/v2.1/cs01/taxii-v2.1-cs01.zip

Members of the CTI TC [1] approved this specification by Special Majority Vote. The specification had been released for public review as required by the TC Process [2]. The vote to approve as a Committee Specification passed [3], and the document is now available online in the OASIS Library as referenced above.

Our congratulations to the TC on achieving this milestone and our thanks to the reviewers who provided feedback on the specification drafts to help improve the quality of the work.

========== Additional references:
[1] OASIS Cyber Threat Intelligence (CTI) TC
https://www.oasis-open.org/committees/cti/

[2] Public reviews:
30-day public review, 22 December 2018:
https://lists.oasis-open.org/archives/members/201812/msg00006.html
- Comment resolution log:
http://docs.oasis-open.org/cti/taxii/v2.1/csprd01/taxii-v2.1-csprd01-com...

15-day public review, 14 August 2019:
https://lists.oasis-open.org/archives/members/201908/msg00007.html
- Comment resolution log:
http://docs.oasis-open.org/cti/taxii/v2.1/csprd02/taxii-v2.1-csprd02-com...

15-day public review, 09 December 2019:
https://lists.oasis-open.org/archives/cti/201912/msg00001.html
- Comment resolution log:
https://docs.oasis-open.org/cti/taxii/v2.1/csprd03/taxii-v2.1-csprd03-co...

[3] Approval ballot:
https://www.oasis-open.org/committees/ballot.php?id=3465

Associated TC: 
Cyber Threat Intelligence (CTI)