This article is about areas of classified information and document classification. For operation of traffic signalling devices, see traffic-light signalling and operation. For other uses, see Traffic light (disambiguation).
The Traffic Light Protocol (TLP) is a system for classifying sensitive information created in the early 2000s by the UK Government's National Infrastructure Security Co-ordination Centre, in order to encourage greater sharing of sensitive information.[1]
The fundamental concept is for the originator to signal how widely they want their information to be circulated beyond the immediate recipient. It is designed to improve the flow of information between individuals, organizations or communities in a controlled and trusted way. It is important that everyone who handles TLP-labeled communications understands and obeys the rules of the protocol. Only then can trust be established and the benefits of information sharing realized. The TLP is based on the concept of the originator labeling information with one of four colors to indicate what further dissemination, if any, can be undertaken by the recipient. The recipient must consult the originator if wider dissemination is required.
A number of current specifications for TLP exist.
From ISO/IEC, as part of the Standard on Information security management for inter-sector and inter-organizational communications[2]
From US-CERT, which is intended to provide a publicly available simple definition[3]
From the Forum of Incident Response and Security Teams (FIRST), which published version 1.0 of its consolidated TLP document on August 31, 2016.[4] arising from a Special Interest Group it created to ensure that interpretations of TLP are consistent, and clear expectations exist across user communities. FIRST deprecated version 1.0 in August 2022 (though may still be used until 31 December 2022[5]), on the release of version 2.0.[6]
^Eric Luiijf; Allard Kernkamp (March 2015). "Sharing Cyber Security Information" (PDF). Global Conference on CyberSpace 2015. Toegepast Natuurwetenschappelijk Onderzoek. Retrieved 2016-10-25. Don Stikvoort (11 November 2009). "ISTLP - Information Sharing Traffic Light Protocol" (PDF). Trusted Introducer. National Infrastructure Security Co-ordination Centre. Retrieved 2016-10-25. "Development of Policies for Protection of Critical Information Infrastructures" (PDF). Organisation for Economic Co-operation and Development. Retrieved 2015-11-19. "'Re: OpenSSH security advisory: cbc.adv' - MARC". Mailing list ARChive. Retrieved 2012-11-25. (alt source SecurityFocus archive entry)
^"ISO/IEC 27010:2015 [ISO/IEC 27010:2015] | Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications". International Organization for Standardization/International Electrotechnical Commission. November 2015. Retrieved 2019-12-31.
^"Traffic Light Protocol (TLP) Definitions and Usage". United States Department of Homeland Security. Retrieved 2019-12-31.
^"FIRST announces Traffic Light Protocol (TLP) version 1.0". Forum of Incident Response and Security Teams. Retrieved 2019-12-31.
^"Traffic Light Protocol (TLP)". FIRST — Forum of Incident Response and Security Teams. Retrieved 2022-08-05.
^"FIRST announces Traffic Light Protocol (TLP) version 2.0" (PDF).
and 28 Related for: Traffic Light Protocol information
The TrafficLightProtocol (TLP) is a system for classifying sensitive information created in the early 2000s by the UK Government's National Infrastructure...
indicators are usually exchanged within the industry, where the TrafficLightProtocol is being used. AlienVault Mandiant Malware Malware Information Sharing...
give government classification systems their particular tone. The TrafficLightProtocol was developed by the Group of Eight countries to enable the sharing...
need for police officers to control traffic. Since then, electricity and computerised control has advanced trafficlight technology and increased intersection...
standard for expressing impact of security vulnerabilities; the Trafficlightprotocol for classifying sensitive information; and the Exploit Prediction...
parallelism in computing TLP, an Advanced Power Management for Linux TrafficLightProtocol, a system for classifying sensitive information Transaction layer...
suggested to mitigate seismic risk is a TrafficLight System (TLS), also referred to as TrafficLightProtocol (TLP), which is a calibrated control system...
numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
their non-English equivalents. In cross-sectoral formations, the TrafficLightProtocol, which consists of: White, Green, Amber, and Red. In the personal...
constitutes a fraction of Internet traffic. The prevalent technology for file sharing is the BitTorrent protocol, which is a peer-to-peer (P2P) system...
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is the IP-specific...
indications shown to traffic on traffic signal aspects (a single light on a signal head). For example, a green phase gives all traffic from a particular...
Protocol on Road Signs and Signals. There is a European Agreement supplementing the 1949 Convention on Road Traffic, in addition to the 1949 Protocol...
Pre-Action Protocol for Low Value Personal Injury Claims in Road Traffic Accidents from 31 July 2013, otherwise known as the RTA Protocol, describes the...
SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 optionally provides authentication...
enhance traffic safety. Such pictorial signs use symbols (often silhouettes) in place of words and are usually based on international protocols. Such signs...
vehicle lighting and trafficlight signalling Observe caution while driving and avoid impeding traffic Stopping if there has been a traffic collision Speed...
global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network...
Constrained Application Protocol (CoAP) is a specialized UDP-based Internet application protocol for constrained devices, as defined in RFC 7252. It enables...
4%. A later advancement, Slotted ALOHA, improved the efficiency of the protocol by reducing the chance of collision, improving throughput to 36.8%. ALOHAnet...
This article is a summary of traffic signs used in each country. Roads can be motorways, expressways or other routes. In many countries, expressways share...
signals, bandwidth, communications protocols to organize network traffic, the network size, the topology, traffic control mechanisms, and organizational...
price–performance ratio of Internet Protocol-based products was competing with ATM technology for integrating real-time and bursty network traffic. Companies such as FORE...
Subsurface Order No. 2 that requires mandatory implementation of a Traffic-LightProtocol (TLP) based on the local magnitude (ML) of seismic events detected...
Internet today. Demand for bandwidth is driven primarily by Internet Protocol (IP) traffic from video services, telemedicine, social networking, mobile phone...
because an open protocol could enable third-party manufacturers to develop compatible devices, spreading the use of interoperable traffic advisory systems...
standardized protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitting...