www.cisa.gov Open in urlscan Pro
2a02:26f0:480:5af::447a  Public Scan

Submitted URL: http://cisa.gov/AI
Effective URL: https://www.cisa.gov/ai
Submission: On November 27 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   LocallyFaith-Based CommunityExecutives
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub
   Contact Us

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home

Share:




ARTIFICIAL INTELLIGENCE



 

The security challenges associated with AI parallel cybersecurity challenges
associated with previous generations of software that manufacturers did not
build to be secure by design, putting the burden of security on the customer.
Although AI software systems might differ from traditional forms of software,
fundamental security practices still apply.

As noted in the landmark Executive Order 14110, “Safe, Secure, And Trustworthy
Development and Use of Artificial Intelligence (AI),” signed by the President on
October 30, 2023, “AI must be safe and secure.” As the nation’s cyber defense
agency and the national coordinator for critical infrastructure security and
resilience, CISA will play a key role in addressing and managing risks at the
nexus of AI, cybersecurity, and critical infrastructure.

Taking a significant step forward in addressing the intersection of artificial
intelligence (AI) and cybersecurity, CISA and the United Kingdom’s National
Cyber Security Centre (NCSC(link is external)) jointly released Guidelines for
Secure AI System Development(link is external), developed in cooperation with 21
other agencies and ministries from across the world – including all members of
the Group of 7 major industrial economies on November 27. The Guidelines for
Secure AI System Developmentare the first of their kind to be agreed to
globally. They will help developers of any systems that use AI make informed
cybersecurity decisions at every stage of the development process.


CISA’S ROADMAP FOR ARTIFICIAL INTELLIGENCE

CISA has developed a Roadmap for Artificial Intelligence, which is a
whole-of-agency plan aligned with national AI strategy, to address our efforts
to: promote the beneficial uses of AI to enhance cybersecurity capabilities,
ensure AI systems are protected from cyber-based threats, and deter the
malicious use of AI capabilities to threaten the critical infrastructure
Americans rely on every day.

CISA will implement the Roadmap through five lines of effort:

Line of Effort 1: Responsibly use AI to support our mission

CISA will use AI-enabled software tools to strengthen cyber defense and support
its critical infrastructure mission. CISA’s adoption of AI will ensure
responsible, ethical, and safe use—consistent with the Constitution and all
applicable laws and policies, including those addressing federal procurement,
privacy, civil rights, and civil liberties.

Read more
Line of Effort 2: Assure AI systems

CISA will assess and assist secure by design, AI-based software adoption across
a diverse array of stakeholders, including federal civilian government agencies;
private sector companies; and state, local, tribal, and territorial (SLTT)
governments through the development of best practices and guidance for secure
and resilient AI software development and implementation. 

Read more
Line of Effort 3: Protect critical infrastructure from malicious use of AI

CISA will assess and recommend mitigation of AI threats facing our nation’s
critical infrastructure in partnership with other government agencies and
industry partners that develop, test, and evaluate AI tools.

Read more
Line of Effort 4: Collaborate and communicate on key AI efforts with the
interagency, international partners, and the public

CISA will contribute to DHS-led and interagency processes on AI-enabled
software. This LOE includes developing policy approaches for the U.S.
government’s overall national strategy on AI and supporting a whole-of-DHS
approach on AI-based-software policy issues. This LOE also includes coordinating
with international partners to advance global AI security best practices and
principles.

Read more
Line of Effort 5: Expand AI expertise in our workforce

CISA will continue to educate our workforce on AI software systems and
techniques, and the agency will continue to actively recruit interns, fellows,
and future employees with AI expertise. CISA will ensure that internal training
reflects—and new recruits understand—the legal, ethical, and policy aspects of
AI-based software systems in addition to the technical aspects.

Read more


FEATURED CONTENT


CISA'S ROADMAP FOR AI

CISA's whole-of-agency plan to: promote the beneficial uses of AI to enhance
cybersecurity capabilities, ensure AI systems are protected from cyber-based
threats, and deter the malicious use of AI capabilities to threaten critical
infrastructure.


SOFTWARE MUST BE SECURE BY DESIGN, AND ARTIFICIAL INTELLIGENCE IS NO EXCEPTION

Like any software system, AI must be Secure by Design. Manufacturers of AI
systems must prioritize security throughout the whole lifecycle of the product.


FREQUENTLY ASKED QUESTIONS ON CISA’S ROADMAP FOR ARTIFICIAL INTELLIGENCE

Get answers to frequently asked questions about artificial intelligence and
CISA's Roadmap for AI.


WHITE HOUSE EXECUTIVE ORDER 14110

Executive Order on the Safe, Secure, and Trustworthy Development and Use of
Artificial Intelligence


CISA ARTIFICIAL INTELLIGENCE USE CASES

See how CISA is using AI responsibly to improve its services and cybersecurity
on several fronts, while maintaining privacy and civil liberties.

View Use Cases




IMPROVING AI RESILIENCE


OPEN SOURCE SOFTWARE SECURITY

Open source software is part of the foundation of the digital infrastructure we
all rely upon. Find out here how CISA is working to help secure it.


CROSS-SECTOR CYBERSECURITY PERFORMANCE GOALS

A common set of protections that all critical infrastructure entities - from
large to small - should implement to meaningfully reduce the likelihood and
impact of known risks and adversary techniques.


SHIELDS UP

As the nation’s cyber defense agency, CISA stands ready to help organizations
prepare for, respond to, and mitigate the impact of cyberattacks.


SHIELDS READY

As the National Coordinator for critical infrastructure security and resilience,
CISA stands ready to help America prepare for and adapt to changing risk
conditions and withstand and recover rapidly from potential disruptions,
regardless of cause.


SECURE BY DESIGN

It's time to build cybersecurity into the design and manufacture of technology
products. Find out here what it means to be secure by design.


SECURE OUR WORLD

Secure Our World is a cybersecurity awareness program aimed at educating
individuals and businesses on four easy ways to stay safe online.


RECENT U.S. EFFORTS ON AI POLICY

Learn more about the recent legislative and executive efforts taken related to
artificial intelligence that are guiding CISA’s actions in our Roadmap for AI.

View Recent Efforts


WHITE HOUSE FACT SHEET

FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and
Trustworthy Artificial Intelligence

Read Here


DHS INFORMATION

DHS AI:  Artificial Intelligence at DHS | Homeland Security

FACT SHEET: Biden-Harris Administration Executive Order Directs DHS to Lead the
Responsible Development of Artificial Intelligence

Read Here


ARTIFICIAL INTELLIGENCE AT DHS

DHS plays a critical role in ensuring artificial intelligence (AI) safety and
security nationwide.

DHS.gov/AI


AI.GOV

The Biden-Harris Administration is dedicated to ensuring the U.S. leads in safe,
secure, and trustworthy AI innovation to harness the opportunities of AI while
mitigating its risks.

AI.gov

Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback