DC3 Mission

DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE)

Safeguarding the Defense Industrial Base through cyber incident reporting, threat intelligence, partner collaboration, and cyber resilience support.

 

Mandatory and Voluntary Cyber Incident Reporting

Timely reporting is critical to national security. Don’t wait.

A DoD-Approved Medium Assurance Certificate is required to report a cyber incident.
Approved ECA Vendors
IdenTrust, Inc.   |   WidePoint (formerly ORC)

However, if you do not yet have a DoD-Approved Medium Assurance Certificate and need to report a cyber incident, please email DC3.DCISE@us.af.mil for further assistance.

Central reporting, intelligence, and support for the Defense Industrial Base

DCISE is the designated DoD center for Defense Industrial Base cyber incident reporting and collaborative information sharing, supporting required reporting under DFARS 252.204-7012 and related regulations.

  • Central Reporting Hub: The designated DoD center for all DIB cyber incident reporting, as required by defense regulations.
  • Actionable Intelligence: Enhances DIB reports with all-source intelligence and shares findings to enable action against cyber threats.
  • Partner Support & Capabilities: Provides forensics, malware analysis, and a 24/7 hotline for incident assistance.
  • Collaborative Environment: Works with a network of more than 1,100 DIB and U.S. Government partners.
  • Proven Maturity: Operates at CMMI-SVC Maturity Level 3 and shares hundreds of threat reports annually.

At-a-glance value

Incident Reporting Supports mandatory and voluntary reporting channels for the Defense Industrial Base.
24/7 Support Hotline support is available for assistance outside normal business hours.
Threat Intelligence Delivers cyber insights, reporting, and intelligence products across the enterprise.
Partner Network Collaborates across DIB companies, U.S. Government stakeholders, and mission partners.

Core DCISE capabilities

These service areas help DIB partners report incidents, submit malware, improve cyber resilience, and connect to collaborative threat intelligence.

Medium assurance certificate

Medium Assurance Certificates

Required by DFARS 252.204-7012, DoD-approved certificates enable secure communications between the Defense Industrial Base and the Department of Defense.

Approved ECA Vendors

IdenTrust, Inc.
WidePoint

Electronic Malware Submission portal

Electronic Malware Submission (EMS)

Enables the DoD, the Intelligence Community, the DIB, and other mission partners to securely submit malware and malware artifacts for analysis via the EMS portal.

Submit Malware
Threat products and engagements

Threat Products & Engagements

DCISE provides threat products, webinars, introductory briefings, regional exchanges, and technical engagements designed to inform and empower DIB partners.

Explore DCISE Resources

Cybersecurity capabilities and support

DCISE and its mission partners provide multiple services to improve cyber resilience, reduce threat exposure, and strengthen visibility across the Defense Industrial Base.

DCISE³

Analyzes DIB firewall traffic and delivers risk-based threat scoring, alerting, and insights to reduce threat exposure.

Email to Learn More

DIB-VDP

Uses vetted, ethical researchers to identify and mitigate vulnerabilities on DIB public-facing assets.

Learn More About DIB-VDP

DC3 ENSITE

Delivers real-time threat intelligence with AI/ML-powered detection through a centralized dashboard, strengthening enterprise awareness.

Explore DC3 ENSITE

Events & Webinars

DCISE offers introductory briefings, technical exchanges, webinars, and regional engagements designed to support DIB partners.

Learn More About Engagement Opportunities

Cyber Threat Products

DCISE Cyber Threat Products help partners strengthen security and protect controlled unclassified information.

Explore Threat Products

NSA Cybersecurity Collaboration Center

Learn about additional partner services including PDNS+, Attack Surface Management, Autonomous Penetration Testing, and Threat Intelligence Collaboration.

Visit NSA CCC

Level up your cyber resilience

The Cyber Resilience Analysis (CRA) is a self-assessment tool designed to help organizations identify vulnerabilities and strengthen resilience across 10 key security domains, with alignment to NIST CSF, NIST 800-171, and CMMC.

CRA Question Set and Guidance

Open PDF

CRA User Guide

Open PDF

CRA Crosswalks

Includes CMMC 2.0 and NIST CSF ransomware crosswalk materials plus supporting CRA documentation.

Open Crosswalk

Disclaimer: The CRA reflects an organization’s capabilities only at the time of the self-assessment and is not intended to be a compliance activity.

Reporting FAQs, CMMC, policy, and resources

These expandable sections organize the most requested DCISE guidance into clearer categories for reporting, CMMC 2.0, policy references, support resources, and common questions.

Cyber Incident Reporting FAQs +
What DoD-Approved Medium Assurance Certificate is required to submit a report? +

A DoD-Approved Medium Assurance Certificate is required to report a cyber incident. However, if you do not yet have a DoD-approved Medium Assurance Certificate and need to report a cyber incident, please email DC3.DCISE@us.af.mil or call the DCISE hotline at (410) 981-0104 for further assistance.

Report a Cyber Incident

For DoD Contractors Reporting Cyber Incidents (DFARS 252.204-7012) +

DoD contractors shall report as much required information as can be obtained within 72 hours of discovery of any cyber incident involving covered defense information or affected systems. Additional information obtained after the initial submission should be reported via a follow-on ICF.

  1. Company name
  2. Unique Entity Identifier (UEI)
  3. Facility CAGE code
  4. Facility Clearance Level
  5. Contract Number / PIID
  6. Company point of contact information
  7. U.S. Government Program Manager point of contact
  8. Contract number(s) or agreement affected
  9. Contracting Officer or agreement point of contact
  10. Contract or agreement clearance level
  11. Impact to Covered Defense Information
  12. Ability to provide operationally critical support
  13. Date incident discovered
  14. Location(s) of compromise
  15. Incident location CAGE code
  16. DoD programs, platforms or systems involved
  17. Type of compromise
  18. Description of technique or method used
  19. Incident outcome
  20. Incident narrative and TTPs/IoCs
  21. Any additional information

See DFARS 252.204-7012 for more information.

For DoD Contractors Reporting FAR 52.204-23 / FAR 52.204-25 issues +

DoD Contractors shall report as much of the required information as can be obtained within one business day of identifying or being notified that a covered article was provided to the Government during contract performance.

  1. Contract Number
  2. Order Number(s), if applicable
  3. Supplier Name
  4. Brand
  5. Model Number
  6. Item Description
  7. Any readily available mitigation information

See FAR 52.204-23 and FAR 52.204-25 for more information.

For DoD Contractors Providing Cloud Services (DFARS 252.239-7010) +
  1. Contract information and contracting officer data
  2. Contact information for impacted and reporting organizations
  3. Details describing vulnerabilities involved
  4. Date/time of occurrence and detection
  5. Related indicators
  6. Threat vectors, if known
  7. Prioritization factors
  8. Source/destination IP, port, and protocol
  9. Operating systems affected
  10. Mitigating factors and actions taken
  11. System functions
  12. Physical system locations
  13. Sources, methods, or tools used
  14. Any additional relevant information

See DFARS 252.239-7010 for more information.

For Voluntary Reporting +

DIB companies are encouraged to voluntarily report cyber threat activity valuable for U.S. Government analysis and sharing. Recommended reporting includes, but is not limited to:

  • Suspected APT activity
  • Reconnaissance and exploitation attempts
  • Threat actor infrastructure
  • Network compromises not impacting DoD information
  • Phishing messages
  • Suspicious files, activity, or network traffic
How can I submit malicious files for analysis to DC3? +

DFARS 252.204-7012 requires contractors to isolate and submit malicious files, if available, to DC3 as part of mandatory reporting requirements. If you have a PKI certificate, you can request an EMS account and submit malicious files at https://ems.dc3on.gov.

You may also request a one-time upload link by emailing DC3.DCISE@us.af.mil and including your ICF number in the subject line, or by calling (410) 981-0104.

Do not use email to submit malicious files to DoD.

Cyber Maturity Model Certification (CMMC) 2.0 +
Overview of CMMC 2.0 +

The Department of Defense finalized the CMMC 2.0 Rule, effective November 10, 2025. Starting this date, new solicitations and contracts may include CMMC requirements based on whether an organization handles Federal Contract Information or Controlled Unclassified Information.

CMMC 2.0 Levels Explained +
  • Level 1 – Foundational: 15 practices per FAR 52.204-21
  • Level 2 – Advanced: 110 NIST SP 800-171 requirements
  • Level 3 – Expert: Adds NIST SP 800-172 enhancements
  • CMMC Alignment to NIST Standards (PDF)
Timeline and Phases +
  • Phase 1 (Nov 2025): CMMC clauses began appearing in select solicitations
  • Phase 2 (Nov 2026): Third-party assessments expand
  • Phase 3 (Nov 2027): Level 3 introduced for critical programs
  • Phase 4 (Nov 2028): Full implementation across eligible contracts
What DIB Partners Should Do Now +
  • Identify systems handling FCI/CUI
  • Determine required CMMC level
  • Conduct gap analysis and develop POA&M
  • Record self-assessment scores in SPRS
  • Plan for C3PAO or government assessment
  • Flow-down clauses to subcontractors
Policy, Standards, and Resources +
DoD DIB CS Activities and Related Policy +
Cybersecurity Standards +

NIST SP 800-171 Rev. 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Note: DoD is assessing compliance against Rev 2. A transition to Rev 3 will be announced in the future.

NIST SP 800-172: Enhanced Security Requirements for Protecting Controlled Unclassified Information

DoD DIB Cybersecurity Capabilities and Support +

The DoD recognizes the need to help DIB organizations improve cybersecurity posture and operational resilience. Services are available based on specific needs.

DCISE³

Offers real-time monitoring of firewall traffic, threat detection, alerts, and optional blocking of malicious traffic. Email DC3.DCISE@us.af.mil for more information.

DIB-VDP

A voluntary program for DIB companies that provides vulnerability discovery, triaging, and validation. Email AFOSI.DC3.DIB-VDP@us.af.mil.

DC3 ENSITE

Delivers real-time threat intelligence and AI/ML-powered detection through a centralized dashboard. Email DC3.DCISE@us.af.mil for more information.

NSA CCC Services

Includes PDNS+, Attack Surface Management, Autonomous Penetration Testing, and Threat Intelligence Collaboration.

Miscellaneous FAQs +
I clicked on the Report or Apply button and got a browser error. Is the site down? +

A DoD-approved Medium Assurance Certificate is required to access these capabilities. If you do not yet have one, please email DC3.DCISE@us.af.mil or call the DCISE hotline at (410) 981-0104 for assistance.

Do not send malicious files to the email address.

What is a DoD-approved Medium Assurance Certificate? +

The DoD established the External Certification Authority Program to support issuance of DoD-approved identification certificates to industry partners and other external entities. These certificates enable secure communications with the DoD and authentication to DoD systems.

If I need assistance outside normal business hours, what are my options? +

The DCISE hotline at (410) 981-0104 operates 24/7. Normal in-office operating hours are from 6:00 A.M. to 6:00 P.M. ET.

What is the difference between a mandatory and a voluntary cyber incident report? +

Mandatory reporting under DFARS 252.204-7012 is required by many DoD contracts and subcontracts involving covered defense information and/or operationally critical support. Contractors must report relevant cyber incidents within 72 hours of discovery.

Voluntary reporting is the primary channel for DIB participants to share cyber threat information and indicators of compromise that may improve the cybersecurity posture of other DIB participants.

I was made aware one of my vendors or customers suffered a cyber-attack. Can I submit a Mandatory ICF on their behalf? +

No. DFARS 252.204-7012 requires the impacted company to submit a report on the specific cyber incident.

Can DCISE help me with the upcoming Cybersecurity Maturity Model Certification? +

Contact DC3.DCISE@us.af.mil to submit a Request for Information and learn how DCISE capabilities are cross walked to support CMMC.

Do you work with any other agencies, or do I have to report to other agencies separately? +

Organizations should maintain relationships and contractual sharing obligations with other agencies. The ICF also includes a place to indicate where else information has been shared.

Do you share information with law enforcement agencies? +

The U.S. Government and law enforcement agencies have access to mandatory reports. Voluntary reporting is anonymized, and the submitter’s identity is shared only with consent from the submitting company.

Need DCISE support or have reporting questions?

Phone: 410-981-0104
Toll Free: 1-877-838-2174
Email: dc3.dcise@us.af.mil