/
Trusted Internet Trusted Internet

Trusted Internet - PDF document

jaena
jaena . @jaena
Follow
342 views
Uploaded On 2021-09-23

Trusted Internet - PPT Presentation

Connections 30Traditional TIC Use CaseApril 202Version 10Cybersecurity and Infrastructure Security AgencyCybersecurity Divisionx0000x0000ii xAttxachexd xBottxom xBBoxx 6x576x34 4x102x91 5x624x651 ID: 883898

agency tic access security tic agency security access capabilities x0000 traditional case data xion x62 xinat pag xype xoote

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "Trusted Internet" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1 Trusted Internet Connections 3.0 Trad
Trusted Internet Connections 3.0 Traditional TIC Use CaseApril 202Version 1.0Cybersecurity and Infrastructure Security AgencyCybersecurity Division ��ii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Revision HistoryThe version number will be updated as the document is modified. This documentwill be updated as needed to reflect modern security practices and technologies.Table : Revision History Versi on Date Revision Description Section/Pages Affected Draft December 2019 Initial Release All 1.0 April 2021 Response t o RFC and S takeholder Feedback A ll This use case references rusted nternet onnections3.0 Security Capabilities Catalog, dated AprilThe applicable security capabilities will be further explained in the document. ��iii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Reader’s GuideThe TrustedInternet Connections (TICinitiative is defined through key documents that describe the directive, the program, the capabilities, the implementation guidance, and capability mappings. Each document has an essential role in describing TIC and its implementation. The documents provide an understanding of how changes have led to the latest version of TIC and why those changes have occurred. The documents go into highlevel technical detail to describe the exact changes inarchitecture for TIC 3.0. The documents are additive; each builds on the other like chapters in a book. As depicted in Figure 1, the documents should be referenced in order and to completion to gain a full understanding of the modernized initiative.Figure TIC 3.0 Guidance Snapshot ��iv &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021TIC 3.0 Traditional TIC Use Caseable of ContentsIntroduction1.1Key TermsOverview of TIC Use CasesPurpose of the Traditional TIC Use CaseAssumptions and ConstraintsConceptual ArchitectureSecurity Patterns6.1Security Pattern 1: Agency Campus to Web6.2Security Pattern 2: Public User to Agency Campus6.3Security Pattern 3: Agency Campus to External Partner6.4Security Pattern 4: Agency Campus to Partner AgencyApplicable Security Capabilities7.1niversal Security Capabilities7.2Policy Enforcement Point Security CapabilitiesTelemetry RequirementsConclusionAppendix A Glossary and DefinitionsAppendix B Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesAppendix B.1 TIC 2.2 Capabilities to TIC 3.0 CapabilitiesAppendix B.2 TIC 3.0 Capabilities to TIC 2.2 CapabilitiesList of FiguresFigure 1: TIC 3.0 Guidance SnapshotFigure 2: Use Case Trust Zone LegendFigure 3: Traditional TIC Conceptual Architecture Figure 4: Security Pattern 1: Agency Campus to WebFigure 5: Security Pattern 2: Public User to AgencyFigure 6: Security Pattern 3: Agency to External PartnerFigure 7: Security Pattern 4: Agency Campus to Partner AgencyFigure 8: Traditional TIC Telemetry Sharing with CISA ��v &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021List of TablesTable 1: Revision HistoryTable 2: Trust Zones in the Traditional TIC Use CaseTable 3: Universal Security CapabilitiesTable 4: Files PEP Security CapabilitiesTable 5: Email PEP Security CapabilitiesTable 6: Web PEP Security CapabilitiesTable 7: Network PEP SecurityCapabilitiesTable 8: Resiliency PEP Security CapabilitiesTable 9: Domain Name System PEP Security CapabilitiesTable 10: Intrusion Detection PEP Security CapabilitiesTable 11: Enterprise PEP Security CapabilitiesTable 12: Unified Communications and Collaboration PEP Security CapabilitiesTable 13: Data Protection PEP Security CapabilitiesTable 14: TIC 2.2 Capabilities to TIC 3.0 CapabilitiesTable 15: Universal TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 16: Files PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 17: Email PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 18: Web PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 19: Networking PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 20: Resiliency PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitieTable 21: DNS PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 22: Intrusion Detection PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 23: Enterprise PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiTable 2

2 4: Unified Communications and Collaborat
4: Unified Communications and Collaboration PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 25: Data Protection PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities ��1 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021IntroductionTrusted InternetConnections (TIC), originally established in 2007, is a federal cybersecurity initiative intended to enhance networkand perimetersecurity across the Federal GovernmentThe Office of Management and Budget (OMB), the Department of Homeland Security (DHS)Cybersecurity and Infrastructure Security Agency (CISA)and the General Services Administration (GSA) oversee the TIC initiativethrough a robust program that sets guidance and an execution framework for agencies to implement a baseline perimeter security standard.The initial versions of the TIC initiative sought to consolidatfederal networks and standardize perimetersecurity for the federal enterpriseAs outlined in OMB Memorandum 26:Update to the Trusted InternetConnections (TIC) Initiativethis modernized version of the initiative expands upon the original to drive security standards and leverage advances in technology as agencies adopt mobile and cloud environmentsThe goal of TIC 3.0 is to secure federaldata, networks, and boundaries while providing visibility into agency traffic, including cloud communications.1.1Key Termsavoid confusion, terms frequently used throughout the TIC 3.0 documentation are defined below. Some of these terms are explained ingreater detail throughout the TIC 3.0 guidance. A comprehensive glossary and acronyms list with applicable attributions can be found in Appendix A.Boundary:A notional concept that describes the perimeter of a zone (e.gmobile device services, general support system (GSS), SoftwareService (SaaS), agency, etc.) within a network architecture. The bounded area must have an information technology (IT) utility.Internet:The internet is discussed in two capacities throughout TIC documentationmeans of data and IT traffic transportAn environment used for web browsing purposes, hereafter referred to as “WebManaged Trusted Internet Protocol Services (MTIPS):Services undeGSA’s Enterprise Infrastructure Solutions (EIS) contract vehicle thatprovideTIC solutions to government clients as a managed security service. It is of note that the EIS contract is replacing the GSA Networx contract vehicle that is set to expire inscal Year (FY) 2023.Management Entity (MGMT):notional concept of anentity that oversees and controls security capabilities. The entity can be an organization, network device, tool, service,or application. The entity can control the collection, processing, analysisand display of information collected from the policy forcement points (PEPs), and allows professionals to control devices on the network.Policy Enforcement Point (PEP):A security device, tool, functionor application that enforcesecurity policies through technical capabilities.Security CapabilityA combination of mutuallyreinforcing security controls (i.e., safeguards and countermeasures) implemented by technical means (i.e., functionality in hardware, software, and firmware), physical means (i.e., physical devices and protective measures), and procedural means (i.e., procedures performed by individuals).Security capabilities help to define protections for information being processed, stored, or transmitted by information systems. Update to the Trusted Internet Connections (TIC) Initiative,” Office of Management and Budget 26 (2019)https://www.whitehouse.gov/wpcontent/uploads/2019/09/M26.pdf. "Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 80053 R)," Septembertp://dx.doi.org/10.6028/NIST.SP.800 ��2 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Telemetry: Artifacts derived from security capabilities that provide visibility into security posture.TIC: The term “TIC” is used throughout the Federal Government to denote different aspects of the TICinitiative; including the overall TIC progr, a physical TIC access point (also known as a Traditional TIC)and a TIC Access Provider (TICAP see below). This document refers to TIC as an adjective or as the Trusted Internet Connections initiative.TIC Access Point: The physical location where afederal civilian agency consolidates its externaconnections and has security controls in place to secure and monitor the connections.TIC Access Provider (TICAP): An agency or vendor that manageand hostone or more TIC access points. Single Service TICAPs serve as a TIC Access Provider only to their own agency. MultiService TICAPs also provide TIC services to other agencies through a shared services model. TIC Overlay:A mapping of products and services to TIC ecurity apabilities.TIC Use Case:idanceon the secure implementation and/or configuration of specific platforms, services, and environments. A TIC use case contains a conceptual architecture, one or more security patt

3 ern options, security capability impleme
ern options, security capability implementation guidance, and CISA telemetry guidance for a common agency computing scenario.Trust Zone:A discrete computing environment designated for information processing, storage, and/or transmission that sharethe rigor or robustnessof the applicable securitycapabilitiesnecessary to protect the traffic transiting in and out of a zone and/or the information within the zone.Web:An environment used for web browsing purposes. Also see Internet. Overviewof TIC Use Cases TIC use casesprovide guidance on the secure implementation and configuration of specific platforms, services, and environments, and will be released on an individual basis. The guidance is derived from pilot programs and best practices from the public and private sectors. The purpose of each TIC use case is to identify the applicable security architectures, data flows, and policy enforcement points (PPs)and to describe the implementation of the security capabilities in a given scenario. TIC use cases articulate:Network scenarios for TIC implementation, Security patterns commonly used within the federal civilian enterprise, andTechnologyagnostic methods for securing current and emerging network models. TIC use cases build upon the key concepts and conceptual implementation of TIC 3.0 presented in the TIC 3.0 Reference Architecture(Reference Architecture) and provides implementation guidance for applicable security capabilities defined in the TIC 3.0 Security Capabilities Catalog(Security Capabilities Catalog)The TIC 3.0 Use Case Handbook(Use Case Handbook) provides general guidance for how agencies canuse and combine use cases.Agencies have flexibility in implementing TIC use cases. In particular:An agency may combine one or more use cases to best design and implementtheir TIC architecturesUse cases may provide more than one option for implementing a security pattern in order to give agencies flexibility. ��3 ��TIC 3.0 Traditional TIC Use CaseApril2021Each trust zone in a use case will be labeled with a high, medium, or low trust level, based on a pilot implementation or best practice. The use cases aredepicted following the schema illustratein Figure 2. Agencies can modify this trust zone designation to meet their needs.Refer to theReference Architecturefor more details on trust zones.ure Use Case Trust Zone LegendWhen securing trust zones, agencies should consider unique data sensitivity criteria and the impact of compromise to agency data stored in trust zones. Agencies may apply additional security capabilities that have not beincluded in the use case. Agencies have the discretion to determine the level of rigor necessary for applying securitycapabilities in use cases, based on federal guidelines and their risk tolerance.Refer to theUse Case Handbookfor more information on TIC use cases. Purpose of the Traditional TIC Use CaseTheTIC 3.0 Traditional TIC Use Case(Traditional TIC Use Case)defines how network security be applied when an agency has personnel on their network physical location (i.ean gency campusthat uses a traditional TIC access ointeither an agency TIC Access Provider (TICAP) Managed Trusted Internet Protocol Services (MTIPS) provider, when accessing the trusted external partners, or partner government agencies. A trusted external partner may include an agencysanctioned cloud service provider (CSP), or business partnersamong others. This use case includes four network security patterns: Secure gencycampus access to ; Public user to secure agency campus;Secure gencycampus access to agencysanctioned external partners; andSecure gency campus access to partner agencies. An gencymay implement a subset of these traffic flows rather thanall. For instance, an agencymay not have trusted external partners. The Traditional TIC Use Case is the “default use case.” This use case demonstrates how TIC 2.2 security capabilities at a TIC access point can be used to implement TIC 3.0 to meet an agency’s specific requirements, risk tolerances, and other factors. OMB M-26 defines the Traditional TIC Use Case as the “default use case” which leverages agency TICAP and MTIPS providers.The Traditional TIC Use Case is intended to provide additional guidance to agencies and providers for how existing TIC 2.2 security capabilities at a TIC ccess oint can be used to implement TIC 3.0 capabilities.While the TIC 2.2 security capabilities are consistent with the TIC 3.0 objectives, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0 security capabilities to reflect their agency requirements, risk tolerances, and other factors. ��4 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Assumptions and ConstrainThis section outlines guiding assumptions and constraints for the Traditional TIC Use Case. It isintended to clarify significant details about the construction and replication of this use case. The assumptions are broken down by the use case as a wholand by the unique entitiesdiscussed in the use case: Agency campus,TIC access point,External partners,Partner agencies,Web, and Public users.The following are the assumptions and constraints of this use caseRequirements for information sharing with CISA in support of National Cyber Protection System (NCPS)and Continuous Diag

4 nostics and Mitigation(CDM) purposes are
nostics and Mitigation(CDM) purposes are beyond the scope of this document.Consult the NCPS rogramand CDM rogramfor further details.The TIC 3.0 security capabilities applicable to the use case are not dependent on a data transfer mechanism. In other words, the same security capabilities apply if the conveyance is over leased lines, software virtual private network (VPN), hardware VPN, etc. The following are assumptions about the agency campusThe agency campus accesses the eb or trusted external partners through a TIC ccess oint.The agency maintains control over and has significant visibility into the agency campusData is protected at a level commensurate with the agency’s risk toleranceandin accordance with federal guidelines.The agency employs network operation center (NOC) and security operation center (SOC) tools capable of maintaining and protecting the portions of the overall infrastructure. To accomplish this, agencies can opt to use a NOC and SOC, or commensurate solutions.The following are assumptions about the TIC ccess ointThe TIC ccess oint is TIC 2.2 compliantThe TIC ccess oint is managed as a Single Service TICAP by the agency,or as a MultiService TICAP by the agencyanother agency, or an MTIPS providerThe agency employs traditional methods for accessing the TIC ccess oint, though supplemental protections may be provided using alternative methods.The following are assumptions about external partnere.ga CSP, a network, an extranet)he gency ensures that interactionwith external partners follow agencydefined policies and procedures for business need justification, partner connection eligibility, service levels, data protections, incident response information sharing and reporting, costs, dataownership, and contracting.The agencyuses only limited and welldefined services of external partneror permits external partneraccess to only limited and welldefined services of the agency “National Cybersecurity Protection System,” Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/nationalcybersecurityprotectionsystemncps.“Continuous Diagnostics and Mitigation,” Cybersecurity and Infrastructure Security Agencyhttps://www.cisa.gov/cdm. ��5 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021The agency has limited control over and visibility into external partnerxternal partnerhave NOCand SOCthat control and protect the portions of theinfrastructure where the agencyhas little to no control or visibility.he agency only uses secure mechanisms (e.gtransport layer security (TLS) or VPN) to communicate with external partners.The agency only uses strong authentication mechanisms (e.g.Federal Information Processing Standard (FIPS) 140complaint multictor authentication(MFA)) with external partners.Data provided to external partnersis protected at a level commensurate with the agency’s risk toleranceandin accordance with federal guidelines.The following are assumptions about partner ageniesThepartner agency employs appropriate TIC ases for all its external network connections, ensuringappropriate protectionsand information sharing with NCPSInteractions with partner agencies follow agencydefined policies and procedures for business ed justification, partner connection eligibility, service levels, data protections, incident response information sharing and reporting, costs, data ownership, and contracting.The agency uses only limited and welldefined services of partner agencies or permits partner agencies access to only limited and welldefined services of the agency.The agency has limited control over and visibility into partner agenciesPartner agencies have NOCs and SOCs that control and protect the portions of their infrastructurewhere the agency has little to no control or visibility.The agency only uses using secure mechanisms (e.gor VPN) to communicate with partner agencies.The agency only uses strong authentication mechanisms (e.gFIPS 2 complaint MFA) with partner agencies.Data provided to partner agenciesis protected at a level commensurate with the agency’s risk tolerance and in accordance with federal guidelines. The following are assumptions about the The contains untrusted entitiesThe agencycannotapply policy in the The following are assumptions about thepublic userThepublic user is accessing agency services from the nternetThe public user is unmanaged and untrusted by the agency. Conceptual ArchitectureThe Traditional TIC Use Case focuses on the scenario in whichgency network traffic traverses TIC ccess ointwhen moving to and from external zonesAs shown inFigure this use caseis composed primarily of sixtrust zonesagency campus, TIC access point, web, public user, external partner, and partner agencyTIC access point. These trust zones are detailed in Table 2To simplify the visualization and descriptions, the ase shows single trust zoneto represent classes of external entities or environments. However, this simplification is not meant to imply that an agency must treat all entities and environments of the same class (e.gxternal artners) in the same manner. Federal Information Processing Standard 1402,” National Institute of Standards and Technology (2019). https://csrc.nist.gov/publications/detail/fips/140/2/final ��6 ��TIC 3.0 Traditional TIC Use CaseApri

5 l2021The traditional TIC model was commo
l2021The traditional TIC model was commonly represented as comprising an “Internal Zone” containing agency components and the TIC access point as its boundary, and an “External Zone” containing the arious entities the agency would communicate with. This model is conceptualized in TIC3.0 by nesting trust zones within a larger, primary trust zone, which is depicted as the Agency Trust Zone Figure 3. In this scenario, the nestedtrust zones include the agency campus, the TIC access point, thebranch office, and the remote userThese trust zones can be nested within the Agency Trust Zone because they share a boundary that is secured by the same PEP(i.e., the TIC access point). Figure 3Traditional TIC Conceptual ArchitectureThe branch office and remote user trust zones are included in this use case because they are commonldeployed when implementing TIC 2.2. In the TIC 2.2 model, ose zones send traffic to external entities through agency TIC access points. It is important to note that the architecture depicted in Figure 3 can be tailored depending on anagency’s uniquerequirements. For example, while this nested representation includes the TIC access point, some traditional TIC deployments may consider the TIC access point as being outside the Agency Trust Zone “TIC Reference Architecture v2.2,” Department of Homeland Security (2017). ttps://www.cisa.gov/sites/default/files/publications/TIC_Ref_Arch_v2.2_2017.pdf. ��7 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021or as a PEP rather than a distinct zoneAlso, some agenciesdeployments of theTraditional TIC Case may include only a subset of the listed trust zones.he trust zones are labeledwith levels of trustusing the threelevel example trust hierarchy from theReference ArchitectureWhile these levels were selected based on existing pilots or deployments, they may not capture the needs or requirements of all agencies. As such, gencies may determine and label trust zones according to the trust levels that best describe their environment.For example, an agency may not consider the partner agency as having a high trust level and may decide to label it with a medium trust level. rust levels in this use case are intended to beexamples. Agencies may define a assign trust levels to align with theirquirements, environments, and risk tolerance. Table 2briefly explains why each entity is labeled with either a high, medium, or low trust zone in this use case to help agencies determine what is most appropriate in their implementation.Table Trust Zonesthe Traditional TIC Case Trust Zone Description Agency C ampus Trust Zone The Agency Campus T rust Z one is the logical zone for the agency campus or the agency’s enterprise network. The trust zone includes management entities MGMTsuch as the NOC, SOC, and other entities. The agency maintains control over and visibility into the agency campusis responsible for defining policies, implementing them in the various PEPs controled by the agency, and identifying and responding to incidents. Given the control and visibility maintained by the gency, the Agency Campus rust one labeledwith gh trust levelin this use TIC Access Point Trust Zone The TIC A cces s Point T rust Z one is the logical zone that depicts the location where the agency campus’external connections are consolidatedThe TIC access point must have, at a minimum,TIC 2.2 security controls in place to secure and monitor the traffic entering and leaving the agency campus. This trust zone may be part of the gency campus as its TICAP ormay be provided by an external entity as part of an MTIPS solution or a MultiService TICAP.TheTIC ccess ointrust one may also host agency services for useby external entitiesWhile the agency may have limits in terms of control and visibility into this zone, the TICAccessPoint rust one labeledwith high trust levelin this usecasedue to the welldefined security protections and NCPS telemetry employed by the TIC ess oint. Agency Trust Zone The Agency T rust Z one is a logical zone that represents the accreditation boundary for the gency. It containssmaller,nested trust zoneincludingthe gency campus and the TIC ccess ointmayalsoincluderanch fficeand emote sersThis zone may not existin some agencies’ implementationor may contain different components. Forexample, some agencies may not consider the TIC ccess ointranch fficesor emote sersinside a common boundary Given that it is omprisezones labeled with high trust levelsthe Agency rust one labeledwith high trust levelin this usecase ��8 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Trust Zone Description Web Trust Zone The Web T rust Z one is a logical zone that depicts an environment containing untrusted external servicesthat agency users may access, with no PEPsor MGMTwhere the agency, or entities acting on its behalf, may

6 deploy policies. Given these limitation
deploy policies. Given these limitations, the eb rust one labeledwith lowtrust levelin this use Public User Trust Zone The Public User T rust Z one is a logical zone that depicts a n untrusted and unmanaged user of gency services with no PEPs or MGMTwhere the agency, or entitiesacting on its behalf, may deploy policies. Given these limitations, the ublic ser rust one labeledwith low trust level in this usecase. External Partner Trust Zone The External Partner T rust Z one is a logical trust zone for an external partner that offerservices to or receivservices from the agency.The agency has limited control over and visibility into theexternal partner environment. The agency can provide certain defined capabilities for external partner to manage, and the external partner is responsible for protecting the underlying infrastructure.The trust zone may include a MGMTwithfunctions locally scoped for the environment. The between the external partnerand the agency campusmay usea sharedresponsibility deployment modelwith hardware owned and managed by the TICAP and services deployed by the agencyven the more limited control and visibility available to the gency, the xternal artner rust one labeledwith medium trust levelin this use Partner Agency Trust Zone The Partner Agency T rust Z one is a logical trust zone for a government ag ency that partnerswith the agencysupport of mission objectives and business operations. The agency has limited control and visibility into the partner agency, assuming the partner agency employs one or more TIC ases for its connectivityandensurappropriate protections and telemetry for NCPSBoth he agency and the partner agency maintain covering traffic between these trust zonesWhile the agency has similar limits in terms of control and visibility as the external partnertheartner ency rust one labeled with igh trust levelin this usecase due to its similar security protections and NCPS telemetry Branch Office Trust Zone The Branch Office T rust Z one is a logical trust zone showing a common TIC 2.2 usecase where a branch office routes its traffic through the agency’s TICccess ointGiven the control and visibility maintained by the gency, the ranch ffice rust one is labeled with high trust levelin this use Remote User Trust Zone The Remote User T rust Z one is a logical trust zone showing a common TIC 2.2 usecase where a remote user connects to the gency campus via a VPN, or similar, and routes its traffic through the agency’s TICccess ointwith a logical separation maintained between the remote user’s system and thgency campus networkGiven the control and visibility maintained by the gency, the Remote User rust one is labeled with high trust levelin this use ��9 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Security PatternsFoursecurity patternscapture the data flows for the Traditional TIC Use CaseEachdistinct sourcesstinationsand options for policy enforcement.Regardless of the options chosen, due diligence must be practicedensuring agencies are protecting their information in line with their risk toleranceshen additional security capabilitiesare necessary to manage residual risk, agencies shouldapply the controls or explore options for compensating capabilitiesthat achieve the same protections to manage risks. The curity patternincludethe followitrust zone destinationsWebPublic External artner, andPartner gency6.1Security Pattern 1: Agency Campus to Webigure 4illustrates connections where agency entities connect to the open nternetor webfor services.Connections in this security pattern are among the riskiestbecause the web isan untrusted entitythereforthe greatest amount of rigor should be applied tothe securitycapabilities. In this ecurity attern, the PEPthe agency campusapplies any applicable security policiand ensures the appropriate traffic is forwarded to the TIC ccess oint. Then, the TIC ccess oint applies all applicable security policfore transiting traffic to or from the eb.Figure : Security Pattern 1: Agency Campus to Web Implementation Consideration Agencies should apply the greatest rigor to security capabilities for the connections between the agency campus and the web. ��10 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.2Security Pattern 2: Public User to AgencympusFigure 5illustrates connections where a publicuserservicesprovided by the agencycommonly in the form of servicesConnections in this security pattern are among the riskiest since a possibly untrusted public user connecting toagency andits servicesthereforethe greatest amount of rigor shouldbe applied to the security capabilities. Since users are accessingservicesthatmay contain agency dataagencies must practice due diligence in protecting their information in linewith their risk tolerances.In this ecurity attern, the PEPat the agency campusapplies any applicable security policand ensur

7 es the relevant service traffic is forwa
es the relevant service traffic is forwarded to the TIC ccess oint. This PEP alsoensurethat data flows to and from blic sers are properly protected and only authorized services and information are exchanged with eligible users. The TIC ccess oint applies all applicable security policiesbefore transiting traffic to and from the ublic ser.If an agency service is deployed to the TIC access point, the may be a shared responsibility deployment modelwith hardware owned and managed by the TICAP and services deployed by the agency. In this scenario, the TIC access point ensures that only appropriate traffic is sentto the agency services, and the agency ensures that only authorized users can access and exchange authorized information with the agency services. Figure : Security Pattern 2: Public User to Agency Implementation Consideration Agencies should apply the greatest rigor to security capabilities where public users accessagency servicesnformationmust beprotected in line with their risk tolerances ��11 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.3Security Pattern : Agency Campus to External PartnerFigure 6illustrates the scenariowhere an agency the services of or provides services to an xternal artner. Entities within the gency ampus either tablish a new protected connection or usean existing protected connection with the external partner access resources from thatpartnerIn this ecurity attern, the PEPat the agency campusensures that data flows to and from xternal artners are properly protected and only authorized services and information are being exchanged. Theat the agency campusapplies any applicable security polices and ensures the appropriatetraffic is forwarded to the TIC ccess oint. The TIC ccess oint applies all applicable security polices before transiting traffic to or from the xternal artner. Figure : Security Pattern 3: Agency to External Partner Implementation Consideration Agencies must ensure that (1) appropriate protections are in place when connecting with an external partnerand (2) only authorized services are being used and authorized information is being exchanged. ��12 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.4Security Pattern Agencympusto Partner AgencyFigure 7illustrates connections where an agencyconnector providservices toartnergency(e.g., ntergency traffic. This communicationcan take place through two options, described below.Regardless of the option chosen, due diligence must be practiced to ensurgencies are protecting their information in line with their risk tolerances.ne option permits a direct network connection to the artner gencyhe artner gency employs appropriate TIC or all its external network connectionsensuring a baseline ofproections along withinformation sharing with NCPSHowever, agencies may supplement these protections to better reflect their risk tolerances.Figure : Security Pattern 4: Agency Campus to Partner Agency Implementation Consideration Agencies may connect directly with partner agencies so long as NCPS visibility exists at both ends. ��13 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 The first option (left) has traffic flowing between the a gency c ampus and the artner gency through a TIC ccess ointEntities within the gency ampus either establish a protected connection to the artner gency or make use of an existing protected connection established with the artner gencyAgency and partner agency resources can then be accesshrough this protected channelTheat the agency campus and theTIC access pointensure that data flows to and from artner genciesare properly protected and only authorized services and information are being exchanged. The second option (left) consists of a direct connection from the a gency ampus to the artnergencyEntities within the agency campus either establish a protected connection to the artner gency or use an existing protected connection established with the artner gency. Agency and partner agency resources can then be accesshrough this protected channel.These protected channels may go through a private connection between the agency and the partner agency, or through shared infrastructure like the nternet. Theat the agency campus ensureproper traffic forwardingsuch that only authorized traffic is forwarded to the artner gencyThis PEP alsoensures thatconnections for flows are properly protected and only authorized services and information is exchanged with the artner gencyhis option permits a direct network connection to the artner genche artne

8 r gency employs appropriate TIC ases for
r gency employs appropriate TIC ases for all its external network connectionsensuring appropriate proections and information sharing with NCPSHowever, agencies may supplement these protections to better reflect their risk tolerances. The agency or partner agency may provide telemetry from this option to NCPS. Applicable Security CapabilitiesThe TraditionalTIC Use Case draws on security capabilities from both thenew and legacy TIC guidance.The list ofsecurity apabilities in the legacyTIC Reference Architecturev2.2outlinethe requirements to secure, manageand operate aTIC ccess oint.TheSecurity Capabilities Catalogcontains a broader set of security capabilities that agencies can use to accomplish TIC objectives across TIC ases.While the TIC 2.2 security capabilities can provide protection for most, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0securitycapabilities to reflect their agency requirements, risk tolerances, and other factorsUnlike the TIC 2.2 security capabilities, C 3.0 security capabilitiesare not prescriptive, but rather are descriptive, allowing for flexibility in implementation.Appendix B provides mappings between the TIC 2.2 and TIC 3.0 security capabilities, for reference. ��14 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021The sections below explaihow existing TIC 2.2 security capabilities at a TIC access pointcan be used part of agency implementations of TIC 3.0 security capabilities7.1Universal Security CapabilitiesTheSecurity Capabilities Catalogcontains a table of niversaecurity apabilitiesthaapply acrossTICuse cases. enciescan determine the level of rigor that is applied to theseecurity apabilities such that in line with theagencyrisk toleranceand federal guidelines. Unique application guidance for the universal security capabilitiesin the Traditional TIC Use Case outlined in Table Agencies may determine the level of rigor that is applied to these security capabilities based on their agency risk tolerance and federal guidelines. Table : Universal Security CapabilitiesUniversal Security Capabilities Capability Description Use Case Specific Guidance Backup and Recovery Backup and recovery entails k eeping copies of configuration and data, as needed, to allow for the quick restoration of service in the event of malicious incidents, system failuresor corruption. TIC access points handle backup and recovery of configuration and data for their systems and services. If agencies deploy services to the TIC access point or provide configurationor data to a TIC access pointagenciesshould include those services, configurations, or data in theirbackup and recovery routines. Central Log Management with Analysis Central log management with analysis is the collection, storage, and analysis f telemetry, where the collection and storage are designed to facilitate data fusion and where the security analysis aids in discovery and response to malicious activity. TIC access points centralize and analyze their internally collected logs. If possible, agencies should integrate elemetry available from TIC access points totheircentral log management and analysis environment. Configuration Management Configuration management is the mplementation ofa formal plan for documenting and managingchanges to the environment, and monitoring for deviations, preferably automated. TIC access points implement a formal plan for configuration management for their systems and services. If agencies deploy services to the TIC access point or provide configuration or data to a TIC access point, agenciesshould handle changes to these services, configuration, or data through their formal configuration management plan. ��15 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Incident Response Planand Incident Handling I ncident response planning and incident handling is the ocumentationand implementation ofa set of instructions, procedures, or technical capabilities to sense and detect, respond to, limit consequences of malicious cyberattacks, and restore the integrityof the network and associated systems. TIC access points imple ment incident response plans covering incidents discovered or occurring in the TIC access point. Agencies should work with the TICAP to ensure that the SOC and NOC working ontheirbehalf coordinates any incident response activities with the TIC access point. Inventory I nventory entails d eveloping, documenting, and maintaining a current inventory of all systems, networks, and components so that only authorized devices are given access, and unauthorized and unmanaged devices are found and restrictfrom gaining access. TIC access points ma intain inventories of their systems, services, and entities Agencies should maintain an inventory of their connections to TIC access poi

9 nts as well as any external partners par
nts as well as any external partners partner agencies, and any agency services deployed to the TIC access point Leas t Privilege Least privilege is a design principle wherebyeach entity is granted the minimum system resources and authorizations that the entity needs to perform its function. TIC access points are configured according to least privilege. Agencies should apply least privilege to any services deployto the TIC access point andusers permitted access to TIC access point systemsand services Secure Administration Secure administration entails performing administrative tasks in a secure manner, using secure protocols. TIC access points are configured to use secure administration. Agencies should use secure administration practices when administering any systems or services they have administrative privilege forTIC access points Strong Authentication Strong authentication v erif ies the identity of users, devices, or other entities through rigorous means (e.g., multifactor authentication)before granting access. TIC access points are configured to use strong authentication for internal stems. Agencies should use strong authentication when accessing any systems or services in TIC access points, including any agency services deployed to the TIC access point ��16 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Time Synchronization Time synchronization is the coordination of system e.g., rvers, workstations, network devices)clocks to minimize the difference between system clock times and enable accurate comparison of timestamps between systems TIC access points maintain time synchronization across their ystems. If possible, agenciesshould synchronize their systems, including agency services deployed to the TIC access point,to integratthe telemetry from TIC access points Vulnerability Management Vulnerability management is the practice of proactively workingto discover vulnerabilities including the use of both active and passive means of discovery and takingaction to mitigate discovered vulnerabilities. TIC access point s conduct regular active and passive security reviews to discover and mitigate risks in the TIC ss pointEach agencand SOCshould include TIC access points in the security reviews of thegenc Patch Management Patch management is the i dentif ication , acquisition, installation, and verification patches for products and systems. TIC access points handle patch management for systems and services that support it (e.g., firewalls, SIEMs, etc.). Agencies may need to handle patch management for agency services deployed to the TIC access point. Auditi ng and Accounting Audi ting and accounting includes apturing business records(e.g., logs and other telemetrymaking them available for auditing and accounting as required, and designing an auditing system that considers insider threat (e.g., separation of duties violation acking) such that insider abuse or misuse can be detected. TIC access points maintain audit and record access. To facilitateagency auditing and accounting, agencies should integrate the records from TIC access pointsinto their own record keeping system. Resilience Resilience entails e nsuring that systems, services, and protections maintain acceptable performance under adverse conditions. TIC access point s have resilience features including uninterrupted power, diverse routesand in the case of some TICaccess points, geographic diversity Agencies should understand the resilience provided by their TIC access point, and, if possible, have multiple routes to their TIC access point ��17 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Enterprise Threat Intelligence Enterprise t hreat in telligence is the usage ofthreat intelligencefrom private government sourcesimplement mitigations for the identified risks. TIC access points can integrate threat intelligence from outside sources. Agencies should understand the threat intelligence sources TIC access points employ and may supplement the intelligenceif needed. Situational Awareness Situational awareness is m aintain ing effective awarenessboth current and historical, across all components. TIC access points maintain si tuational awareness across customers. If possible, agencies should integrate telemetry available from TIC access points including telemetry from agency services deployed in the TIC access pointinto the platforms they use to maintain situational awareness,to improvetheir overalsituational awareness. Dynamic Threat Discovery D ynamic threat discovery is the practice of using dynamicapproaches (e.g., heuristics, baselining, etc.) to discover new malicious activity. TIC access points provide telemetry to an agency

10 for use in their dynamic threat discove
for use in their dynamic threat discovery program. Policy Enforcement Parity Policy enforcement parity entails onsistently applying security protections and other policies, independent of the communication mechanism, forwarding path, or endpointsused. This capability is commonly implemented by having gency entities route traffic through gency TIC access points when communicating with the eb or external partners.When working with a partner agency, this capability implemented by ensuring both agencies e appropriate TIC protections for their external connections. Effective Use of Shared Services Effective use of s hared services means that shared services areemployed where applicable, andindividually tailored and measured to independently validate service conformance, and offer effective protections for tenants against malicious actors, both external and internal to the service provider. This capability has been commonly implemented usingshared infrastructure when implementing Single Service TICAPs or using MuService TICAPs. ��18 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Integrated Desktop, Mobile, and Remote Policies Integrated desktop, mobile, and remote policies defineand enforcepolicies that apply to a given agency entit independent of its location. This capability has been commonly implemented by having all gency entities route traffic through gency TIC access pointswhen communicating with the eb or external partners. 7.2Policy Enforcement Point Security Capabilitiessecurity capabilitiesfocus thenetworklevel andinform technical implementation fora given use case, such as securing agency campus communication with agencysanctioned external partners. Agencies ve the discretion to determine the applicability and level of rigor necessary for applying PEP security capabilities based on their mission, the policy enforcement options available, federal guidelinesand risk tolerance. From theSecurity Capabilities Catalog, the PEP security capability groups applicable to this use casecorrespond to the following security functions: FilesEmail,Web,Networking,Resiliency,Domain Name System (DNSIntrusion Detection, Enterprise,Unified Communications and Collaboration(UCC), andData rotectio Agencies may determine the applicability and rigor of the security capabilities based on federal guidelines, mission needs, available policy enforcement options, and risk tolerance. The PEPsecuritycapability listing is not exhaustive. Additional security capabilities may be deployed by agencies to reflect their risk tolerances, early adoption of security capabilities, the maturity level of existing cyber programs, and other factorsTable : Files PEP Security CapabilitiesFiles PEP Security Capabilities Capability Description Use Case Specific Guidance Anti - malware Anti - malware protections detect the presence of malicious code and facilitate its quarantine or removal. TIC access point s can ap ply anti - malware protections in their email services (see Table 5and traffic (see Table 6 Content Disarm and Reconstruction Content d isarm and r econstruction technology detects the presence of unapproved active content and facilitates its removal. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities ��19 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Detonation Chamber Detonation c hambers facilitate the detection of malicious code using protected and isolated execution environments to analyze the files. New cap ability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilitie Data Loss Prevention Data l oss p revention (DLP) technologies detect instances of the exfiltration, either malicious or accidental, of agency data TIC access point s employ DLP programsgenciesshould understand the protections offered by the TIC access pointDLP program and integrate them into theiroverall DLP program. Table : Email PEP Security CapabilitiesEmail PEP Security Capabilities Cap ability Description Use Case Specific Guidance Anti - phishing Protections Anti - phishing protections detect instances of phishing and prevent users from accessing them. Agencies can use e mail services in TIC access point, which provide anti phishing protections. Anti - spam Protections Anti - spam protections detect and quarantine instances of spam Agencies can use e mail services in TIC access point, which provide spam detection and quarantine services. Authenticated Received Chain Authenticated r eceived c hain allows for an intermediary, like a mailing list or forwarding service, to sign its own authentication of the original email, allowing downstream entities to accept the intermediary’s authentication even if the email was changed. New capability in TIC

11 3.0 that can be implemented to supple
3.0 that can be implemented to supplementthe TIC 2.2 capabilities Data Loss Prevention DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data TIC access points employ DLP programs. Agenciesshould understand the protections offered by the TIC access point’sDLP program and integrate them into theiroverall DLP program. ��20 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Cap ability Description Use Case Specific Guidance Domain Signature Verification for Incoming Email Domain signature verification protectionsauthenticate incoming email rding to the mainbased Message Authentication Reporting and ConformanceDMARCemail authentication protocol defined in Request for Comments (RFC 7. Agencies can use e mail services in TIC access point, which can perform integrity checks, usingschemes like mainKeys Identified MailDKIM or Sender Policy Framework (, on incoming email. Domain Signatures for Outgoing Email Domain signature protections facilitate the authentication of outgoing email by signing the emails and ensuring that external parties may validate the email signaturesaccording to theDMARC email authentication protocol that is defined in RFC Agencies can use e mail services in TIC access point, whichcan digitally sign outbound email using schemes like DKIM Encryption for Ema Transmission Email s ervices are configured to use encrypted connections, when possible, for communications between lientsand other mail ervers New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Malicious Link Protections Malicious link p rotections detect malicious linksin emails and prevent users from accessing them. New capability in TIC 3.0 that can be mplemented to supplement the TIC 2.2 capabilities Link Click - hrough Protection Link c lick - t hrough p ro tections ensure that when a linkfrom an email is clicked, the requester is directed to a protection that verifies the security of the linkdestinationbefore permitting access. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 pabilities EINSTEIN 3 Accelerated Email Protections EINSTEIN 3 Accelerated ( E 3 A ) 8 is an intrusion prevention capabilityoffered by NCPS, provided by CISA, that includes an mail ilteringsecurity service. Agencies can use e mail services in TIC access point, which support the integration of NCPS Email rotections “Domainbased Message Authentication, Reporting, and Conformance Request for Comments: 7489,” Internet Engineering Task Force (2015). https://tools.ietf.org/html/rfc7489“EINSTEIN 3 Accelerated,” Cybersecurity and Infrastructure Security Agency(2013). https://www.cisa.gov/publication/einsteinaccelerated ��21 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table : Web PEP Security CapabilitiesWeb PEP Security Capabilities Capability Description Use Case Specific Guidance Break and Inspect Break and Inspect systems , or encryption proxies,terminate encrypted traffic, logging or performing policy enforcement against the plaintext, and encrypting the traffic, if applicable, before transmitting to the final destination. New capability in TIC 3.0 that can be mplemented to supplement the TIC 2.2 capabilities BreakandInspect solutions should be considered in the context of the sensitivity of data being scanned, the trust level designation of the source and destination, other security capabilities that offer comparable visibility, and the rotocols and services in use. Active Content Mitigation Active c ontent m itigation protections detect the presence of unapproved active content and facilitate its removal. TIC access point s can detect and remove malicious content in traffic Certifica te enylist Certificate d enylist ing protections prevent communication with entities that use a set of known bad certificates. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Conte nt Filtering Content f iltering protections detect the presence of unapproved content and facilitate its removalor denial of access TIC access point s can detect and remove malicious content in traffic. Authenticated Proxy Authenticated p roxies requir e entities to authenticate with the proxy before making use of it, enabling user, group, and locationaware security controls. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Data Loss Prevention DLP technologies detect instances of e exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and ageiesshould understand the protections offered by the TIC access pointDLP program andintegrate them into theoverall DLP program. TIC 2.2 includes a variety

12 of protections for unencrypted web traf
of protections for unencrypted web traffic, which may be supplemented depending on the use of encrypted web traffic used by an agency ��22 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Domain Resolution Filtering Domain resolution filtering prevents entities from using the DNSover Hypertext Transfer Protocol Secure HTTPSor DoHdomain resolution protocol, possibly evading DNSbased protections. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Protocol Compliance Enforcement Protocol c omplian ce e nforcement technologies ensure that traffic complies with protocol definitions documented by the Internet Engineering Task Force (IETF) 10. TIC access point s employ proxies for traffic which ensurecompliance of the sessions. Domain Category Filtering Do main c ategory f iltering technologies allow for classes of domains (e.g banking, medical) to receive a different of security protections. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Domain Reputation Filter Domain r eputation f iltering protections are a form of omain enylistingbased on a domain’s reputation, as defined by either the agency or an external entity. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 pabilities Bandwidth Control Bandwidth c ontrol technologies allow for limiting the amount of bandwidth used by different classes of domains. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Malicious Content ering Malicious c ontent f iltering protections detect the presence of malicious content and facilitate its removal. TIC access point s can detect and remove malicious content in traffic Access Control Access c ontrol technologies allow an agency to define policies limiting what actions may be performed by connected users and entities. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities RFCs,” Internet Engineering Task Force (2021). https://www.ietf.org/standards/rfcs/ ��23 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table : Network PEP Security CapabilitiesNetwork PEP Security Capabilities Capability Description Use Case Specific Guidance Access Control Access c ontrol protections prevent the ress, egress,or transmissionof unauthorized network traffic TIC access point s employ a combination of firewalls and proxies to limit the traffic coming into and leaving the TIC access point When VPNs, or similar technologies, are used to bridge together the gency ampusnetwork with other environments, the gency ampus should use access control protections to ensure only appropriate traffic is sent to and received from the other environment I nternet Address enylist I nternet address d enylist ing protections prevent the ingest or transiting of traffic received from or destined to a enylisted internetaddress. TIC access point s can drop w eb traffic to specific IP addresses and can alert on attempts to access specific IP addresses. Host Containmen Host c ontainment protections enable a network to revoke or quarantine a host’s access to the network. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Network Segmentation Network s egmentation separates a given etwork into subnetworks, facilitating security controls between the subnetworks, and decreasing the attack surface of the network. TIC access point s employ network segmentation internallyBy routing their external connections through T access point, agenciessegment their networks from external environments. When VPNs, or similar technologies, are used to bridge together the gency ampusnetwork with other environments, the gency ampus network should be segmented so that leastprivilege access ismaintained, and to limit the impact of the compromise of the external environment ��24 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Micro - segmentation Microsegmentation divides the network, either physically or virtually, according to the communication needs of application and data workflows, facilitating security controls to protect the data. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Table : Resilien

13 cy PEP Security CapabilitiesResiliency P
cy PEP Security CapabilitiesResiliency PEP Security Capabilities Capability De scription Use Case Specific Guidance D istributed Denial of Service Protections D istributed Denial of Service ( DDoS ) protections mitigate the effects of distributed denial of service attacks. TIC access point s provide DDoS protections. Elastic Expansion Elastic expansion enables agencies to dynamically expand the resources available for services as conditions require. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Regional Delivery Regional d elivery technologies enable the deployment of agency services across geographically diverse locations. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities Table omain ame ystemPEP Security Capabilitiesomain Name SystemPEP Security Capabilities Capability Description Use Case Specific Guidance D omain Name holing D omain name s inkholing protections are a form of enylistingthat protect clients from accessing malicious domains by responding to DNS queries for those domains. Agencies can use DNS resolution services in TIC access point, which provide DNS inkholing ��25 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Domain Name Verificationfor Agency Clients Domain n ame verification protections ensure that domain name lookups from agency clients, whether for internal or external domains, are validated according to Domain Name System Security ExtensionsDNSSEC Agenc ies can use DNS resolution services in TIC access pointwhich provideDNSSEC verification Domain Name Validationfor Agency Domai Domain name validation protections ensure that all agency domain names are secured using DNSSEC, enabling external entities to validate their resolution to the domain names. Agencies can use DNS hosting services in the TIC access point, which support DNSSEC. EINSTEIN 3 Accelerated Domain Name Protections E 3 A is an intrusion prevention capabilityoffered by NCPSprovided CISA, that includes a DNS inkholingsecurity service. Agenc ies can use DNS resolution services in TIC access point, which can support the integration of NCPS A DNS rotections Table : Intrusion Detection PEP Security CapabilitiesIntrusion Detection PEP Security Capabilities Capability Description Use Case Specific Guidance Endpoint Detection and sponse Endpoint d etection and r esponse (EDR) tools combine endpoint and network event data to aid in the detection of malicious activity. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities Intrusion Detection and Prevention Systems Intrusion detection s ystems detect and report malicious activity. Intrusion revention systeattempt to stop the activity TIC access point s pass network traffic through ntrusion etectionystem When VPNs, or similar technologies, e used to bridge together the gency ampus network with other environments, the gency ampus should ensure that traffic to and from the external environment are passed through an intrusion detection and prevention system ��26 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Adaptive Access Control Adapti ve a ccess c ontrol technologies factor in additional context, like security risk, operational needs, and other heuristics, when evaluating access control decisions. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities D eception Platforms Deception p latform technologies provide decoy environments, from individual machines to entire networks, that can be used to deflect attacks away fromthe operational systems supporting agency missions/business function New capability in TIC 3.0 that ca n be implemented to supplement the TIC 2.2 capabilities Certificate Transparency Log Monitoring Certificate t ransparency l og m onitoring allows agencies to discover when new certificates are issued for agency domains. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Table : Enterprise PEP Security CapabilitiesEnterprise PEP Security Capabilities Capability Description Use Case Specific Guidance Security Orchestratio Automation and Response Security O rchestration, A utomation , and esponse (SOAR)tools define, prioritize, and automate the response to security incidents. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities Shadow Information Technology Detection Shadow information technology ( IT ) etectionsystems detect the presence of unauthorized software and systems in use by an agency. New capability in TIC 3.0 that can be implemented to supplement the TIC

14 2.2 capabilities ��27 &#
2.2 capabilities ��27 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Virtual Private Network VPN solutions provide a secure communications mechanism between networks that may traverse across unprotected or public networks. TIC access point s provide VPN services with varying levels of protection applied, depending on the entity thatthe VPN tunnel is establishedwithWhen VPNs, or similar technologies, are used to bridge the gency ampus network with other environments, the gency ampus network should applynetwork segmentation, pplication ateways, virtual desktop infrastructure etc.to ensure least privilege access is maintainedand to limit the impact of compromiseof the other environment Table : Unified Communications and Collaboration PEP Security CapabilitiesUnified Communications and Collaboration PEP Security Capabilities Capability Description Use Case Specific Guidance Identity Verification Identity verification ensures that access to the virtual meeting is limited to appropriate individuals. Waiting room features, wherethe meeting host authorizes vetted individuals to join the meetingcan also be utilized. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilitie Encrypted Communication Communication between virtual meeting participants and any data exchanged is encrypted at rest and in transit. Some UCC offerings support endend encryption, where encryption is performed on the clients and can only be decrypted by the other authenticated participants and cannot be decrypted by the UCC vendor. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Connection Termination Connection termination m echanisms ensure the meeting host can positively control participationthroughinactivity timeouts, ondemand prompts, unique access codes for each meeting, host participant eviction, and even meeting duration limits. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities ��28 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Data Loss Prevention M ec hanisms should be implemented to controlthe sharing of information between UCC participants, intentional or incidental.This may be integrated into additional agency DLP technologies and can include keyword matching, attachment file type or existence prohibitions, attachment size itations, or even audio/visual filters. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Table : Data Protection PEP Security CapabilitiesData Protection PEP Security Capabilities Capabi lity Description Use Case Specific Guidance Access Control Access c ontrol technologies allow an agency to define policies concerning the allowable activities of users and entities to data and resources. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Protections for Data at Rest Data p rotection at rest aims to secure data stored on any device or storage medium. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities Protections for Data in Transit Data protection in transit, or data in motion, aims to secure data that is actively moving from one location to another, such as across the internet or through a private enterprise network. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities Data Loss Prevention DLP te chnologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and the gency should understand the protections offered by the TIC access pointDLP program andintegrate them into the gency’s overall DLP program. Data Access and Use Telemetry Data access and use telemetry identifies agencysensitive data stored, processed, or transmitted, including those located at a service provider, and enforcing detailed logging for access or changes to sensitive data. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities ��29 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Telemetry RequirementsFigure shows the conceptual architecture of theTraditional TIC Use Casewith the telemetry requirements.These flowsindicate when an agencyshouldshare telemetry with CISAIn the Traditi

15 onal TIC Use Case, there are two types o
onal TIC Use Case, there are two types oftelemetry that might get shared: CDM telemetry and NCPS telemetry. Most raditional TIC deployments have CDM telemetry shared with CISA by capabilities deployed on the gency ampus, and NCPS telemetry is shared with CISA from the TIC access pointAgencies may provide telemetry fordirect connections to partner agenciesby working with NCPSConsult the NCPS rogramand CDM rogramfor further details Agencies share telemetry information with CISA through multiple programs, as coordinated directly, to ensure visibility and situational awareness are preserved and shared protections can be maintained. Figure Traditional TIC Telemetry Sharing with CISA “National Cybersecurity Protection System (NCPS)”, Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/nationalcybersecurityprotectionsystemncps.“Continuous Diagnostics and Mitigation (CDM)”, Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/cdm. ��30 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Conclusionraditional TIC Use Case defines how network security should be applied when an agency has personnel in a physical location (an agency campus) that uses a TIC access point, either an agency TIC Access Provider (TICAPManaged Trusted Internet Protocol Services MTIPSwhen accessing the web, trusted external partners, or partner government agencies. This document provides guidance on how an agencycan configure its raditional TICdata flows and apply relevant TIC 3.0 security capabilities.It considers four securitypatterns relevant to the traditional TIC deploymentSecure gency campus access to Public user to secure agency campus;Secure gency campus access to agencysanctioned external partners; andSecure agency campus access to partneragencies.This useshould be considered the default use case, as defined by OMB Mandused in conjunction with the Security Capabilities Catalogand other TIC 3.0 guidance documentation. ��31 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Appendix A Glossary and DefinitionsThis glossary contains terms and definitions that are used across the TIC documents and not necessarily applicable to all use cases.Boundary:A notional concept that describes the perimeter of a zone (e.g., mobile deviceservicesgeneral support system (GSS), SoftwareService (SaaS), agency, etc.) within a network architectureThe bounded area must have an information technology (IT) utility.Internet:The internet is discussed in two capacities throughout TIC documentation:A means of data and IT traffictranspoAn environment used for web browsing purposes, referred to as “WebManaged Trusted InternetProtocol Services (MTIPS)Services under GSA’s Enterprise Infrastructure Solutions (EIS) contract vehicle that provideTIC solutions to government clientmanaged security service. It is of note that the EIS contract is replacing the GSA Networx contract vehicle that is set to expire inFiscal Year (FY) 2023.Management Entity (MGMT): A notional concept of an entity that oversees and controls security pabilities. The entity can be an organization, network device, tool, serviceor application. The entity can control the collection, processing, analysis, and display of information collected from the policy enforcement (, and it allows IT professionals to control devices on the network.National Cyber Protection System (NCPS): integrated systemsystems that delivers a range of capabilities, including intrusion detection, analytics, intrusion prevention, and information sharing capabilities that defend the civilian ederal overnment's information technology infrastructure from cyber threats. The NCPS capabilities, operationally known as EINSTEIN, are one of several tools and capabilities that assist in federal network defensePolicy Enforcement Point (PEP):A security device, tool, functionor application that enforcesecuritypolicies through technicalcapabilities.Policy Enforcement Point Security CapabilitiesNetworklevel capabilities that inform technical implementation for relevant use Reference Architecture (RA):An authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions.Risk Management:The program and supporting processes to manage information security risk to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation, and includes: (i) establishing the context for riskrelated activities; (ii) assessing risk; (iii) responding to risk once determined; and (iv) monitoring risk over time.Risk Tolerance:The level of risk or degree of uncertainty that is acceptable to organizations and is a key element of the organizational risk frame. An organization's risk tolerance level is the amount of corporate data and systems that can be risked to an acceptable level.Sec

16 urity Capability:A combination of mutual
urity Capability:A combination of mutuallyreinforcing security controls (i.e., safeguards and countermeasures) implemented by technical means (i.e., functionality in hardware, software, and firmware), physical means (i.e., physical devices and protective measures), and proceduralmeans (i.e., procedures performed by individuals). Security capabilities help to define protections for information being processed, stored, or transmitted by information systems.Security Pattern: Description of an endend data flow between two trust zones. Security patterns may have an associated set of security capabilities or guidance to secure the data flow along with one or more of the zones. ��32 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Seeking Service Agency (SSA)An agency that obtains TIC services through an approved MultiService TICAP.Security Information and vent anagement(SIEM): n approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system.Telemetry: Artifacts derived from security capabilities that provide visibility into security posture.TICThe term “TIC” is used throughout the Federal Government to denote different aspects of the TIC initiative; including the overall TIC program, a physical TIC access poin(also known as a Traditional TIC), and a TIC Access Provider(TICAP see below). This document refers to TIC as an adjective or as the Trusted InternetConnections initiative.TIC Access Point: The physical location where a federal civilian agency consolidates its external connectionsand has security controls in place to secure and monitor the connectionsTIC Access Provider (TICAP)An agency or vendor that manageand hostone or more TIC access pointsSingle Service TICAPs serve as a TIC Access Provider only to their own agencyMultiService TICAPs also provide TIC services to other agencies through a shared servicesmodelTIC Initiative: Program establishedto optimize and standardize the security of individual external network connections currently in use by the Federal Government, to include connections to the internet. Key stakeholders include CISA, OMB, and GSATIC Overlay:A mapping fromproducts and services to TIC ecurity apabilities.TIC Use Case:Guidanceon the secure implementationand/or configuration of specific platforms, services, and environments. A TIC use case contains a conceptual architecture,one or more security pattern options, security capability implementation guidance, and CISA telemetry guidance for a common agency computing scenario.Trust Zone:A discrete computing environment designated forinformation processing, storageand/or transmission that dictates the level of security necessary to protect the traffic transitingin and out of a zone and/or the informationwithin the zone.Unified Communications and Collaboration (UCC):A collection of solutions designed to facilitate communication and collaboration, including in realtime, such as required by remote work or collaboration between locations. Universal Security Capabilities: Enterpriselevel capabilities that outline guiding principles for TIC ases.Web:An environment used for web browsing purposes. Also see Internet. Zero Trust:security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter. ��33 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Appendix B Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesThe ecurity apabilities included in the legacyTIC Reference Architecturev2.2outlined requirements for security, managing, and operating a TIC access point.The ecurity apabilities included in the TIC 3.0 Security Capabilities Catalogprovide a list of security capabilities that are applicable across TIC 3.0 use cases.Appendix B.1 TIC 2.2Capabilities to TIC 3.0 CapabilitiesThe following table show howthe TIC 2.2 ecurity apabilities map to the TIC 3.0 ecuritapabilitiesThe mapping is not intended to be a strict mapping or to define equivalence of capabilities, but rather these tables can provide a reference for current MTIPS providers, TICAPs, and agenciesTable : TIC 2.2 Capabilities to TIC 3.0 CapabilitiesTIC 2.2 Capabilities to TIC 3.0 Capabilities Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TS.PF.01 Secure all TIC Traffic Enterprise Threat Intelligence, Policy Enforcement Parity Networking: Access Control and Network Segmentation TS.PF.02 Default Deny Not applicable Networking: Access Control and Network Segmentation TS.PF.03 Stateless Filtering Not applicable Networking: Access Control and Network Segmentation, Internet Protocolenylisting TS.PF.04 Stateful Filtering Not applicable Networking: Access Control and Network Segmentation TS.PF.05 Filter by Source Address Not applicable N

17 etworking: Access Control and Network
etworking: Access Control and Network Segmentation TS.PF.06 Asymmetric Ro uting Not applicable Networking: Access Control and Network Segmentation TS.PF.07 H.323 Not applicable Not applicable ��34 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TS.CF.01 Application Layer Filtering Not applicable Web: R equest for ommentsCompliance Enforcement TS.CF.02 Web Session Filtering No t applicable Files: Anti - malware Email: Uniform Resource LocatorClickhrough Protection Web: Active Content Mitigation, Content Filtering, Domain Category Filtering, Domain Reputation Filter, Malicious Content Filtering TS.CF.03 Web Firewall Not applic able Not applicable TS.CF.04 Mail Filtering Not applicable Files: Anti - malware Email: Antiphishing Protections, Antispam Protections, Malicious Uniform Resource LocatorProtections TS.CF.05 Agency Specific Mail Filters Not applicable Files: Anti - malwar e TS.CF.06 Incoming Mail Authentication (Mail Forgery Detection) Not applicable Email: Domain Signature Verification for Incoming Email TS.CF.07 Email Authentication (Digitally Signing Mail) Not applicable Email: Domain Signatures for Outgoing Email TS. CF.08 Mail Quarantine Not applicable Not applicable ��35 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TS.CF.09 Routing Protocol Authentication (BGP Protection) Secure Administration Networking: Access Control, Network Segmentation TS.CF.10 Reducing Cleartext Secure Administration Not applicable TS.CF. 11 Encrypted Traffic Inspection Policy Enforcement Parity Not applicable TS.CF.12 Custom Malware and Content Filtering Not applicable Files: Anti - malware TS.CF.13 DNS Filtering Not applicable Domain Name System : Domain NameSinkholing, Domain Name Verificationfor Agency Clients TS.CF.14 Loose/Strict Source Filtering Not applicable Not applicable TS.INS.01 NCPS Not applicable Mail: E INSTEIN 3 cceleratedEmail Protections omain Name System INSTEIN 3 Accelerated Domain NameProtections Intrusion Detection: Intrusion Detection and PreventionSystems TS.INS.02 IDS/NIDS Enterprise Threat Intelligence Not applicable TS.RA.01 Agency - User Remote Access (Filter by Source Address) Strong Authentication Enterprise: Virtual Private Network TS.RA.02 External D edicated Access Strong Authentication Enterprise: Virtual Private Network ��36 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TS.RA.03 Extranet Dedicated Access Strong Authentication Enterprise: Virtual Private Network TM.AU.01 User Authentication Strong Authentication Not applicable TM.PC.01 TIC Facilit y Resilience Not applicable TM.PC.02 NOC/SOC Facilities Not applicable Not applicable TM.PC.03 SCIF Facilities Not applicable Not applicable TM.PC.04 Dedicated TIC Spaces Not applicable Not applicable TM.PC.05 Facility Resiliency Not applicable Not ap plicable TM.PC.06 Geographic Diversity Resilience Not applicable TM.TC.01 Route Diversity Resilience Not applicable TM.TC.02 Least Functionality Least Privilege Not applicable TM.TC.03 IPv6 Policy Enforcement Parity Not applicable TM.TC.04 DNS Authori tative Servers (DNSSEC) Not applicable Domain Name System : Domain Name Validation for Agency Domains TM.TC.05 Response Authority Incident Response Plan ning and Incident Handling, Enterprise Threat Intelligence Not applicable TM.TC.06 TIC Staffing Incide nt Response Plan ning and Incident Handling Not applicable TM.TC.07 Response Access Incident Response Plan ning and Incident Handling Not applicable TM.COM.01 TIC and NCCIC (TS/SCI) Incident Response Plan ning and Incident Handling Not applicable ��37 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /

18 F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xina
F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TM.COM.02 TIC and Customer Incident Response Plan ning and Incident Handling Not applicable TM.COM.03 TIC and NCCIC (SECRET) Incident Response Plan ning and Incident Handling Not applicable TM.DS.01 Storage Capacity Central Log Management with Analysis, Situational Awareness Not applicable TM.DS.02 Back - up Data Backup and Recovery, Incident Response Planning and Incident Handling Not applicable TM.DS.03 Data Ownership Not applicable Not applicable TM.DS.04 Data Attribution & Retrieval Effective Use of Shared Services Not applicable TM.DS.05 DLP Not applicable Files: Data Loss Prevention Email: Data Loss Prevention Web: Data Loss Prevention TM.LOG.01 NTP Server Time Synchronization, Central Log Management with Analysis Not applicable TM.LOG.02 Time Stamping Time Synchronization, Central Log Management with Analysis Not applicable TM.LOG.03 Session Traceability Auditing and Accounting, Situational Awareness, Central Log Management with Analysis Not applicable ��38 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TM.LOG.04 Log Retention Auditing and Accounting, ational Awareness, Central Log Management with Analysis Not applicable TO.RES.01 Response Timeframe Incident Response Plan ning and Incident Handling, Enterprise Threat Intelligence Not applicable TO.RES.02 Response Guidance Incident Response Plan ning andIncident Handling, Enterprise Threat Intelligence Not applicable TO.RES.03 Denial of Service Response Not applicable Resiliency: Distributed Denial of Service Protections TO.MG.01 System Inventory Inventory Not applicable TO.MG.02 Configuration & Change Management Configuration Management Not applicable TO.MG.03 Change Communication Configuration Management Not applicable TO.MG.04 Contingency Planning Incident Response Plan ning and Incident Handling Not applicable TO.MG.05 TSP Not applicable Not appl icable TO.MG.06 Maintenance Scheduling Configuration Management Not applicable TO.MG.07 Custom Agency Networks Inventory Not applicable TO.MG.08 SLA Not applicable Not applicable TO.MG.09 Exception Process Not applicable Not applicable ��39 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TO.MG.10 Tailo red Security Policies Not applicable Not applicable TO.MG.11 Tailored Communications Not applicable Not applicable TO.MON.01 Situational Awareness Central Log Management with Analysis, Situational Awareness Not applicable TO.MON.02 Vulnerability Scannin Vulnerability Management Not applicable TO.MON.03 Audit Access Auditing and Accounting Not applicable TO.MON.04 Log Sharing Auditing and Accounting, Central Log Management ith Analysis Not applicable TO.MON.05 Operational Exercises Vulnerability Mana gement Not applicable TO.REP.01 Customer Service Metrics Auditing and Accounting Not applicable TO.REP.02 Operational Metrics Auditing and Accounting Not applicable TO.REP.03 Customer Notification Auditing and Accounting, Incident Response Planning and Incident Handling Not applicable TO.REP.04 Incident Reporting Auditing and Accounting, Incident Response Planning and Incident Handling Not applicable ��40 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Appendix B.2 TIC 3.0 Capabilitiesto TIC 2.2 CapabilitiesThe following tableshowthe reverse mapping;how the TIC3.0security capabilities map to the TIC 2.2security capabilities. The mappings are broken down by universal capabilities and PEP capabilities. The mapping is not intended to be a strict mapping or to define equivalence of capabilities,but rather these tables can provide a reference for current MTIPS providers, TICAPs, and agencies.Table : Universal TIC 3.0 Capabilities to TIC 2.2 CapabilitiesUniversal TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Backup and Recovery Backup and recovery entails keeping copies of configuration and data, as needed, to allow for

19 the quick restoration of service in the
the quick restoration of service in the event of malicious incidents, system failures, or corruption. TM.DS.02 Central Log Management with Analysis Central log management with analysis is the collection, storage, and analysis oftelemetry, where the collection and storage are designed to facilitate data fusion and the security analysis aids in discovery and respone to malicious activity. TO.MON.01 TO.MON.04 TM.DS.01 TM.LOG.*11F 13 Configuration Management Configuration management is the implementation of a formal plan for documentingand managingchanges to the environment, and monitoring for deviations, prefera automated. TO.MG.02 TO.MG.03 TO.MG.06 Incident Response Planand Incident Handling Incident response plan ning and incident handling is the documentation and implementation of a set of instructions, procedures, or technical capabilities to sense anddetect, respond to, limit consequences of malicious cyberattacks and restore the integrity of the network and associated systems. TM.TC.05 TM.TC.06 TM.TC.07 TM.COM.01 TM.COM.02 TM.COM.03 TO.RES.01 TO.RES.02 TO.MG.04 TM.DS.02 TO.REP.03 TO.REP.04 All TM.LOGcapabilitiesin Section B of the TIC Reference Architecturev 2.2 ��41 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description TIC 2.2 Mapping Inventor y Inventory entails d eveloping, documenting, and maintaining a current inventory of all systems, networks, and components so that only authorized devices are given access, and unauthorized and unmanaged devices are found and restricted from gaining access. TO.MG.01 TO.MG.07 L east Privilege Least privilege is a design principle applied to security architecturessuch that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function. TM.TC.02 Secure Administration Secure administration entails performing administrative tasks in a secure manner, using secure protocols. TS.CF.10 TS.CF.09 Strong Authentication Strong authentication verifies the identity of users, devices, or other entities through rigormeans (e.g., multifactor authentication)before granting access. TM.AU.01 TS.RA.* 14 Time Synchronization Time synchronization is the coordination of system (e.g., servers, workstations, network devices) clocks to minimize the difference between systemclock times and enable accurate comparison of timestamps between systems. TM.LOG.01 TM.LOG.02 Vulnerability Management Vulnerability management is the practice of proactively working to discover vulnerabilities by including the use of both active and passive means of discovery and by taking action to mitigate discovered vulnerabilities. TO.MON.02 TO.MON.05 Patch Management Patch management is the identification, acquisition, installation, and verification of patches for products and systems See Configur ation Management and Vulnerability Managemen t. Auditing and Accounting Auditing and accounting includes capturing business records (e.g., logs and other telemetry), making them available for auditing and accounting as required, and designing an auditing system that considers insider threat (e.g., separation of duties violation tracking) such that insider abuse or misuse can be detected. TO.MON.03 TO.MON.04 TM.LOG.03 TM.LOG.04 TO.MG.07 TO.REP.01 TO.REP.02 TO.REP.03 TO.REP.04 All TS.RA capabilities in Section B of the TIC Reference Architecturev 2,2 ��42 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description TIC 2.2 Mapping Resilien ce Resilience entails e nsuring that systems, services, and protections maintain acceptable performance under adverse conditions. TM.TC.01 TM.PC.01 TM.PC.06 Enterprise Threat Intelligence Enterprise threat intelligence is a way to obtain threat intelligence from private and government sources and to implement mitigations for the identified risks. TO.RES.02 TS.PF.01 TS.INS.02 TO.RES.01 TM.TC.05 TM.COM.* 13F 15 Situational Awareness Situational awareness is maintaining effective awareness, both current and historical, across all components. TO.MON.01 TM.DS.01 TM.LOG.03 TM.LOG.04 Dynamic Threat Discovery Dynamic threat discovery is the practice of using dynamic approaches (e.g., heuristics, baselining, etc.) to discover new malicious activity. No t applicable Policy Enforcement Parity Policy enforcement parity entails c onsistently applying security protections and other policies, independent of the communication mechanism, forwarding path, or endpoints used. TS.PF.01 TS.CF.11 TM.TC.03 Effective Use of Shared Services Effective use of shared services means that shared services should be employed, where applicable, and individually tailored and measured to independently validate service conformance, and offer effective protections for tenants against malicious actors, both external and internal to the service pro

20 vider. TM.DS.04 Integrated Desktop,
vider. TM.DS.04 Integrated Desktop, Mobile, and Remote Policies Integrated desktop, mobile, and remote policies define and enforcepolicies that apply to a given agency entity independent of its location. Not applicable All TM.COMcapabilities in Section B of the TIC 2.2 Reference Architecture. ��43 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table : Files PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesFiles PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Anti - malware Anti - malware protections detect the presence of malic ious code and facilitate its quarantine or removal. TS.CF.02 TS.CF.04 TS.CF.05 TS.CF.12 Content Disarm and Reconstruction Content disarm and reconstruction technology detects the presence of unapproved active content and facilitates its removal. Not appli cable Detonation Chamber Detonation chambers facilitate the detection of malicious code usingprotected and isolated execution environments to analyze thefiles. Not applicable Data Loss Prevention Data loss prevention technologies detect instances of t he exfiltration, either malicious or accidental, of agency data. TM.DS.05 Table : Email PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesEmail PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities C apability Description TIC 2.2 Map ping Anti - phishing Protections Anti - phishing protections detect instances of phishing and prevent users from accessing them. TS.CF.04 Anti - spam Protections Anti - spam protections detect and quarantine instances of spam TS.CF.04 Authenticated Received Chain Authenticated r eceived c hain allows for an intermediary, like a mailing list or forwarding service, to sign its own authentication of the original email, allowing downstream entities to accept the intermediary’s authentication even if the email was changed. Not applicable Data Loss Prevention DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data TM.DS.05 ��44 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 C apability Description TIC 2.2 Map ping Domain Signature Verification for Incoming Email Domain signature verification protections authentic ate incoming email according to the DMARC emai authentication protocol defined in RFC 7489. TS.CF.06 Domain Signatures for Outgoing Email Domain signature protections facilitate the authentication of outgoing email by signing the emails and ensuring that external parties may validate the email signatures according to the DMARC email authentication protocol is defined in RFC 7489. TS.CF.07 Encryption for Email Transmission Email services are configured to use encrypted connections, when possible, for communications between clientsand other email servers Not applicable Malicious Link Protections Malicious link protections detect malicious link s in emails and prevent users from accessing them. Not applicable Link Click - hrough Protection Link click - thro ugh protections ensure that when a link from an email is clicked, the requester is directed to a protection that verifies the security of the link destination before permitting access. Not applicable EINSTEIN 3 Accelerated Email Protections E 3 A is an intr usion preventio n capability, offered by NCPS, provided by CISA, that includes an email filteringsecurity service. TS.INS.01 Table : Web PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesWeb PEP TIC 3.0 Capabilities to TIC 2.2 pabilities Capability Description TIC 2.2 Mapping Break and Inspect Break and Inspect systems, or encryption proxies, terminate encrypted traffic, logging or performing policy enforcement against the plaintext, and reencrypting the traffic, if applicable, before transmitting to the final destination. Not applicable Active Content Mitigation Active content mitigation protections detect the presence of unapproved active content and facilitate its removal. TS.CF.02 TS.CF.04 ��45 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description TIC 2.2 Mapping Certificate enylist Certif icate denylisting protections prevent communication with entities that use a set of known bad certificates. Not applicable Content Filtering Content filtering protections detect the presence of unapproved content and facilitate its removal or denial of cess. TS.CF.02 TS.CF.04 Authenticated Proxy Authenticated proxies

21 require entities to authenticate with t
require entities to authenticate with the proxy before making use of it, enabling user, group, and locationaware security controls. Not applicable Data Loss Prevention DLP technologies de tect instances of the exfiltration, either malicious or accidental, of agency data. TM.DS.05 Domain Resolution Filtering Domain resolution filtering prevents entities from using the overHypertext Transfer Protocol Secure(HTTPS)or DoHdomainresolution protocol, possibly evading DNS based protections. Not applicable Protocol Compliance Enforcement Protocol complian ce enforcement technologies ensure that traffic complies with protocol definitions, documented by the IETF TS.CF.01 Domain Category Filtering Domain category filtering technologies allow for classes of domains (e.gbanking, medical) to receive a different set of security protections. Not applicable Domain Reputation Filter Domain reputation filtering protections are a form of domain denylistingbased on a domain’s reputation, as defined by either the agency or an external entity. Not applicable Bandwidth Control Bandwidth c ontrol technologies allow for limiting the amount of bandwidth used by different classes of domains. Not appli cable Malicious Content Filtering Malicious c ontent f iltering protections detect the presence of malicious content and facilitate its removal. TS.CF.02 TS.CF.04 Access Control Access c ontrol technologies allow an agency to define policies limiting what actions may be performed by connected users and entities. Not applicable ��46 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table : Networking PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesNetworking PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Access Control Access c ontrol protections prevent the ing ress , egress, or transiting of unauthorized network traffic. TS.PF.01 - 06 TS.CF.09 I nternet Address enylist I nternet address d enylist ing protections prevent the ingest or transiting of traffic received from or destined to a enylisted internetaddress. TS.PF.03 TS.CF.02 TS.CF.04 TS.INS.01 Host Containment Host c ontainment protections enable a network to revoke or quarantine a host’s access to the network. Not applicable Network Segmentation Network s egmentation separates a given network into subnetworks, facilitating security controls between the subnetworks, and decreasing the attack surface of the network. TS.PF.01 - 06 TS.CF.09 Micro - segmentation Microsegmentation divides the n etwork, either physically or virtually, according to the communication needs of application and data workflows, facilitating security controls to protect the data. Not applicable Table : Resiliency PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesResiliency PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Distributed Denial of Service Protections DDoS protections mitigate the effects of distributed denial of service attacks. TO.RES.03 El astic Expansion Elastic expansion enables agencies to dynamically expand the resources available for services as conditions require. Not applicable Regional Delivery Regional d elivery technologies enable the deployment of agency services across geographically diverse locations. Not applicable ��47 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table : DNS PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesDNS PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping D omain Name System Sinkholing D om ain name s inkholing protections are a form of enylistingthat protectclients from accessing malicious domains by responding to DNS queries for those domains. TS.CF.13 Domain Name Verification for Agency Clients Domain name verification protections ensu re that domain name lookups from agency clients, whether for internal or external domains, are validatedaccording to DNSSEC. TS.CF.13 Domain Name Validationfor Agency Domains Domain name validation protections ensure that all agency domain names are secured using DNSSEC, enabling external entities to validate their resolution to the domain names. TM.TC.04 EINSTEIN 3 Accelerated Domain Name Protections E 3 A is an intrusion prevention capability offered by NCPS, provided by CISAthat includes a DNS inkholing security service. TS.INS.01 Table : Intrusion Detection PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesIntrusion Detection PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Endpoin t Detection and Response Endpoint detection and response tools combine endpoint and network event data to aid in the detection of malicious activity. Not applicable Intrusion Detection and Prevention Systems Intrusion detection and pre

22 vention systems dete ct and report mali
vention systems dete ct and report malicious activity. Intrusion prevention systes attempt to stop the activity. TS.INS.01 Adaptive Access Control Adaptive access control technologies factor in additional context, like security risk, operational needs, and other heuristics,when evaluating access control decisions. Not applicable ��48 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description TIC 2.2 Mapping Deception Platforms Deception platform technologies provide decoy environments, from individual machines to entire networks, that can be used to deflect attacks away from the operational systems pporting agency missions/business functions. Not applicable Certificate Transparency Log Monitoring Certificate transparency log monitoring allows agencies to discover when new certificates are issued for agency domains. Not applicable Table : Enterprise PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesEnterprise PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Security Orchestration, Automation, and Response SOAR tools define, prioriti ze, and automate the response to security incidents. Not applicable Shadow nformation echnology Detection Shadow IT d etection systems detect the presence of unauthorized software and systems in use by an agency. Not applicable V irtual Private Network V PN solutions provide a secure communications mechanism between networks that may traverseacross unprotected or public networks. TS.RA.01 TS.RA.02 TS.RA.03 Table : Unified Communications and Collaboration PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesUnified Communications and Collaboration PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Identity Verification Identity verification ensures that access to the virtual meeting is limited to appropriate individuals. Waiting room features, where the meeting host authorizes vetted individuals to join the meetingcan also be utilized. Not applicable ��49 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description TIC 2.2 Mapping Encrypted Communication Communication between virtual meeting participants and any data exchanged is encrypted at rest and in transit. Some UCC offerings support endend encryption, where encryption is performed on the clients and can only be decrypted by the other authenticated participants and cannot be decrypted by the UCC vendor. Not appl icable Connection Termination Mechanisms that ensure the meeting host can positively control participation.These can include inactivity timeouts, demand prompts, unique access codes for each meeting, host participant eviction, and even meeting duratio n limits. Not applicable Data Loss Prevention M echanisms should be implemented to control information sharing between UCC participants, intentional or incidental. Thismay be integrated into otherDLPsolutionincluding keyword matching, attachment file type or existence prohibitions, attachment size limitations, or audio/visual filters. Not applicable Table : Data Protection PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesData Protection PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Access Control Access c ontrol technologies allow an agency to define policies concerning the allowable activities of users and entities to data and resources. Not applicable Protections for Data at Re Data protection at rest aims to secure data stored on any device or storage medium. Not applicable Protections for Data in Transit Data protection in transit, or data in motion, aims to secure data that is actively moving from one location to another, such as across the internet or through a private enterprise network. Not applicable Data Loss Prevention DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data. TM.DS.05 Data Access and Use Telemetry Data access and use telemetry identifies agency - sensitive data stored, processed, or transmitted, including those located at a service provider, and enforcing detailed logging for access or changes to sensitive data. Not applicable ��40 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Appendix B.2 – TIC 3.0 Capabilitiesto TIC 2.2 CapabilitiesThe following tables showthe reverse mapping;how the TIC3.0security capabilities map to the TIC 2.2security capabilities. The mappings

23 are broken down by universal capabiliti
are broken down by universal capabilities and PEP capabilities. The mapping is not intended to be a strict mapping or to define equivalence of capabilities,but rather these tables can provide a reference for current MTIPS providers, TICAPs, and agencies.Table 15: Universal TIC 3.0 Capabilities to TIC 2.2 CapabilitiesUniversal TIC 3.0 Capabilities to TIC 2.2 Capabilities Capability Description TIC 2.2 Mapping Backup and Recovery Backup and recovery entails keeping copies of configuration and data, as needed, to allow for the quick restoration of service in the event of malicious incidents, system failures, or corruption. TM.DS.02 Central Log Management with Analysis Central log management with analysis is the collection, storage, and analysis oftelemetry, where the collection and storage are designed to facilitate data fusion and the security analysis aids in discovery and respone to malicious activity. TO.MON.01 TO.MON.04 TM.DS.01 TM.LOG.*11F 13 Configuration Management Configuration management is the implementation of a formal plan for documentingand managingchanges to the environment, and monitoring for deviations, preferably automated. TO.MG.02 TO.MG.03 TO.MG.06 Incident Response Planningand Incident Handling Incident response plan ning and incident handling is the documentation and implementation of a set of instructions, procedures, or technical capabilities to sense anddetect, respond to, limit consequences of malicious cyberattacks, and restore the integrity of the network and associated systems. TM.TC.05 TM.TC.06 TM.TC.07 TM.COM.01 TM.COM.02 TM.COM.03 TO.RES.01 TO.RES.02 TO.MG.04 TM.DS.02 TO.REP.03 TO.REP.04 All TM.LOGcapabilitiesin Section B of the TIC Reference Architecturev 2.2. ��39 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TO.MG.10 Tailo red Security Policies Not applicable Not applicable TO.MG.11 Tailored Communications Not applicable Not applicable TO.MON.01 Situational Awareness Central Log Management with Analysis, Situational Awareness Not applicable TO.MON.02 Vulnerability Scanning Vulnerability Management Not applicable TO.MON.03 Audit Access Auditing and Accounting Not applicable TO.MON.04 Log Sharing Auditing and Accounting, Central Log Management ith Analysis Not applicable TO.MON.05 Operational Exercises Vulnerability Mana gement Not applicable TO.REP.01 Customer Service Metrics Auditing and Accounting Not applicable TO.REP.02 Operational Metrics Auditing and Accounting Not applicable TO.REP.03 Customer Notification Auditing and Accounting, Incident Response Planning and Incident Handling Not applicable TO.REP.04 Incident Reporting Auditing and Accounting, Incident Response Planning and Incident Handling Not applicable ��33 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Appendix B – Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesThe ecurity apabilities included in the legacyTIC Reference Architecturev2.2outlined requirements for security, managing, and operating a TIC access point.The ecurity apabilities included in the TIC 3.0 Security Capabilities Catalogprovide a list of security capabilities that are applicable across TIC 3.0 use cases.Appendix B.1 – TIC 2.2Capabilities to TIC 3.0 CapabilitiesThe following table show howthe TIC 2.2 ecurity apabilities map to the TIC 3.0 ecuritapabilities. The mapping is not intended to be a strict mapping or to define equivalence of capabilities, but rather these tables can provide a reference for current MTIPS providers, TICAPs, and agencies. Table 14: TIC 2.2 Capabilities to TIC 3.0 CapabilitiesTIC 2.2 Capabilities to TIC 3.0 Capabilities Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TS.PF.01 Secure all TIC Traffic Enterprise Threat Intelligence, Policy Enforcement Parity Networking: Access Control and Network Segmentation TS.PF.02 Default Deny Not applicable Networking: Access Control and Network Segmentation TS.PF.03 Stateless Filtering Not applicable Networking: Access Control and Network Segmentation, Internet Protocol Denylisting TS.PF.04 Stateful Filtering Not applicable Networking: Access Control and Network Segmentation TS.PF.05 Filter by Source Address Not applicable Networking: Access Control and Network Segmentation TS.PF.06 Asymmetric Ro uting Not applicable Networking: Access Control and Network Segmentation TS.PF.07 H.323 Not applicable Not applicable ��31 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬h

24 e; [/; ott;&#xom ];&#x/BBo;&#xx [
e; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Appendix A – Glossary and DefinitionsThis glossary contains terms and definitions that are used across the TIC documents and not necessarily applicable to all use cases.Boundary:A notional concept that describes the perimeter of a zone (e.g., mobile deviceservicesgeneral support system (GSS), Software-a-Service (SaaS), agency, etc.) within a network architectureThe bounded area must have an information technology (IT) utility.Internet:The internet is discussed in two capacities throughout TIC documentation:A means of data and IT traffictransport. An environment used for web browsing purposes, referred to as “Web.” Managed Trusted InternetProtocol Services (MTIPS)Services under GSA’s Enterprise Infrastructure Solutions (EIS) contract vehicle that provideTIC solutions to government clientmanaged security service. It is of note that the EIS contract is replacing the GSA Networx contract vehicle that is set to expire inFiscal Year (FY) 2023.Management Entity (MGMT): A notional concept of an entity that oversees and controls security pabilities. The entity can be an organization, network device, tool, service, or application. The entity can control the collection, processing, analysis, and display of information collected from the policy enforcement (, and it allows IT professionals to control devices on the network.National Cyber Protection System (NCPS): integrated systemsystems that delivers a range of capabilities, including intrusion detection, analytics, intrusion prevention, and information sharing capabilities that defend the civilian ederal overnment's information technology infrastructure from cyber threats. The NCPS capabilities, operationally known as EINSTEIN, are one of several tools and capabilities that assist in federal network defense. Policy Enforcement Point (PEP):A security device, tool, function, or application that enforces securitypolicies through technicalcapabilities.Policy Enforcement Point Security CapabilitiesNetworklevel capabilities that inform technical implementation for relevant use Reference Architecture (RA):An authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions.Risk Management:The program and supporting processes to manage information security risk to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation, and includes: (i) establishing the context for riskrelated activities; (ii) assessing risk; (iii) responding to risk once determined; and (iv) monitoring risk over time.Risk Tolerance:The level of risk or degree of uncertainty that is acceptable to organizations and is a key element of the organizational risk frame. An organization's risk tolerance level is the amount of corporate data and systems that can be risked to an acceptable level.Security Capability:A combination of mutuallyreinforcing security controls (i.e., safeguards and countermeasures) implemented by technical means (i.e., functionality in hardware, software, and firmware), physical means (i.e., physical devices and protective measures), and proceduralmeans (i.e., procedures performed by individuals). Security capabilities help to define protections for information being processed, stored, or transmitted by information systems.Security Pattern: Description of an endend data flow between two trust zones. Security patterns may have an associated set of security capabilities or guidance to secure the data flow along with one or more of the zones. ��30 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Conclusionraditional TIC Use Case defines how network security should be applied when an agency has personnel in a physical location (i.e.,an agency campus) that uses a TIC access point, either an agency TIC Access Provider (TICAPManaged Trusted Internet Protocol Services MTIPS), when accessing the web, trusted external partners, or partner government agencies. This document provides guidance on how an agencycan configure its raditional TICdata flows and apply relevant TIC 3.0 security capabilities. It considers four securitypatterns relevant to the traditional TIC deployment: Secure gency campus access to ; Public user to secure agency campus;Secure gency campus access to agencysanctioned external partners; andSecure agency campus access to partneragencies.This useshould be considered the default use case, as defined by OMB Mandused in conjunction with the Security Capabilities Catalogand other TIC 3.0 guidance documentation. ��29 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Telemetry RequirementsFigure 8 shows the conceptual ar

25 chitecture of theTraditional TIC Use Cas
chitecture of theTraditional TIC Use Casewith the telemetry requirements.These flowsindicate when an agencyshouldshare telemetry with CISA. In the Traditional TIC Use Case, there are two types oftelemetry that might get shared: CDM telemetry and NCPS telemetry. Most raditional TIC deployments have CDM telemetry shared with CISA by capabilities deployed on the gency ampus, and NCPS telemetry is shared with CISA from the TIC access points. Agencies may provide telemetry fordirect connections to partner agenciesby working with NCPS. Consult the NCPS programand CDM programfor further details. Agencies share telemetry information with CISA through multiple programs, as coordinated directly, to ensure visibility and situational awareness are preserved and shared protections can be maintained. Figure 8Traditional TIC Telemetry Sharing with CISA “National Cybersecurity Protection System (NCPS)”, Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/nationalcybersecurityprotectionsystemncps.“Continuous Diagnostics and Mitigation (CDM)”, Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/cdm. ��28 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Data Loss Prevention M ec hanisms should be implemented to controlthe sharing of information between UCC participants, intentional or incidental.This may be integrated into additional agency DLP technologies and can include keyword matching, attachment file type or existence prohibitions, attachment size itations, or even audio/visual filters. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Table 13: Data Protection PEP Security CapabilitiesData Protection PEP Security Capabilities Capabi lity Description Use Case Specific Guidance Access Control Access c ontrol technologies allow an agency to define policies concerning the allowable activities of users and entities to data and resources. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Protections for Data at Rest Data p rotection at rest aims to secure data stored on any device or storage medium. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Protections for Data in Transit Data protection in transit, or data in motion, aims to secure data that is actively moving from one location to another, such as across the internet or through a private enterprise network. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Data Loss Prevention DLP te chnologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and the gency should understand the protections offered by the TIC access point’s DLP program andintegrate them into the gency’s overall DLP program. Data Access and Use Telemetry Data access and use telemetry identifies agencysensitive data stored, processed, or transmitted, including those located at a service provider, and enforcing detailed logging for access or changes to sensitive data. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. ��27 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Virtual Private Network VPN solutions provide a secure communications mechanism between networks that may traverse across unprotected or public networks. TIC access point s provide VPN services with varying levels of protection applied, depending on the entity thatthe VPN tunnel is establishedwith. When VPNs, or similar technologies, are used to bridge the gency ampus network with other environments, the gency ampus network should applynetwork segmentation, pplication ateways, virtual desktop infrastructure), etc.to ensure least privilege access is maintainedand to limit the impact of compromise of the other environment. Table 12: Unified Communications and Collaboration PEP Security CapabilitiesUnified Communications and Collaboration PEP Security Capabilities Capability Description Use Case Specific Guidance Identity Verification Identity verification ensures that access to the virtual meeting is limited to appropriate individuals. Waiting room features, wherethe meeting host authorizes vetted individuals to join the meeting, can also be utilized. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilitie Encrypted Communication Communication between virtual meeting participants and any data exchanged is encrypted at rest and in transit. Some UCC offerings support endend encryption, where encryption is performed on the clients and can only be decrypted by the other

26 authenticated participants and cannot b
authenticated participants and cannot be decrypted by the UCC vendor. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Connection Termination Connection termination m echanisms ensure the meeting host can positively control participationthroughinactivity timeouts, ondemand prompts, unique access codes for each meeting, host participant eviction, and even meeting duration limits. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. ��26 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Adaptive Access Control Adapti ve a ccess c ontrol technologies factor in additional context, like security risk, operational needs, and other heuristics, when evaluating access control decisions. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. D eception Platforms Deception p latform technologies provide decoy environments, from individual machines to entire networks, that can be used to deflect attacks away from the operational systems supporting agency missions/business functions. New capability in TIC 3.0 that ca n be implemented to supplement the TIC 2.2 capabilities. Certificate Transparency Log Monitoring Certificate t ransparency l og m onitoring allows agencies to discover when new certificates are issued for agency domains. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Table 11: Enterprise PEP Security Capabilities Enterprise PEP Security Capabilities Capability Description Use Case Specific Guidance Security Orchestratio Automation, and Response Security O rchestration, A utomation , and esponse (SOAR)tools define, prioritize, and automate the response to security incidents. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Shadow Information Technology Detection Shadow information technology ( IT ) etectionsystems detect the presence of unauthorized software and systems in use by an agency. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. ��25 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Domain Name Verificationfor Agency Clients Domain n ame verification protections ensure that domain name lookups from agency clients, whether for internal or external domains, are validated according to Domain Name System Security Extensions (DNSSEC). Agenc ies can use DNS resolution services in TIC access points, which provideDNSSEC verification. Domain Name Validationfor Agency Domai Domain name validation protections ensure that all agency domain names are secured using DNSSEC, enabling external entities to validate their resolution to the domain names. Agencies can use DNS hosting services in the TIC access point, which support . EINSTEIN 3 Accelerated Domain Name Protections E 3 A is an intrusion prevention capabilityoffered by NCPS, provided CISA, that includes a DNS inkholingsecurity service. Agenc ies can use DNS resolution services in TIC access point, which can support the integration of NCPS A DNS rotections. Table 10: Intrusion Detection PEP Security Capabilities Intrusion Detection PEP Security Capabilities Capability Description Use Case Specific Guidance Endpoint Detection and Response Endpoint d etection and r esponse (EDR) tools combine endpoint and network event data to aid in the detection of malicious activity. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Intrusion Detection and Prevention Systems Intrusion detection s ystems detect and report malicious activity. Intrusion revention systems attempt to stop the activity. TIC access point s pass network traffic through ntrusion etection systems. When VPNs, or similar technologies, e used to bridge together the gency ampus network with other environments, the gency ampus should ensure that traffic to and from the external environment are passed through an intrusion detection and prevention system. ��24 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Micro - segmentation Microsegmentation divides the network, either physically or virtually, according to the communication needs of a

27 pplication and data workflows, facilita
pplication and data workflows, facilitating security controls to protect the data. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Table 8: Resiliency PEP Security Capabilities Resiliency PEP Security Capabilities Capability De scription Use Case Specific Guidance D istributed Denial of Service Protections D istributed Denial of Service ( DDoS ) protections mitigate the effects of distributed denial of service attacks. TIC access point s provide DDoS protections. Elastic Expansion Elastic expansion enables agencies to dynamically expand the resources available for services as conditions require. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Regional Delivery Regional d elivery technologies enable the deployment of agency services across geographically diverse locations. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Table 9omain Name ystemPEP Security Capabilitiesomain Name SystemPEP Security Capabilities Capability Description Use Case Specific Guidance D omain Name Sinkholing D omain name s inkholing protections are a form of enylistingthat protects clients from accessing malicious domains by responding to DNS queries for those domains. Agencies can use DNS resolution services in TIC access point, which provide DNS inkholing. ��23 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table 7: Network PEP Security CapabilitiesNetwork PEP Security Capabilities Capability Description Use Case Specific Guidance Access Control Access c ontrol protections prevent the ress, egress, or transmission of unauthorized network traffic. TIC access point s employ a combination of firewalls and proxies to limit the traffic coming into and leaving the TIC access point. When VPNs, or similar technologies, are used to bridge together the gency ampusnetwork with other environments, the gency ampus should use access control protections to ensure only appropriate traffic is sent to and received from the other environments. I nternet Address enylisting I nternet address d enylist ing protections prevent the ingest or transiting of traffic received from or destined to a enylisted internetaddress. TIC access point s can drop w eb traffic to specific IP addresses and can alert on attempts to access specific IP addresses. Host Containmen Host c ontainment protections enable a network to revoke or quarantine a host’s access to the network. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Network Segmentation Network s egmentation separates a given etwork into subnetworks, facilitating security controls between the subnetworks, and decreasing the attack surface of the network. TIC access point s employ network segmentation internally. By routing their external connections through T access point, agenciessegment their networks from external environments. When VPNs, or similar technologies, are used to bridge together the gency ampusnetwork with other environments, the gency ampus network should be segmented so that leastprivilege access ismaintained, and to limit the impact of the compromise of the external environment. ��21 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table 6: Web PEP Security CapabilitiesWeb PEP Security Capabilities Capability Description Use Case Specific Guidance Break and Inspect Break and Inspect systems , or encryption proxies,terminate encrypted traffic, logging or performing policy enforcement against the plaintext, and re-encrypting the traffic, if applicable, before transmitting to the final destination. New capability in TIC 3.0 that can be mplemented to supplement the TIC 2.2 capabilities. BreakandInspect solutions should be considered in the context of the sensitivity of data being scanned, the trust level designation of the source and destination, other security capabilities that offer comparable visibility, and the rotocols and services in use. Active Content Mitigation Active c ontent m itigation protections detect the presence of unapproved active content and facilitate its removal. TIC access point s can detect and remove malicious content in traffic. Certifica te enylisting Certificate d enylist ing protections prevent communication with entities that use a set of known bad certificates. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Conte nt Filtering Content f iltering protections detect the presence of unapproved content and facilitate its removalor denial of access. TIC access point s can detect and remove malicious content in traffic. Authenticated Proxy Authenticated p roxies requir e entities to authe

28 nticate with the proxy before making us
nticate with the proxy before making use of it, enabling user, group, and locationaware security controls. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Data Loss Prevention DLP technologies detect instances of e exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and ageiesshould understand the protections offered by the TIC access point’s DLP program andintegrate them into their overall DLP program. TIC 2.2 includes a variety of protections for unencrypted web traffic, which may be supplemented depending on the use of encrypted web traffic used by an agency ��14 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021The sections below explain how existing TIC 2.2 security capabilities at a TIC access pointcan be used part of agency implementations of TIC 3.0 security capabilities. 7.1Universal Security CapabilitiesTheSecurity Capabilities Catalogcontains a table of niversaecurity apabilitiesthat apply across TIC use cases. Agenciescan determine the level of rigor that is applied to these security apabilities such that in line with theagencyrisk tolerances and federal guidelines. Unique application guidance for the universal security capabilitiesin the Traditional TIC Use Case outlined in Table Agencies may determine the level of rigor that is applied to these security capabilities based on their agency risk tolerance and federal guidelines. Table 3: Universal Security CapabilitiesUniversal Security Capabilities Capability Description Use Case Specific Guidance Backup and Recovery Backup and recovery entails k eeping copies of configuration and data, as needed, to allow for the quick restoration of service in the event of malicious incidents, system failures, or corruption. TIC access points handle backup and recovery of configuration and data for their systems and services. If agencies deploy services to the TIC access point or provide configurationor data to a TIC access pointagenciesshould include those services, configurations, or data in theirbackup and recovery routines. Central Log Management with Analysis Central log management with analysis is the collection, storage, and analysis f telemetry, where the collection and storage are designed to facilitate data fusion and where the security analysis aids in discovery and response to malicious activity. TIC access points centralize and analyze their internally collected logs. If possible, agencies should integrate elemetry available from TIC access points totheircentral log management and analysis environment. Configuration Management Configuration management is the mplementation ofa formal plan for documenting and managingchanges to the environment, and monitoring for deviations, preferably automated. TIC access points implement a formal plan for configuration management for their systems and services. If agencies deploy services to the TIC access point or provide configuration or data to a TIC access point, agenciesshould handle changes to these services, configuration, or data through their formal configuration management plan. ��13 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 The first option (left) has traffic flowing between the a gency c ampus and the artner gency through a TIC ccess oint. Entities within the gency ampus either establish a protected connection to the artner gency or make use of an existing protected connection established with the artner gencyAgency and partner agency resources can then be access through this protected channel. Theat the agency campus and the TIC access pointensure that data flows to and from artner genciesare properly protected and only authorized services and information are being exchanged. The second option (left) consists of a direct connection from the a gency ampus to the artner agency. Entities within the agency campus either establish a protected connection to the artner gency or use an existing protected connection established with the artner gency. Agency and partner agency resources can then be access through this protected channel.These protected channels may go through a private connection between the agency and the partner agency, or through shared infrastructure like the nternet. Theat the agency campus ensures proper traffic forwarding, such that only authorized traffic is forwarded to the artner gency. This PEP alsoensures thatconnections for flows are properly protected and only authorized services and information is exchanged with the artner gency. his option permits a direct network connection to the artner genche artner gency employs appropriate TIC ases for all its external network connectionsensuring appropriate proections and information sharing with NCPS. However, agencies may supplement these protections to better reflect the

29 ir risk tolerances. The agency or partne
ir risk tolerances. The agency or partner agency may provide telemetry from this option to NCPS. Applicable Security CapabilitiesThe TraditionalTIC Use Case draws on security capabilities from both thenew and legacy TIC guidance.The list ofsecurity apabilities in the legacyTIC Reference Architecturev2.2outlines the requirements to secure, manageand operate a TIC access oint.TheSecurity Capabilities Catalogcontains a broader set of security capabilities that agencies can use to accomplish TIC objectives across TIC ases.While the TIC 2.2 security capabilities can provide protection for most, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0securitycapabilities to reflect their agency requirements, risk tolerances, and other factors. Unlike the TIC 2.2 security capabilities, TIC 3.0 security capabilitiesare not prescriptive, but rather are descriptive, allowing for flexibility in implementation.Appendix B provides mappings between the TIC 2.2 and TIC 3.0 security capabilities, for reference. ��12 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.4Security Pattern Agency Campusto Partner AgencyFigure 7illustrates connections where an agencyconnects or providservices toartner agency(e.g., ntergency traffic. This communicationcan take place through two options, described below.Regardless of the option chosen, due diligence must be practiced to ensure agencies are protecting their information in line with their risk tolerances.ne option permits a direct network connection to the artner gency. The partner agency employs appropriate TIC or all its external network connectionsensuring a baseline of protections along withinformation sharing with NCPS. However, agencies may supplement these protections to better reflect their risk tolerances. Figure 7: Security Pattern 4: Agency Campus to Partner Agency Implementation Consideration Agencies may connect directly with partner agencies so long as NCPS visibility exists at both ends. ��11 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.3Security Pattern : Agency Campus to External PartnerFigure 6illustrates the scenariowhere an agency the services of or provides services to an xternal artner. Entities within the gency ampus either tablish a new protected connection or usean existing protected connection with the external partner access resources from thatpartner. In this ecurity attern, the PEPat the agency campusensures that data flows to and from xternal artners are properly protected and only authorized services and information are being exchanged. Theat the agency campusapplies any applicable security polices and ensures the appropriatetraffic is forwarded to the TIC ccess oint. The TIC ccess oint applies all applicable security polices before transiting traffic to or from the xternal artner. Figure 6: Security Pattern 3: Agency to External Partner Implementation Consideration Agencies must ensure that (1) appropriate protections are in place when connecting with an external partnerand (2) only authorized services are being used and authorized information is being exchanged. ��10 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.2Security Pattern 2: Public User to Agency CampusFigure 5illustrates connections where a publicuseraccessesservicesprovided by the agencycommonly in the form of services. Connections in this security pattern are among the riskiest since a possibly untrusted public user connecting toe agency andits services; therefore, the greatest amount of rigor shouldbe applied to the security capabilities. Since users are accessingservicesthatmay contain agency dataagencies must practice due diligence in protecting their information in linewith their risk tolerances.In this ecurity attern, the PEPat the agency campusapplies any applicable security policand ensures the relevant service traffic is forwarded to the TIC ccess oint. This PEP alsoensures that data flows to and from public sers are properly protected and only authorized services and information are exchanged with eligible users. The TIC ccess oint applies all applicable security policiesbefore transiting traffic to and from the ublic ser.If an agency service is deployed to the TIC access point, the may be a shared responsibility deployment model, with hardware owned and managed by the TICAP and services deployed by the agency. In this scenario, the TIC access point ensures that only appropriate traffic is sentto the agency services, and the agency ensures that only authorized users can access and exchange autho

30 rized information with the agency servic
rized information with the agency services. Figure 5: Security Pattern 2: Public User to Agency Implementation Consideration Agencies should apply the greatest rigor to security capabilities where public users accessagency servicesnformationmust beprotected in line with their risk tolerances. ��9 ��TIC 3.0 Traditional TIC Use CaseApril2021Security PatternsFoursecurity patternscapture the data flows for the Traditional TIC Use Case. Eachs distinct sources, stinations, and options for policy enforcement.Regardless of the options chosen, due diligence must be practiced, ensuring agencies are protecting their information in line with their risk toleranceshen additional security capabilitiesare necessary to manage residual risk, agencies shouldapply the controls or explore options for compensating capabilitiesthat achieve the same protections to manage risks. The security patterns includethe followitrust zone destinations: Web, Public , External artner, andPartner gency6.1Security Pattern 1: Agency Campus to Webigure 4illustrates connections where agency entities connect to the open nternetor webfor services.Connections in this security pattern are among the riskiestbecause the web isan untrusted entitytherefore, the greatest amount of rigor should be applied tothe securitycapabilities. In this ecurity attern, the PEPthe agency campusapplies any applicable security policiand ensures the appropriate traffic is forwarded to the TIC ccess oint. Then, the TIC ccess oint applies all applicable security policfore transiting traffic to or from the eb. Figure 4: Security Pattern 1: Agency Campus to Web Implementation Consideration Agencies should apply the greatest rigor to security capabilities for the connections between the agency campus and the web. ��7 ��TIC 3.0 Traditional TIC Use CaseApril2021or as a PEP rather than a distinct zoneAlso, some agenciesdeployments of theTraditional TIC Case may include only a subset of the listed trust zones.he trust zones are labeledwith levels of trust, using the threelevel example trust hierarchy from theReference Architecture. While these levels were selected based on existing pilots or deployments, they may not capture the needs or requirements of all agencies. As such, gencies may determine and label trust zones according to the trust levels that best describe their environment.For example, an agency may not consider the partner agency as having a high trust level and may decide to label it with a medium trust level. The trust levels in this use case are intended to beexamples. Agencies may define a assign trust levels to align with their requirements, environments, and risk tolerance. Table 2briefly explains why each entity is labeled with either a high, medium, or low trust zone in this use case to help agencies determine what is most appropriate in their implementation.Table 2: Trust Zonesthe Traditional TIC Case Trust Zone Description Agency C ampus Trust Zone The Agency Campus T rust Z one is the logical zone for the agency campus or the agency’s enterprise network. The trust zone includes management entities MGMTsuch as the NOC, SOC, and other entities. The agency maintains control over and visibility into the agency campus. It is responsible for defining policies, implementing them in the various PEPs controled by the agency, and identifying and responding to incidents. Given the control and visibility maintained by the gency, the Agency Campus rust one labeledwith gh trust levelin this use. TIC Access Point Trust Zone The TIC A cces s Point T rust Z one is the logical zone that depicts the location where the agency campus’s external connections are consolidated. The TIC access point must have, at a minimum,TIC 2.2 security controls in place to secure and monitor the traffic entering and leaving the agency campus. This trust zone may be part of the gency campus as its TICAP ormay be provided by an external entity as part of an MTIPS solution or a MultiService TICAP.The TIC Access oint Trust one may also host agency services for useby external entities. While the agency may have limits in terms of control and visibility into this zone, the TIC AccessPoint rust one labeledwith high trust levelin this usecasedue to the welldefined security protections and NCPS telemetry employed by the TIC ccess oint. Agency Trust Zone The Agency T rust Z one is a logical zone that represents the accreditation boundary for the gency. It containssmaller,nested trust zoneincludingthe gency campus and the TIC ccess oint; mayalsoinclude branch offices and emote sers. This zone may not existin some agencies’ implementationor may contain different components. Forexample, some agencies may not consider the TIC access ointranch ffices, or remote sersinside a common boundary Given that it is omprisezones labeled with high trust levelsthe Agency rust one labeledwith high trust levelin this usecase. ��6 ��TIC 3.0 Traditional TIC Use CaseApril2021The traditional TIC model was commonly represented as comprising an “Internal Zone” containing agency components and the TIC access point as its boundary, and an “External Zone” containing the arious entities the agency would communicate with. This model is conceptualized in TIC3.0 by nesting trust zones within a larger, primary trust zone, which is depicted as the Agency Trust Zone Figure 3. In this scenario, the nestedtrust zones include the agency campus, the TIC access point, thebranch office, and the remote userThese trust zones can be nested within the Agency Trust Zone because t

31 hey share a boundary that is secured by
hey share a boundary that is secured by the same PEP(i.e., the TIC access point). Figure 3Traditional TIC Conceptual ArchitectureThe branch office and remote user trust zones are included in this use case because they are commonldeployed when implementing TIC 2.2. In the TIC 2.2 model, ose zones send traffic to external entities through agency TIC access points. It is important to note that the architecture depicted in Figure 3 can be tailored depending on anagency’s uniquerequirements. For example, while this nested representation includes the TIC access point, some traditional TIC deployments may consider the TIC access point as being outside the Agency Trust Zone “TIC Reference Architecture v2.2,” Department of Homeland Security (2017). ttps://www.cisa.gov/sites/default/files/publications/TIC_Ref_Arch_v2.2_2017.pdf. ��5 ��TIC 3.0 Traditional TIC Use CaseApril2021The agency has limited control over and visibility into external partners. xternal partners have NOCs and SOCs that control and protect the portions of theinfrastructure where the agencyhas little to no control or visibility.he agency only uses secure mechanisms (e.gtransport layer security (TLS) or VPN) to communicate with external partners.The agency only uses strong authentication mechanisms (e.g., Federal Information Processing Standard (FIPS) 140-2complaint multictor authentication(MFA)) with external partners.Data provided to external partnersis protected at a level commensurate with the agency’s risk toleranceandin accordance with federal guidelines.The following are assumptions about partner agenies. Thepartner agency employs appropriate TIC ases for all its external network connections, ensuringappropriate protectionsand information sharing with NCPS. Interactions with partner agencies follow agencydefined policies and procedures for business ed justification, partner connection eligibility, service levels, data protections, incident response information sharing and reporting, costs, data ownership, and contracting.The agency uses only limited and welldefined services of partner agencies or permits partner agencies access to only limited and welldefined services of the agency.The agency has limited control over and visibility into partner agencies. Partner agencies have NOCs and SOCs that control and protect the portions of their infrastructure where the agency has little to no control or visibility.The agency only uses using secure mechanisms (e.g., TLSor VPN) to communicate with partner agencies.The agency only uses strong authentication mechanisms (e.g., FIPS 2 complaint MFA) with partner agencies.Data provided to partner agenciesis protected at a level commensurate with the agency’s risk tolerance and in accordance with federal guidelines. The following are assumptions about the . The contains untrusted entities. The agencycannotapply policy in the . The following are assumptions about thepublic user. Thepublic user is accessing agency services from the nternet. The public user is unmanaged and untrusted by the agency. Conceptual ArchitectureThe Traditional TIC Use Case focuses on the scenario in which agency network traffic traverses a TIC ccess ointwhen moving to and from external zonesAs shown inFigure this use caseis composed primarily of sixtrust zonesagency campus, TIC access point, web, public user, external partner, and partner agencyTIC access point. These trust zones are detailed in Table 2To simplify the visualization and descriptions, the case shows single trust zones to represent classes of external entities or environments. However, this simplification is not meant to imply that an agency must treat all entities and environments of the same class (e.gxternal partners) in the same manner. Federal Information Processing Standard 1402,” National Institute of Standards and Technology (2019). https://csrc.nist.gov/publications/detail/fips/140/2/final. ��4 ��TIC 3.0 Traditional TIC Use CaseApril2021Assumptions and ConstrainThis section outlines guiding assumptions and constraints for the Traditional TIC Use Case. It isintended to clarify significant details about the construction and replication of this use case. The assumptions are broken down by the use case as a whole and by the unique entitiesdiscussed in the use case: Agency campus,TIC access point,External partners,Partner agencies,Web, and Public users. The following are the assumptions and constraints of this use case. Requirements for information sharing with CISA in support of National Cyber Protection System (NCPS) and Continuous Diagnostics and Mitigation(CDM) purposes are beyond the scope of this document.Consult the NCPS rogramand CDM programfor further details.The TIC 3.0 security capabilities applicable to the use case are not dependent on a data transfer mechanism. In other words, the same security capabilities apply if the conveyance is over leased lines, software virtual private network (VPN), hardware VPN, etc. The following are assumptions about the agency campus. The agency campus accesses the eb or trusted external partners through a TIC ccess oint.The agency maintains control over and has significant visibility into the agency campus. Data is protected at a level commensurate with the agency’s risk toleranceandin accordance with federal guidelines.The agency employs network operation center (NOC) and security operation center (SOC) tools capable of maintaining and protecting the portions of the overall infrastructure. To accomplish this, agencies can opt to use a NOC and SOC, or commensurate solutions.The following are assumptions about the TIC access oint. The TIC

32 ccess oint is TIC 2.2 compliant. The TIC
ccess oint is TIC 2.2 compliant. The TIC ccess oint is managed as a Single Service TICAP by the agency,or as a MultiService TICAP by the agencyanother agency, or an MTIPS provider. The agency employs traditional methods for accessing the TIC ccess oint, though supplemental protections may be provided using alternative methods.The following are assumptions about external partners (e.ga CSP, a network, an extranet). he gency ensures that interactions with external partners follow agencydefined policies and procedures for business need justification, partner connection eligibility, service levels, data protections, incident response information sharing and reporting, costs, dataownership, and contracting.The agencyuses only limited and welldefined services of external partners or permits external partners access to only limited and welldefined services of the agency. “National Cybersecurity Protection System,” Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/nationalcybersecurityprotectionsystemncps.“Continuous Diagnostics and Mitigation,” Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/cdm. ��3 ��TIC 3.0 Traditional TIC Use CaseApril2021Each trust zone in a use case will be labeled with a high, medium, or low trust level, based on a pilot implementation or best practice. The use cases aredepicted following the schema illustratein Figure 2. Agencies can modify this trust zone designation to meet their needs.Refer to theReference Architecturefor more details on trust zones. ure Use Case Trust Zone LegendWhen securing trust zones, agencies should consider unique data sensitivity criteria and the impact of compromise to agency data stored in trust zones. Agencies may apply additional security capabilities that have not beincluded in the use case. Agencies have the discretion to determine the level of rigor necessary for applying securitycapabilities in use cases, based on federal guidelines and their risk tolerance.Refer to theUse Case Handbookfor more information on TIC use cases. Purpose of the Traditional TIC Use CaseTheTIC 3.0 Traditional TIC Use Case(Traditional TIC Use Case)defines how network security be applied when an agency has personnel on their network physical location (i.ean gency campusthat uses a traditional TIC access ointeither an agency TIC Access Provider (TICAP) Managed Trusted Internet Protocol Services (MTIPS) provider, when accessing the trusted external partners, or partner government agencies. A trusted external partner may include an agencysanctioned cloud service provider (CSP), or business partnersamong others. This use case includes four network security patterns: Secure gencycampus access to ; Public user to secure agency campus;Secure gencycampus access to agencysanctioned external partners; andSecure gency campus access to partner agencies. An gencymay implement a subset of these traffic flows rather thanall. For instance, an agencymay not have trusted external partners. The Traditional TIC Use Case is the “default use case.” This use case demonstrates how TIC 2.2 security capabilities at a TIC access point can be used to implement TIC 3.0 to meet an agency’s specific requirements, risk tolerances, and other factors. OMB M-26 defines the Traditional TIC Use Case as the “default use case” which leverages agency TICAP and MTIPS providers.The Traditional TIC Use Case is intended to provide additional guidance to agencies and providers for how existing TIC 2.2 security capabilities at a TIC ccess oint can be used to implement TIC 3.0 capabilities.While the TIC 2.2 security capabilities are consistent with the TIC 3.0 objectives, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0 security capabilities to reflect their agency requirements, risk tolerances, and other factors. ��2 ��TIC 3.0 Traditional TIC Use CaseApril2021Telemetry: Artifacts derived from security capabilities that provide visibility into security posture.TIC: The term “TIC” is used throughout the Federal Government to denote different aspects of the TICinitiative; including the overall TIC progr, a physical TIC access point (also known as a Traditional TIC), and a TIC Access Provider (TICAP – see below). This document refers to TIC as an adjective or as the Trusted Internet Connections initiative.TIC Access Point: The physical location where afederal civilian agency consolidates its externaconnections and has security controls in place to secure and monitor the connections.TIC Access Provider (TICAP): An agency or vendor that manages and hosts one or more TIC access points. Single Service TICAPs serve as a TIC Access Provider only to their own agency. MultiService TICAPs also provide TIC services to other agencies through a shared services model. TIC Overlay:A mapping of products and services to TIC ecurity apabilities.TIC Use Case:Guidanceon the secure implementation and/or configuration of specific platforms, services, and environments. A TIC use case contains a conceptual architecture, one or more security pattern options, security capability implementation guidance, and CISA telemetry guidance for a common agency computing scenario. Trust Zone:A discrete computing environment designated for information processing, storage, and/or transmission that sharethe rigor or robustness of the applicable securitycapabilitiesnecessary to protect the traffic transiting in and out of a zone and/or the information within the zone.Web:An environment used for web browsing purposes. Also see Internet. Overviewof TIC Use Cases TIC use casesprovide guid

33 ance on the secure implementation and co
ance on the secure implementation and configuration of specific platforms, services, and environments, and will be released on an individual basis. The guidance is derived from pilot programs and best practices from the public and private sectors. The purpose of each TIC use case is to identify the applicable security architectures, data flows, and policy enforcement points (PPs)and to describe the implementation of the security capabilities in a given scenario. TIC use cases articulate:Network scenarios for TIC implementation, Security patterns commonly used within the federal civilian enterprise, andTechnologyagnostic methods for securing current and emerging network models. TIC use cases build upon the key concepts and conceptual implementation of TIC 3.0 presented in the TIC 3.0 Reference Architecture(Reference Architecture) and provides implementation guidance for applicable security capabilities defined in the TIC 3.0 Security Capabilities Catalog(Security Capabilities Catalog). The TIC 3.0 Use Case Handbook(Use Case Handbook) provides general guidance for how agencies canuse and combine use cases.Agencies have flexibility in implementing TIC use cases. In particular:An agency may combine one or more use cases to best design and implementtheir TIC architectures. Use cases may provide more than one option for implementing a security pattern in order to give agencies flexibility. ��1 ��TIC 3.0 Traditional TIC Use CaseApril2021IntroductionTrusted InternetConnections (TIC), originally established in 2007, is a federal cybersecurity initiative intended to enhance networkand perimetersecurity across the Federal GovernmentThe Office of Management and Budget (OMB), the Department of Homeland Security (DHS)Cybersecurity and Infrastructure Security Agency (CISA), and the General Services Administration (GSA) oversee the TIC initiativethrough a robust program that sets guidance and an execution framework for agencies to implement a baseline perimeter security standard.The initial versions of the TIC initiative sought to consolidate federal networks and standardize perimetersecurity for the federal enterpriseAs outlined in OMB Memorandum (M) 26:Update to the Trusted InternetConnections (TIC) Initiative, this modernized version of the initiative expands upon the original to drive security standards and leverage advances in technology as agencies adopt mobile and cloud environmentsThe goal of TIC 3.0 is to secure federaldata, networks, and boundaries while providing visibility into agency traffic, including cloud communications.1.1Key Termsavoid confusion, terms frequently used throughout the TIC 3.0 documentation are defined below. Some of these terms are explained ingreater detail throughout the TIC 3.0 guidance. A comprehensive glossary and acronyms list with applicable attributions can be found in Appendix A.Boundary:A notional concept that describes the perimeter of a zone (e.gmobile device services, general support system (GSS), Software-a-Service (SaaS), agency, etc.) within a network architecture. The bounded area must have an information technology (IT) utility.Internet:The internet is discussed in two capacities throughout TIC documentation. means of data and IT traffic transport. An environment used for web browsing purposes, hereafter referred to as “Web.” Managed Trusted Internet Protocol Services (MTIPS):Services undeGSA’s Enterprise Infrastructure Solutions (EIS) contract vehicle thatprovideTIC solutions to government clients as a managed security service. It is of note that the EIS contract is replacing the GSA Networx contract vehicle that is set to expire inscal Year (FY) 2023.Management Entity (MGMT): A notional concept of anentity that oversees and controls security capabilities. The entity can be an organization, network device, tool, service,or application. The entity can control the collection, processing, analysis, and display of information collected from the policy forcement points (PEPs), and allows IT professionals to control devices on the network.Policy Enforcement Point (PEP):A security device, tool, function, or application that enforces security policies through technical capabilities.Security CapabilityA combination of mutuallyreinforcing security controls (i.e., safeguards and countermeasures) implemented by technical means (i.e., functionality in hardware, software, and firmware), physical means (i.e., physical devices and protective measures), and procedural means (i.e., procedures performed by individuals).Security capabilities help to define protections for information being processed, stored, or transmitted by information systems. “Update to the Trusted Internet Connections (TIC) Initiative,” Office of Management and Budget M-26 (2019). https://www.whitehouse.gov/wpcontent/uploads/2019/09/M26.pdf. "Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 80053 R)," September. http://dx.doi.org/10.6028/NIST.SP.8005. ��19 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Detonation Chamber Detonation c hambers facilitate the detection of malicious code using protected and isolated execution environments to analyze the files. New cap ability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabili

34 tie Data Loss Prevention Data l oss p
tie Data Loss Prevention Data l oss p revention (DLP) technologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs. Agenciesshould understand the protections offered by the TIC access point’s DLP program and integrate them into theiroverall DLP program. Table 5: Email PEP Security CapabilitiesEmail PEP Security Capabilities Cap ability Description Use Case Specific Guidance Anti - phishing Protections Anti - phishing protections detect instances of phishing and prevent users from accessing them. Agencies can use e mail services in TIC access point, which provide anti phishing protections. Anti - spam Protections Anti - spam protections detect and quarantine instances of spam. Agencies can use e mail services in TIC access point, which provide spam detection and quarantine services. Authenticated Received Chain Authenticated r eceived c hain allows for an intermediary, like a mailing list or forwarding service, to sign its own authentication of the original email, allowing downstream entities to accept the intermediary’s authentication even if the email was changed. New capability in TIC 3.0 that can be implemented to supplementthe TIC 2.2 capabilities. Data Loss Prevention DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access points employ DLP programs. Agenciesshould understand the protections offered by the TIC access point’sDLP program and integrate them into theiroverall DLP program. ��18 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Integrated Desktop, Mobile, and Remote Policies Integrated desktop, mobile, and remote policies defineand enforcepolicies that apply to a given agency entit independent of its location. This capability has been commonly implemented by having all gency entities route traffic through gency TIC access pointswhen communicating with the eb or external partners. 7.2Policy Enforcement Point Security Capabilitiessecurity capabilitiesfocus thenetworklevel andinform technical implementation fora given use case, such as securing agency campus communication with agencysanctioned external partners. Agencies ve the discretion to determine the applicability and level of rigor necessary for applying PEP security capabilities based on their mission, the policy enforcement options available, federal guidelines, and risk tolerance. From theSecurity Capabilities Catalog, the PEP security capability groups applicable to this use casecorrespond to the following security functions: Files, Email,Web,Networking,Resiliency,Domain Name System (DNS), Intrusion Detection, Enterprise,Unified Communications and Collaboration (UCC), andData rotectio Agencies may determine the applicability and rigor of the security capabilities based on federal guidelines, mission needs, available policy enforcement options, and risk tolerance. The PEPsecuritycapability listing is not exhaustive. Additional security capabilities may be deployed by agencies to reflect their risk tolerances, early adoption of security capabilities, the maturity level of existing cyber programs, and other factors. Table 4: Files PEP Security CapabilitiesFiles PEP Security Capabilities Capability Description Use Case Specific Guidance Anti - malware Anti - malware protections detect the presence of malicious code and facilitate its quarantine or removal. TIC access point s can ap ply anti - malware protections in their email services (see Table 5and traffic (see Table 6). Content Disarm and Reconstruction Content d isarm and r econstruction technology detects the presence of unapproved active content and facilitates its removal. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. ��iv &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021TIC 3.0 Traditional TIC Use Caseable of ContentsIntroduction 11.1Key Terms 1Overview of TIC Use Cases 2Purpose of the Traditional TIC Use Case 3Assumptions and Constraints 4Conceptual Architecture 5Security Patterns 96.1Security Pattern 1: Agency Campus to Web 96.2Security Pattern 2: Public User to Agency Campus6.3Security Pattern 3: Agency Campus to External Partner6.4Security Pattern 4: Agency Campus to Partner AgencyApplicable Security Capabilities7.1niversal Security Capabilities7.2Policy Enforcement Point Security CapabilitiesTelemetry RequirementsConclusionAppendix A – Glossary and DefinitionsAppendix B – Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesAppendix B.1 – TIC 2.2 Capabilities to TIC 3.0 CapabilitiesAppendix B.2 – TIC 3.0 Capabilities to TIC 2.2 CapabilitiesList of FiguresFigure 1: TIC 3.0 Guidance SnapshotFigure 2: Use Case Trust Zone Legend 3Fig

35 ure 3: Traditional TIC Conceptual Archit
ure 3: Traditional TIC Conceptual Architecture 6igure 4: Security Pattern 1: Agency Campus to Web 9Figure 5: Security Pattern 2: Public User to AgencyFigure 6: Security Pattern 3: Agency to External PartnerFigure 7: Security Pattern 4: Agency Campus to Partner AgencyFigure 8: Traditional TIC Telemetry Sharing with CISA ��iii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Reader’s GuideThe TrustedInternet Connections (TIC) initiative is defined through key documents that describe the directive, the program, the capabilities, the implementation guidance, and capability mappings. Each document has an essential role in describing TIC and its implementation. The documents provide an understanding of how changes have led to the latest version of TIC and why those changes have occurred. The documents go into highlevel technical detail to describe the exact changes inarchitecture for TIC 3.0. The documents are additive; each builds on the other like chapters in a book. As depicted in Figure 1, the documents should be referenced in order and to completion to gain a full understanding of the modernized initiative. Figure 1TIC 3.0 Guidance Snapshot ��ii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Revision HistoryThe version number will be updated as the document is modified. This documentwill be updated as needed to reflect modern security practices and technologies.Table 1: Revision History Versi on Date Revision Description Section/Pages Affected Draft December 2019 Initial Release All 1.0 April 2021 Response t o RFC and S takeholder Feedback A ll This use case references rusted nternet onnections3.0 Security Capabilities Catalog v, dated AprilThe applicable security capabilities will be further explained in the document. Trusted Internet Connections 3.0 Traditional TIC Use CaseApril 2021 Version 1.0Cybersecurity and Infrastructure Security AgencyCybersecurity Division ��34 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability ID Short Title Unive rsal Capabilit ies (potentially partial) PEP Capabilit ies (potentially partial) TS.CF.01 Application Layer Filtering Not applicable Web: R equest for ommentsCompliance Enforcement TS.CF.02 Web Session Filtering No t applicable Files: Anti - malware Email: Uniform Resource LocatorClickhrough Protection Web: Active Content Mitigation, Content Filtering, Domain Category Filtering, Domain Reputation Malicious Filtering TS.CF.03 Web Firewall Not applic able Not applicable TS.CF.04 Mail Filtering Not applicable Files: Anti - malware Email: Antiphishing Protections, Antispam Protections, Malicious Uniform Resource LocatorProtections TS.CF.05 Agency Specific Mail Filters Not applicable Files: Anti - malwar e TS.CF.06 Incoming Mail Authentication (Mail Forgery Detection) Not applicable Email: Domain Signature Verification for Incoming Email TS.CF.07 Email Authentication (Digitally Signing Mail) Not applicable Email: Domain Signatures for Outgoing Email TS. CF.08 Mail Quarantine Not applicable Not applicable ��22 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Domain Resolution Filtering Domain resolution filtering prevents entities from using the DNSover Hypertext Transfer Protocol Secure HTTPS), or DoH, domain resolution protocol, possibly evading DNSbased protections. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Protocol Compliance Enforcement Protocol c omplian ce e nforcement technologies ensure that traffic complies with protocol definitions, documented by the Internet Engineering Task Force (IETF) . TIC access point s employ proxies for traffic which ensures compliance of the sessions. Domain Category Filtering Do main c ategory f iltering technologies allow for classes of domains (e.g banking, medical) to receive a different of security protections. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Domain Reputation Filter Dom

36 ain r eputation f iltering protectio
ain r eputation f iltering protections are a form of omain enylistingbased on a domain’s reputation, as defined by either the agency or an external entity. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 pabilities. Bandwidth Control Bandwidth c ontrol technologies allow for limiting the amount of bandwidth used by different classes of domains. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Malicious Content ering Malicious c ontent f iltering protections detect the presence of malicious content and facilitate its removal. TIC access point s can detect and remove malicious content in traffic. Access Control Access c ontrol technologies allow an agency to define policies limiting what actions may be performed by connected users and entities. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. “RFCs,” Internet Engineering Task Force (2021). https://www.ietf.org/standards/rfcs/ ��45 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description TIC 2.2 Mapping Certificate enylisting Certif icate denylisting protections prevent communication with entities that use a set of known bad certificates. Not applicable Content Filtering Content filtering protections detect the presence of unapproved content and facilitate its removal or denial of access. TS.CF.02 TS.CF.04 Authenticated Proxy Authenticated proxies require entities to authenticate with the proxy before making use of it, enabling user, group, and locationaware security controls. Not applicable Data Loss Prevention DLP technologies de tect instances of the exfiltration, either malicious or accidental, of agency data. TM.DS.05 Domain Resolution Filtering Domain resolution filtering prevents entities from using the overHypertext Transfer Protocol Secure(HTTPS), or DoH, domainresolution protocol, possibly evading DNS based protections. Not applicable Protocol Compliance Enforcement Protocol complian ce enforcement technologies ensure that traffic complies with protocol definitions, documented by the IETF. TS.CF.01 Domain Category Filtering Domain category filtering technologies allow for classes of domains (e.gbanking, medical) to receive a different set of security protections. Not applicable Domain Reputation Filter Domain reputation filtering protections are a form of domain denylistingbased on a domain’s reputation, as defined by either the agency or an external entity. Not applicable Bandwidth Control Bandwidth c ontrol technologies allow for limiting the amount of bandwidth used by different classes of domains. Not appli cable Malicious Content Filtering Malicious c ontent f iltering protections detect the presence of malicious content and facilitate its removal. TS.CF.02 TS.CF.04 Access Control Access c ontrol technologies allow an agency to define policies limiting what actions may be performed by connected users and entities. Not applicable ��7 ��TIC 3.0 Traditional TIC Use CaseApril2021or as a PEP rather than a distinct zoneAlso, some agenciesdeployments of theTraditional TIC Case may include only a subset of the listed trust zones.he trust zones are labeledwith levels of trust, using the threelevel example trust hierarchy from theReference Architecture. While these levels were selected based on existing pilots or deployments, they may not capture the needs or requirements of all agencies. As such, gencies may determine and label trust zones according to the trust levels that best describe their environment.For example, an agency may not consider the partner agency as having a high trust level and may decide to label it with a medium trust level. The trust levels in this use case are intended to beexamples. Agencies may define a assign trust levels to align with their requirements, environments, and risk tolerance. Table 2briefly explains why each entity is labeled with either a high, medium, or low trust zone in this use case to help agencies determine what is most appropriate in their implementation.Table 2: Trust Zonesthe Traditional TIC Case Trust Zone Description Agency C ampus Trust Zone The Agency Campus T rust Z one is the logical zone for the agency campus or the agency’s enterprise network. The trust zone includes management entities MGMTsuch as the NOC, SOC, and other entities. The agency maintains control over and visibility into the agency campus. It is responsible for defining policies, implementing them in the various PEPs controled by the agency, and identifying and responding to incidents. Given the control and visibility maintained by the gency, the Agency Campus rust one labeledwith gh trust levelin this use. TIC Access Point Trust Zone The TIC A cces s Point T rust Z one is the logical zone that depicts the location where the agency campus’s external connections are consolidated. The TIC access point must have, at a minimum,TIC 2.2 security controls in place to secure and monitor the traffic entering and leaving the agency campus. This trust zone may be part of the gency campus as its TICAP ormay be provided

37 by an external entity as part of an MTI
by an external entity as part of an MTIPS solution or a MultiService TICAP.The TIC Access oint Trust one may also host agency services for useby external entities. While the agency may have limits in terms of control and visibility into this zone, the TIC AccessPoint rust one labeledwith high trust levelin this usecasedue to the welldefined security protections and NCPS telemetry employed by the TIC ccess oint. Agency Trust Zone The Agency T rust Z one is a logical zone that represents the accreditation boundary for the gency. It containssmaller,nested trust zoneincludingthe gency campus and the TIC ccess oint; mayalsoinclude branch offices and emote sers. This zone may not existin some agencies’ implementationor may contain different components. Forexample, some agencies may not consider the TIC access ointranch ffices, or remote sersinside a common boundary Given that it is omprisezones labeled with high trust levelsthe Agency rust one labeledwith high trust levelin this usecase. ��3 ��TIC 3.0 Traditional TIC Use CaseApril2021Each trust zone in a use case will be labeled with a high, medium, or low trust level, based on ilot implementation or best practice. The use cases aredepicted following the schema illustrate Figure 2. Agencies can modify this trust zone designation to meet their needs.Refer to theReference Architecturefor more details on trust zones. ure Use Case Trust Zone LegendWhen securing trust zones, agencies should consider unique data sensitivity criteria and theimpact of compromise to agency data stored in trust zones. Agencies may apply additionalsecurity capabilities that have not beincluded in the use case.Agencies have the discretion to determine the level of rigor necessary for applying securitycapabilities in use cases, based on federal guidelines and their risk tolerance. Refer to he Handbookforrenformation on TICases.The TIC 3.0 Traditional TIC Use Case (Traditional TIC Use Case) defines how network security can be applied when an agency routes traffic from an agency campus to the web, trusted external partners, or partner government agencies through a traditional TIC access point, either an agency TIC Access Provider (TICAP) or Managed Trusted Internet Protocol Services (MTIPS) prov, or ecure gencycampus access to Public user to secure agency campus;Secure gencycampus access to agencysanctioned external partners; andSecure gency campus access to partner agenciesAn gencymay implement a subset of these traffic flows rather thanall. For instance, an agencymay not have trusted external partners. The Traditional TIC Use Case is the “default use case.” This use case demonstrates how TIC 2.2 security capabilities at a TIC access point can be used to implement TIC 3.0 to meet an agency’s specific requirements, risk tolerances, and other factors. OMB M-26 defines the Traditional TIC Use Case as the “default use case” which leverages agency TICAP and MTIPS providers.The Traditional TIC Use Case is intended to provide additional guidance to agencies and providers for how existing TIC 2.2 security capabilities at a TIC ccess oint can be used to implement TIC 3.0 capabilities.While the TIC 2.2 security capabilities are consistent with the TIC 3.0 objectives, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0 security capabilities to reflect their agency requirements, risk tolerances, and other factors. ��23 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table 7: Network PEP Security CapabilitiesNetwork PEP Security Capabilities Capability Description Use Case Specific Guidance Access Control Access c ontrol protections prevent the ress, egress, or transmission of unauthorized network traffic. TIC access point s employ a combination of firewalls and proxies to limit the traffic coming into and leaving the TIC access point. When VPNs, or similar technologies, are used to bridge together the gency ampusnetwork with other environments, the gency ampus should use access control protections to ensure only appropriate traffic is sent to and received from the other environments. I nternet Address enylisting I nternet address d enylist ing protections prevent the ingest or transiting of traffic received from or destined to a enylisted internetaddress. TIC access point s can drop w eb traffic to specific IP addresses and can alert on attempts to access specific IP addresses. Host Containmen Host c ontainment protections enable a network to revoke or quarantine a host’s access to the network. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Network Segmentation Network s egmentation separates a given etwork into subnetworks, facilitating security controls between the subnetworks, and decreasing the attack surface of the network. TIC access point s employ network segmentation internally. By routing their external connections through T access point, agenciessegment their networks from external environments. When VPNs, or similar technologies, are used to bridge together the gency ampusnetwork with other environments, the gency ampus network should be segmented so that leastprivilege access ismaintained

38 , and to limit the impact of the compro
, and to limit the impact of the compromise of the external environment. ��22 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Domain Resolution Filtering Domain resolution filtering prevents entities from using the DNSover Hypertext Transfer Protocol Secure HTTPS), or DoH, domain resolution protocol, possibly evading DNSbased protections. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Protocol Compliance Enforcement Protocol c omplian ce e nforcement technologies ensure that traffic complies with protocol definitions, like those documented by the Engineering TIC access point s employ proxies for traffic which ensures compliance of the sessions. Domain Category Filtering Do main c ategory f iltering technologies allow for classes of domains (e.g banking, medical) to receive a different of security protections. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Domain Reputation Filter Domain r eputation f iltering protections are a form of omain enylistingbased on a domain’s reputation, as defined by either the agency or an external entity. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 pabilities. Bandwidth Control Bandwidth c ontrol technologies allow for limiting the amount of bandwidth used by different classes of domains. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Malicious Content ering Malicious c ontent f iltering protections detect the presence of malicious content and facilitate its removal. TIC access point s can detect and remove malicious content in traffic. Access Control Access c ontrol technologies allow an agency to define policies limit what actions may be performed by connected users and entities. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. “RFCs,” Internet Engineering Task Force (2021). https://www.ietf.org/standards/rfcs/ ��21 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table 6: Web PEP Security CapabilitiesWeb PEP Security Capabilities Capability Description Use Case Specific Guidance Break and Inspect Break and Inspect systems , or encryption proxies,terminate encrypted traffic, log or perform policy enforcement against the plaintext, and re-encrypt the traffic, if applicable, before transmitting to the final destination. New capability in TIC 3.0 that can be mplemented to supplement the TIC 2.2 capabilities. BreakandInspect solutions should be considered in the context of the sensitivity of data being scanned, the trust level designation of the source and destination, other security capabilities that offer comparable visibility, and the rotocols and services in use. Active Content Mitigation Active c ontent m itigation protections detect the presence of unapproved active content and facilitate its removal. TIC access point s can detect and remove malicious content in traffic. Certifica te enylisting Certificate d enylist ing protections prevent communication with entities that use a set of known bad certificates. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Conte nt Filtering Content f iltering protections detect the presence of unapproved content and facilitate its removalor denial of access. TIC access point s can detect and remove malicious content in traffic. Authenticated Proxy Authenticated p roxies requir e entities to authenticate with the proxy before making use of it, enabling user, group, and locationaware security controls. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Data Loss Prevention DLP technologies detect instances of e exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and ageiesshould understand the protections offered by the TIC access point’s DLP program andintegrate them into their overall DLP program. TIC 2.2 includes a variety of protections for unencrypted web traffic, which may be supplemented depending on the use of encrypted web traffic used by an agency ��20 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Cap ability Description Use Case Specific Guidance Domain Signature Verification for Incoming Email Domain

39 signature verification protectionsauth
signature verification protectionsauthenticate incoming email rding to the mainbased Message Authentication Reporting and Conformance (DMARCemail authentication protocol defined in Request for Comments (RFC) 7487 Agencies can use e mail services in TIC access point, which can perform integrity checks, usingschemes like mainKeys Identified Mail (DKIM or Sender Policy Framework (, on incoming email. Domain Signatures for Outgoing Email Domain signature protections facilitate the authentication of outgoing email by signing the emails and ensuring that external parties may validate the email signaturesaccording to theDMARC email authentication protocol that is defined in RFC. Agencies can use e mail services in TIC access point, whichcan digitally sign outbound email using schemes like DKIM. Encryption for Ema Transmission Email s ervices are configured to use encrypted connections, when possible, for communications between lientsand other mail ervers. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Malicious Link Protections Malicious link p rotections detect malicious linksin emails and prevent users from accessing them. New capability in TIC 3.0 that can be mplemented to supplement the TIC 2.2 capabilities. Link Click - hrough Protection Link c lick - t hrough p ro tections ensure that when a linkfrom an email is clicked, the requester is directed to a protection that verifies the security of the linkdestinationbefore permitting access. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 pabilities. EINSTEIN 3 Accelerated Email Protections EINSTEIN 3 Accelerated ( E 3 A ) 8 is an intrusion prevention capability offered by NCPS, provided by CISA, that includes an mail ilteringsecurity service. Agencies can use e mail services in TIC access point, which support the integration of NCPS Email rotections. “Domainbased Message Authentication, Reporting, and Conformance Request for Comments: 7489,” Internet Engineering Task Force (2015). https://tools.ietf.org/html/rfc7489. “EINSTEIN 3 Accelerated,” Cybersecurity and Infrastructure Security Agency(2013). https://www.cisa.gov/publication/einstein-3-accelerated. ��19 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Detonation Chamber Detonation c hambers facilitate the detection of malicious code using protected and isolated execution environments to analyze the files. New cap ability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilitie Data Loss Prevention Data l oss p revention (DLP) technologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs. Agenciesshould understand the protections offered by the TIC access point’s DLP program and integrate them into theiroverall DLP program. Table 5: Email PEP Security CapabilitiesEmail PEP Security Capabilities Cap ability Description Use Case Specific Guidance Anti - phishing Protections Anti - phishing protections detect instances of phishing and prevent users from accessing them. Agencies can use e mail services in TIC access point, which provide anti phishing protections. Anti - spam Protections Anti - spam protections detect and quarantine instances of spam. Agencies can use e mail services in TIC access point, which provide spam detection and quarantine services. Authenticated Received Chain Authenticated r eceived c hain allows for an intermediary, like a mailing list or forwarding service, to sign its own authentication of the original email, allowing downstream entities to accept the intermediary’s authentication even if the email was changed. New capability in TIC 3.0 that can be implemented to supplementthe TIC 2.2 capabilities. Data Loss Prevention DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access points employ DLP programs. Agenciesshould understand the protections offered by the TIC access point’sDLP program and integrate them into theiroverall DLP program. ��18 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Integrated Desktop, Mobile, and Remote Policies Integrated desktop, mobile, and remote policies defineand enforcepolicies that apply to a given agency entit independent of its location. This capability has been commonly implemented by having all gency entities route traffic through gency TIC access pointswhen communicating with the eb or external partners. 7.2Policy Enforcement Point Security Capabilitiessecurity capabilitiesfocus thenetworklevel andinform technical implementation fora given use case, such as securing agency campus communication with agencysanctio

40 ned external partners. Agencies ve the d
ned external partners. Agencies ve the discretion to determine the applicability and level of rigor necessary for applying PEP security capabilities based on their mission, the policy enforcement options available, federal guidelines, and risk tolerance. From theSecurity Capabilities Catalog, the PEP security capability groups applicable to this use casecorrespond to the following security functions: FilesEmail,Web,Networking,Resiliency,Domain Name System (DNSIntrusion Detection,Enterprise,Unified Communications aollaboration (UCC), andData rotectio Agencies may determine the applicability and rigor of the security capabilities based on federal guidelines, mission needs, available policy enforcement options, and risk tolerance. The PEPsecuritycapability listing is not exhaustive. Additional security capabilities may be deployed by agencies to reflect their risk tolerances, early adoption of security capabilities, the maturity level of existing cyber programs, and other factors. Table 4: Files PEP Security CapabilitiesFiles PEP Security Capabilities Capability Description Use Case Specific Guidance Anti - malware Anti - malware protections detect the presence of malicious code and facilitate its quarantine or removal. TIC access point s can ap ply anti - malware protections in their email services (see Table 5and traffic (see Table 6). Content Disarm and Reconstruction Content d isarm and r econstruction technology detects the presence of unapproved active content and facilitates its removal. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. ��17 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Enterprise Threat Intelligence Enterprise t hreat in telligence is the usage ofthreat intelligencefrom private government sourcesimplement mitigations for the identified risks. TIC access points can integrate threat intelligence from outside sources. Agencies should understand the threat intelligence sources TIC access points employ and may supplement the intelligenceif needed. Situational Awareness Situational awareness is m aintain ing t and historical across all components. TIC access points maintain si tuational awareness across customers. If possible, agencies should integrate telemetry available from TIC access points including telemetry from agency services deployed in the TIC access pointinto the platforms they use to maintain situational awareness,to improvetheir overall situational awareness. Dynamic Threat Discovery D ynamic threat discovery is the practice of using dynamicapproaches (e.g., heuristics, baselining, etc.) to discover new malicious activity. TIC access points provide telemetry to an agency for use in their dynamic threat discovery program. Policy Enforcement Parity Policy enforcement parity entails onsistently applying security protections and other policies, independent of the communication mechanism, forwarding path, or endpointsused. This capability is commonly implemented by having gency entities route traffic through gency TIC access points when communicating with the eb or external partners.When working with a partner agency, this capability implemented by ensuring both agencies use appropriate TIC protections for their external connections. Effective Use of Shared Services Effective use of s hared services means that shared services areemployed where applicable, andindividually tailored and measured to independently validate service conformance, and offer effective protections for tenants against malicious actors, both external and internal to the service provider. This capability has been commonly implemented usingshared infrastructure when implementing Single Service TICAPs or using MuService TICAPs. ��28 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Data Loss Prevention M ec hanisms should be implemented to controlthe sharing of information between UCC participants, intentional or incidental.This may be integrated into additional agency DLP technologies and can include keyword matching, attachment file type or existence prohibitions, attachment size itations, or even audio/visual filters. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Table 13: Data Protection PEP Security CapabilitiesData Protection PEP Security Capabilities Capabi lity Description Use Case Specific Guidance Access Control Access c ontrol technologies allow an agency to define policies concerning the allowable activities of users and entities to data and resources. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Protections for Data at Rest Data p rotection at rest aims to secure data st

41 ored on any device or storage medium. N
ored on any device or storage medium. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Protections for Data in Transit Data protection in transit, or data in motion, aims to secure data that is actively moving from one location to another, such as across the internet or through a private enterprise network. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Data Loss Prevention DLP te chnologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and the gency should understand the protections offered by the TIC access point’s DLP program andintegrate them into the gency’s overall DLP program. Data Access and Use Telemetry Data access and use telemetry identifies agencysensitive data stored, processed, or transmitted, including those located at a service provider, and enforc detailed logging for access or changes to sensitive data. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. ��30 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20219.Conclusionraditional TIC Use Case defines how network security should be applied when an agency has personnel in a physical location (i.e.,an agency campus) that uses a TIC access point, either an agency TIC Access Provider (TICAPManaged Trusted Internet Protocol Services MTIPS), when accessing the web, trusted external partners, or partner government agencies. This document provides guidance on how an agencycan configure its raditional TICdata flows and apply relevant TIC 3.0 security capabilities. It considers four securitypatterns relevant to the traditional TIC deployment: Secure gency campus access to Public user to secure agency campus;Secure gency campus access to agencysanctioned external partners; andSecure agency campus access to partneragencies.This useshould be considered the default use case, as defined by OMB Mandused in conjunction with the Security Capabilities Catalogand other TIC 3.0 guidance documentation. ��29 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20218.Telemetry RequirementsFigure 8 shows the conceptual architecture of theTraditional TIC Use Casewith the telemetry requirements.These flowsindicate when an agencyshouldshare telemetry with CISA. In the Traditional TIC Use Case, there are two types oftelemetry that might get shared: CDM telemetry and NCPS telemetry. Most raditional TIC deployments have CDM telemetry shared with CISA by capabilities deployed on the gency ampus, and NCPS telemetry is shared with CISA from the TIC access points. Agencies may provide telemetry fordirect connections to partner agenciesby working with NCPS. Consult the NCPS programand CDM programfor further details. Agencies share telemetry information with CISA through multiple programs, as coordinated directly, to ensure visibility and situational awareness are preserved and shared protections can be maintained. Figure 8Traditional TIC Telemetry Sharing with CISA “National Cybersecurity Protection System (NCPS)”, Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/nationalcybersecurityprotectionsystemncps.“Continuous Diagnostics and Mitigation (CDM)”, Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/cdm. ��28 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Data Loss Prevention M ec hanisms should be implemented to controlthe sharing of information between UCC participants, intentional or incidental.This may be integrated into additional agency DLP technologies and can include keyword matching, attachment file type or existence prohibitions, attachment size itations, or even audio/visual filters. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Table 13: Data Protection PEP Security CapabilitiesData Protection PEP Security Capabilities Capabi lity Description Use Case Specific Guidance Access Control Access c ontrol technologies allow an agency to define policies concerning the allowable activities of users and entities to data and resources. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Protections for Data at Rest Data p rotection at rest aims to secure data stored on any device or storage medium. New capability in TIC 3.0 that can be implementedsupplement the TIC 2

42 .2 capabilities. Protections for Da
.2 capabilities. Protections for Data in Transit Data protection in transit, or data in motion, aims to secure data that is actively moving from one location to another, such as across the internet or through a private enterprise network. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Data Loss Prevention DLP te chnologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and the gency should understand the protections offered by the TIC access point’s DLP program andintegrate them into the gency’s overall DLP program. Data Access and Use Telemetry Data access and use telemetry identifies agencysensitive data stored, processed, or transmitted, including those located at a service provider, and enforc detailed logging for access or changes to sensitive data. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. ��27 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Virtual Private Network VPN solutions provide a secure communications mechanism between networks that may traverse across unprotected or public networks. TIC access point s provide VPN services with varying levels of protection applied, depending on the entity thatthe VPN tunnel is establishedwith. When VPNs, or similar technologies, are used to bridge the gency ampus network with other environments, the gency ampus network should applynetwork segmentation, pplication ateways, virtual desktop infrastructure), etc.to ensure least privilege access is maintainedand to limit the impact of compromise of the other environment. Table 12: Unified Communications and Collaboration PEP Security CapabilitiesUnified Communications and Collaboration PEP Security Capabilities Capability Description Use Case Specific Guidance Identity Verification Identity verification ensures that access to the virtual meeting is limited to appropriate individuals. Waiting room features, wherethe meeting host authorizes vetted individuals to join the meeting, can also be utilized. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilitie Encrypted Communication Communication between virtual meeting participants and any data exchanged is encrypted at rest and in transit. Some UCC offerings support endend encryption, where encryption is performed on the clients and can only be decrypted by the other authenticated participants and cannot be decrypted by the UCC vendor. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Connection Termination Connection termination m echanisms ensure the meeting host can positively control participationthroughinactivity timeouts, ondemand prompts, unique access codes for each meeting, host participant eviction, and even meeting duration limits. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. ��26 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Adaptive Access Control Adapti ve a ccess c ontrol technologies factor in additional context, like security risk, operational needs, and other heuristics, when evaluating access control decisions. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. D eception Platforms Deception p latform technologies provide decoy environments, from individual machines to entire networks, that can be used to deflect attacks away from the operational systems supporting agency missions/business functions. New capability in TIC 3.0 that ca n be implemented to supplement the TIC 2.2 capabilities. Certificate Transparency Log Monitoring Certificate t ransparency l og m onitoring allows agencies to discover when new certificates are issued for agency domains. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Table 11: Enterprise PEP Security Capabilities Enterprise PEP Security Capabilities Capability Description Use Case Specific Guidance Security Orchestratio Automation, and Response Security O rchestration, A utomation , and esponse (SOAR)tools define, prioritize, and automate the response to security incidents. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Shadow Information Technology Detection Shadow information technology ( IT ) etectionsystems detect the presence of unauthorized software and systems in use by an agency. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. ��25 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;

43 ‘ 5;b.4;ّ ;U.8;ƒ ;
‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Domain Name Verificationfor Agency Clients Domain n ame verification protections ensure that domain name lookups from agency clients, whether for internal or external domains, are validated according to Domain Name System Security Extensions (DNSSEC). Agenc ies can use DNS resolution services in TIC access points, which provideDNSSEC verification. Domain Name Validationfor Agency Domai Domain name validation protections ensure that all agency domain names are secured using DNSSEC, enabling external entities to validate their resolution to the domain names. Agencies can use DNS hosting services in the TIC access point, which support . EINSTEIN 3 Accelerated Domain Name Protections E 3 A is an intrusion prevention capabilityoffered by NCPS, provided CISA, that includes a DNS inkholingsecurity service. Agenc ies can use DNS resolution services in TIC access point, which can support the integration of NCPS A DNS rotections. Table 10: Intrusion Detection PEP Security Capabilities Intrusion Detection PEP Security Capabilities Capability Description Use Case Specific Guidance Endpoint Detection and Response Endpoint d etection and r esponse (EDR) tools combine endpoint and network event data to aid in the detection of malicious activity. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Intrusion Detection and Prevention Systems Intrusion detection s ystems detect and report malicious activity. Intrusion revention systems attempt to stop the activity. TIC access point s pass network traffic through ntrusion etection systems. When VPNs, or similar technologies, e used to bridge together the gency ampus network with other environments, the gency ampus should ensure that traffic to and from the external environment are passed through an intrusion detection and prevention system. ��24 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Micro - segmentation Microsegmentation divides the network, either physically or virtually, according to the communication needs of application and data workflows, facilitating security controls to protect the data. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Table 8: Resiliency PEP Security Capabilities Resiliency PEP Security Capabilities Capability De scription Use Case Specific Guidance D istributed Denial of Service Protections D istributed Denial of Service ( DDoS ) protections mitigate the effects of distributed denial of service attacks. TIC access point s provide DDoS protections. Elastic Expansion Elastic expansion enables agencies to dynamically expand the resources available for services as conditions require. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Regional Delivery Regional d elivery technologies enable the deployment of agency services across geographically diverse locations. New capability in TIC 3.0 that can be implementedsupplement the TIC 2.2 capabilities. Table 9omain Name ystemPEP Security Capabilitiesomain Name SystemPEP Security Capabilities Capability Description Use Case Specific Guidance D omain Name Sinkholing D omain name s inkholing protections are a form of enylistingthat protects clients from accessing malicious domains by responding to DNS queries for those domains. Agencies can use DNS resolution services in TIC access point, which provide DNS inkholing. ��21 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Table 6: Web PEP Security CapabilitiesWeb PEP Security Capabilities Capability Description Use Case Specific Guidance Break and Inspect Break and Inspect systems , or encryption proxies,terminate encrypted traffic, log or perform policy enforcement against the plaintext, and pplicable, before transmitting to the final destination. New capability in TIC 3.0 that can be mplemented to supplement the TIC 2.2 capabilities. BreakandInspect solutions should be considered in the context of the sensitivity of data being scanned, the trust level designation of the source and destination, other security capabilities that offer comparable visibility, and the rotocols and services in use. Active Content Mitigation Active c ontent m itigation protections detect the presence of unapproved active content and facilitate its removal. TIC access p

44 oint s can detect and remove maliciou
oint s can detect and remove malicious content in traffic. Certifica te enylisting Certificate d enylist ing protections prevent communication with entities that use a set of known bad certificates. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Conte nt Filtering Content f iltering protections detect the presence of unapproved content and facilitate its removalor denial of access. TIC access point s can detect and remove malicious content in traffic. Authenticated Proxy Authenticated p roxies requir e entities to authenticate with the proxy before making use of it, enabling user, group, and locationaware security controls. New capability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilities. Data Loss Prevention DLP technologies detect instances of e exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs, and ageiesshould understand the protections offered by the TIC access point’s DLP program andintegrate them into their overall DLP program. TIC 2.2 includes a variety of protections for unencrypted web traffic, which may be supplemented depending on the use of encrypted web traffic used by an agency ��15 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Incident Response Planningand Incident Handling I ncident response planning and incident handling is the ocumentationand implementation ofa set of instructions, procedures, or technical capabilities to sense and detect, respond to, limit consequences of malicious cyberattacks, and restore the integrity of the network and associated systems. TIC access points imple ment incident response plans covering incidents discovered or occurring in the TIC access point. Agencies should work with the TICAP to ensure that the SOC and NOC working ontheirbehalf coordinates any incident response activities with the TIC access point. Inventory I nventory entails d eveloping, documenting, and maintaining a current inventory of all systems, networks, and components so that only authorized devices are given access, and unauthorized and unmanaged devices are found and restrictedfrom gaining access. TIC access points ma intain inventories of their systems, services, and entities Agencies should maintain an inventory of their connections to TIC access points as well as any external partners partner agencies, and any agency services deployed to the TIC access point. Leas t Privilege Least privilege is a design principle wherebyeach entity is granted the minimum system resources and authorizations that the entity needs to perform its function. TIC access points are configured according to least privilege. Agencies should apply least privilege to any services deployto the TIC access point andusers permitted access to TIC access point systemsand services. Secure Administration Secure administration entails performing administrative tasks in a secure manner, using secure protocols. TIC access points are configured to use secure administration. Agencies should use secure administration practices when administering any systems or services they have administrative privilege for TIC access points Strong Authentication Strong authentication v erif ies the identity of users, devices, or other entities through rigorous means (e.g., multifactor authentication)before granting access. TIC access points are configured to use strong authentication for internal systems. Agencies should use strong authentication when accessing any systems or services in TIC access points, including any agency services deployed to the TIC access point. ��14 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021The sections below explain how existing TIC 2.2 security capabilities at a TIC access pointcan be used part of agency implementations of TIC 3.0 security capabilities. 7.1Universal Security CapabilitiesTheSecurity Capabilities Catalogcontains a table of niversaecurity apabilitiesthat apply across TIC use cases. Agenciescan determine the level of rigor that is applied to these security apabilities such that in line with theagencyrisk tolerances and federal guidelines. Unique application guidance for the universal security capabilitiesin the Traditional TIC Use Case outlined in Table Agencies may determine the level of rigor that is applied to these security capabilities based on their agency risk tolerance and federal guidelines. Table 3: Universal Security CapabilitiesUniversal Security Capabilities Capability Description Use Case Specific Guidance Backup and Recovery Backup and recovery entails k eeping copies of configuration and data, as needed, to allow for the quick restoration of service in the event of malicious incidents, system failures

45 , or corruption. TIC access points hand
, or corruption. TIC access points handle backup and recovery of configuration and data for their systems and services. If agencies deploy services to the TIC access point or provide configurationor data to a TIC access pointagenciesshould include those services, configurations, or data in theirbackup and recovery routines. Central Log Management with Analysis Central log management with analysis is the collection, storage, and analysis f telemetry, where the collection and storage are designed to facilitate data fusion and where the security analysis aids in discovery and response to malicious activity. TIC access points centralize and analyze their internally collected logs. If possible, agencies should integrate elemetry available from TIC access points totheircentral log management and analysis environment. Configuration Management Configuration management is the mplementation ofa formal plan for documenting and managingchanges to the environment, and monitoring for deviations, preferably automated. TIC access points implement a formal plan for configuration management for their systems and services. If agencies deploy services to the TIC access point or provide configuration or data to a TIC access point, agenciesshould handle changes to these services, configuration, or data through their formal configuration management plan. ��19 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Detonation Chamber Detonation c hambers facilitate the detection of malicious code using protected and isolated execution environments to analyze the files. New cap ability in TIC 3.0 that can be implemented to supplement the TIC 2.2 capabilitie Data Loss Prevention Data l oss p revention (DLP) technologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access point s employ DLP programs. Agenciesshould understand the protections offered by the TIC access point’s DLP program and integrate them into theiroverall DLP program. Table 5: Email PEP Security CapabilitiesEmail PEP Security Capabilities Cap ability Description Use Case Specific Guidance Anti - phishing Protections Anti - phishing protections detect instances of phishing and prevent users from accessing them. Agencies can use e mail services in TIC access point, which provide anti phishing protections. Anti - spam Protections Anti - spam protections detect and quarantine instances of spam. Agencies can use e mail services in TIC access point, which provide spam detection and quarantine services. Authenticated Received Chain Authenticated r eceived c hain allows for an intermediary, like a mailing list or forwarding service, to sign its own authentication of the original email, allowing downstream entities to accept the intermediary’s authentication even if the email was changed. New capability in TIC 3.0 that can be implemented to supplementthe TIC 2.2 capabilities. Data Loss Prevention DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data. TIC access points employ DLP programs. Agenciesshould understand the protections offered by the TIC access point’sDLP program and integrate them into theiroverall DLP program. ��16 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Capability Description Use Case Specific Guidance Time Synchronization Time synchronization is the coordination of system e.g., servers, workstations, network devices)clocks to minimize the difference between system clock times and enable accurate comparison of timestamps between systems. TIC access points maintain time synchronization across their ystems. If possible, agenciesshould synchronize their systems, including agency services deployed to the TIC access point,to integrate the telemetry from TIC access points. Vulnerability Management Vulnerability management is the practice of proactively workingto discover vulnerabilities including the use of both active and passive means of discovery and takingaction to mitigate discovered vulnerabilities. TIC access point s conduct regular active and passive security reviews to discover and mitigate risks in the TIC ss pointEach agency’s and SOCshould include TIC access points in the security reviews of the agency. Patch Management Patch management is the i dentif ication , acquisition, installation, and verification patches for products and systems. TIC access points handle patch management for systems and services that support it (e.g., firewalls, SIEMs, etc.). Agencies may need to handle patch management for agency services deployed to the TIC access point. Auditi ng and Accounting Audi ting and accounting includes apturing business records(e.g., logs and other telemetry), making them available for auditing and accounting as required

46 , and designing an auditing system that
, and designing an auditing system that considers insider threat (e.g., separation of duties violation acking) such that insider abuse or misuse can be detected. TIC access points maintain audit and record access. To facilitateagency auditing and accounting, agencies should integrate the records from TIC access pointsinto their own record keeping system. Resilience Resilience entails e nsuring that systems, services, and protections maintain acceptable performance under adverse conditions. TIC access point s have resilience features including uninterrupted power, diverse routes, and in the case of some TIC access points, geographic diversity. Agencies should understand the resilience provided by their TIC access point, and, if possible, have multiple routes to their TIC access point. ��13 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 The first option (left) has traffic flowing between the a gency c ampus and the artner gency through a TIC ccess oint. Entities within the gency ampus either establish a protected connection to the artner gency or make use of an existing protected connection established with the artner gencyAgency and partner agency resources can then be access through this protected channel. Theat the agency campus and the TIC access pointensure that data flows to and from artner genciesare properly protected and only authorized services and information are being exchanged. The second option (left) consists of a direct connection from the a gency ampus to the artner agency. Entities within the agency campus either establish a protected connection to the artner gency or use an existing protected connection established with the artner gency. Agency and partner agency resources can then be access through this protected channel.These protected channels may go through a private connection between the agency and the partner agency, or through shared infrastructure like the nternet. Theat the agency campus ensures proper traffic forwarding, such that only authorized traffic is forwarded to the artner gency. This PEP alsoensures thatconnections for flows are properly protected and only authorized services and information is exchanged with the artner gency. his option permits a direct network connection to the artner genche artner gency employs appropriate TIC ases for all its external network connectionsensuring appropriate proections and information sharing with NCPS. However, agencies may supplement these protections to better reflect their risk tolerances. The agency or partner agency may provide telemetry from this option to NCPS. Applicable Security CapabilitiesThe TraditionalTIC Use Case draws on security capabilities from both thenew and legacy TIC guidance.The list ofsecurity apabilities in the legacyTIC Reference Architecturev2.2outlines the requirements to secure, manageand operate a TIC access oint.TheSecurity Capabilities Catalogcontains a broader set of security capabilities that agencies can use to accomplish TIC objectives across TIC ases.While the TIC 2.2 security capabilities can provide protection for most, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0securitycapabilities to reflect their agency requirements, risk tolerances, and other factors. Unlike the TIC 2.2 security capabilities, TIC 3.0 security capabilitiesare not prescriptive, but rather are descriptive, allowing for flexibility in implementation.Appendix B provides mappings between the TIC 2.2 and TIC 3.0 security capabilities, for reference. ��12 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.4Security Pattern Agency Campusto Partner AgencyFigure 7illustrates connections where an agencyconnects or providservices toartner agency(e.g., ntergency traffic. This communicationcan take place through two options, described below.Regardless of the option chosen, due diligence must be practiced to ensure agencies are protecting their information in line with their risk tolerances.ne option permits a direct network connection to the artner gency. The partner agency employs appropriate TIC or all its external network connectionsensuring a baseline of protections along withinformation sharing with NCPS. However, agencies may supplement these protections to better reflect their risk tolerances. Figure 7: Security Pattern 4: Agency Campus to Partner Agency Implementation Consideration Agencies may connect directly with partner agencies so long as NCPS visibility exists at both ends. ��11 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Tra

47 ditional TIC Use CaseApril20216.3Securit
ditional TIC Use CaseApril20216.3Security Pattern : Agency Campus to External PartnerFigure 6illustrates the scenariowhere an agency the services of or provides services to an xternal artner. Entities within the gency ampus either tablish a new protected connection or usean existing protected connection with the external partner access resources from thatpartner. In this ecurity attern, the PEPat the agency campusensures that data flows to and from xternal artners are properly protected and only authorized services and information are being exchanged. Theat the agency campusapplies any applicable security polices and ensures the appropriatetraffic is forwarded to the TIC ccess oint. The TIC ccess oint applies all applicable security polices before transiting traffic to or from the xternal artner. Figure 6: Security Pattern 3: Agency to External Partner Implementation Consideration Agencies must ensure that (1) appropriate protections are in place when connecting with an external partnerand (2) only authorized services are being used and authorized information is being exchanged. ��10 &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril20216.2Security Pattern 2: Public User to Agency CampusFigure 5illustrates connections where a publicuseraccessesservicesprovided by the agencycommonly in the form of services. Connections in this security pattern are among the riskiest since a possibly untrusted public user connecting toe agency andits services; therefore, the greatest amount of rigor shouldbe applied to the security capabilities. Since users are accessingservicesthatmay contain agency dataagencies must practice due diligence in protecting their information in linewith their risk tolerances.In this ecurity attern, the PEPat the agency campusapplies any applicable security policand ensures the relevant service traffic is forwarded to the TIC ccess oint. This PEP alsoensures that data flows to and from public sers are properly protected and only authorized services and information are exchanged with eligible users. The TIC ccess oint applies all applicable security policiesbefore transiting traffic to and from the ublic ser.If an agency service is deployed to the TIC access point, the may be a shared responsibility deployment model, with hardware owned and managed by the TICAP and services deployed by the agency. In this scenario, the TIC access point ensures that only appropriate traffic is sentto the agency services, and the agency ensures that only authorized users can access and exchange authorized information with the agency services. Figure 5: Security Pattern 2: Public User to Agency Implementation Consideration Agencies should apply the greatest rigor to security capabilities where public users accessagency servicesnformationmust beprotected in line with their risk tolerances. ��9 ��TIC 3.0 Traditional TIC Use CaseApril2021Security PatternsFoursecurity patternscapture the data flows for the Traditional TIC Use Case. Eachs distinct sources, stinations, and options for policy enforcement.Regardless of the options chosen, due diligence must be practiced, ensuring agencies are protecting their information in line with their risk toleranceshen additional security capabilitiesare necessary to manage residual risk, agencies shouldapply the controls or explore options for compensating capabilitiesthat achieve the same protections to manage risks. The security patterns includethe followitrust zone destinations: WebPublic External artner, andPartner gency6.1Security Pattern 1: Agency Campus to Webigure 4illustrates connections where agency entities connect to the open nternetor webfor services.Connections in this security pattern are among the riskiestbecause the web isan untrusted entitytherefore, the greatest amount of rigor should be applied tothe securitycapabilities. In this ecurity attern, the PEPthe agency campusapplies any applicable security policiand ensures the appropriate traffic is forwarded to the TIC ccess oint. Then, the TIC ccess oint applies all applicable security policfore transiting traffic to or from the eb. Figure 4: Security Pattern 1: Agency Campus to Web Implementation Consideration Agencies should apply the greatest rigor to security capabilities for the connections between the agency campus and the web. ��8 ��TIC 3.0 Traditional TIC Use CaseApril2021 Trust Zone Description Web Trust Zone The Web T rust Z one is a logical zone that depicts an environment containing untrusted external servicesthat agency users may access, with no PEPs or MGMTs where the agency, or entities acting on its behalf, may deploy policies. Given these limitations, the eb rust one labeledwith lowtrust levelin this use. Public User Trust Zone The Public User T rust Z one is a logical zone that depicts a n untrusted and unmanaged user of gency services with no PEPs or MGMTs where the agency, or entitiesacting on its behalf, may deploy policies. Given these limitations, the ublic ser rust one labeledwith low trust level in this usecase. External Partner Trust Zone The External Partner T rust Z one is a logical trust zone for an external partner that offers services to or receivservices from the agency.The agency has limited control over and visibil

48 ity into theexternal partner environment
ity into theexternal partner environment. The agency can provide certain defined capabilities for external partner to manage, and the external partner is responsible for protecting the underlying infrastructure.The trust zone may include a MGMTwithfunctions locally scoped for the environment. The between the external partnerand the agency campusmay usea sharedresponsibility deployment model, with hardware owned and managed by the TICAP and services deployed by the agency. ven the more limited control and visibility available to the gency, the xternal artner rust one labeledwith medium trust levelin this use. Partner Agency Trust Zone The Partner Agency T rust Z one is a logical trust zone for a government ag ency that partnerswith the agencysupport of mission objectives and business operations. The agency has limited control and visibility into the partner agency, assuming the partner agency employs one or more TIC cases for its connectivityandensuresappropriate protections and telemetry for NCPSBoth he agency and the partner agency maintain covering traffic between these trust zones. While the agency has similar limits in terms of control and visibility as the external partner, the Partner Agency rust one labeled with igh trust levelin this usecase due to its similar security protections and NCPS telemetry. Branch Office Trust Zone The Branch Office T rust Z one is a logical trust zone showing a common TIC 2.2 usecase where a branch office routes its traffic through the agency’s TIC access ointGiven the control and visibility maintained by the gency, the ranch ffice rust one is labeled with high trust levelin this use Remote User Trust Zone The Remote User T rust Z one is a logical trust zone showing a common TIC 2.2 usecase where a remote user connects to the gency campus via a VPN, or similar, and routes its traffic through the agency’s TIC access ointwith a logical separation maintained between the remote user’s system and thgency campus networkGiven the control and visibility maintained by the gency, the Remote User rust one is labeled with high trust levelin this use. ��6 ��TIC 3.0 Traditional TIC Use CaseApril2021The traditional TIC model was commonly represented as comprising an “Internal Zone” containing agency components and the TIC access point as its boundary, and an “External Zone” containing the arious entities the agency would communicate with. This model is conceptualized in TIC3.0 by nesting trust zones within a larger, primary trust zone, which is depicted as the Agency Trust Zone Figure 3. In this scenario, the nestedtrust zones include the agency campus, the TIC access point, thebranch office, and the remote userThese trust zones can be nested within the Agency Trust Zone because they share a boundary that is secured by the same PEP(i.e., the TIC access point). Figure 3Traditional TIC Conceptual ArchitectureThe branch office and remote user trust zones are included in this use case because they are commonldeployed when implementing TIC 2.2. In the TIC 2.2 model, ose zones send traffic to external entities through agency TIC access points. It is important to note that the architecture depicted in Figure 3 can be tailored depending on anagency’s uniquerequirements. For example, while this nested representation includes the TIC access point, some traditional TIC deployments may consider the TIC access point as being outside the Agency Trust Zone “TIC Reference Architecture v2.2,” Department of Homeland Security (2017). ttps://www.cisa.gov/sites/default/files/publications/TIC_Ref_Arch_v2.2_2017.pdf. ��5 ��TIC 3.0 Traditional TIC Use CaseApril2021The agency has limited control over and visibility into external partners.xternal partners have NOCs and SOCs that control and protect the portions of theinfrastructure where the agencyhas little to no control or visibility.he agency only uses secure mechanisms (e.gtransport layer security (TLS) or VPN) tocommunicate with external partners.The agency only uses strong authentication mechanisms (e.g., Federal Information ProcessingStandard (FIPS) 140-2complaint multictor authentication(MFA)) with external partners.Data provided to external partnersis protected at a level commensurate with the agency’s risktoleranceandin accordance with federal guidelines.The following are assumptions about partner agenies. Thepartner agency employs appropriate TIC ases for all its external network connections,ensuringappropriate protectionsand information sharing with NCPSInteractions with partner agencies follow agencydefined policies and procedures for businessed justification, partner connection eligibility, service levels, data protections, incident responseinformation sharing and reporting, costs, data ownership, and contracting.The agency uses only limited and welldefined services of partner agencies or permits partneragencies access to only limited and welldefined services of the agency.The agency has limited control over and visibility into partner agenciesPartner agencies have NOCs and SOCs that control and protect the portions of their infrastructurewhere the agency has little to no control or visibility.The agency only uses using secure mechanisms (e.g., TLSor VPN) to communicate with partneragencies.The agency only uses strong authentication mechanisms (e.g., FIPS 2 complaint MFA) withpartner agencies.Data provided to partner agenciesis protected at a level commensurate with the agency’s risktolerance and in accordance with federal guidelines.The following are assumptions about the . The contains untrusted enti

49 tiesThe agencycannotapply policy in the
tiesThe agencycannotapply policy in the The following are assumptions about thepublic user. Thepublic user is accessing agency services from the nternetThe public user is unmanaged and untrusted by the agency.Conceptual ArchitectureThe Traditional TIC Use Case focuses on the scenario in which agency network traffic traverses a TIC ccess ointwhen moving to and from external zonesAs shown inFigure this use caseis composed primarily of sixtrust zonesagency campus, TIC access point, web, public user, external partner, and partner agencyTIC access point. These trust zones are detailed in Table 2To simplify the visualization and descriptions, the case shows single trust zones to represent classes of external entities or environments. However, this simplification is not meant to imply that an agency must treat all entities and environments of the same class (e.gxternal partners) in the same manner. Federal Information Processing Standard 1402,” National Institute of Standards and Technology (2019). https://csrc.nist.gov/publications/detail/fips/140/2/final. ��4 ��TIC 3.0 Traditional TIC Use CaseApril2021Assumptions and ConstrainThis section outlines guiding assumptions and constraints for the Traditional TIC Use Case. It isintended to clarify significant details about the construction and replication of this use case. The assumptions are broken down by the use case as a whole and by the unique entitiesdiscussed in the use case: Agency campus,TIC access point,External partners,Partner agencies,Web, aublic users.The following are the assumptions and constraints of this use case. Requirements for information sharing with CISA in support of National Cyber Protection System(NCPS) and Continuous Diagnostics and Mitigation(CDM) purposes are beyond the scope ofthis document.Consult the NCPS rogramand CDM programfor further details.The TIC 3.0 security capabilities applicable to the use case are not dependent on a data transfermechanism. In other words, the same security capabilities apply if the conveyance is over leasedlines, software virtual private network (VPN), hardware VPN, etc.The following are assumptions about the agency campus. The agency campus accesses the eb or trusted external partners through a TIC ccess oint.The agency maintains control over and has significant visibility into the agency campusData is protected at a level commensurate with the agency’s risk toleranceandin accordance withfederal guidelines.The agency employs network operation center (NOC) and security operation center (SOC) toolapable of maintaining and protecting the portions of the overall infrastructure. To accomplishthis, agencies can opt to use a NOC and SOC, or commensurate solutions.The following are assumptions about the TIC access oint. The TIC ccess oint is TIC 2.2 compliantThe TIC ccess oint is managed as a Single Service TICAP by the agency,or as a MultiServiICAP by the agencyanother agency, or an MTIPS providerThe agency employs traditional methods for accessing the TIC ccess oint, though supplementalprotections may be provided using alternative methods.The following are assumptions about external partners (e.ga CSP, a network, an extranet). he gency ensures that interactions with external partners follow agencydefined policies andprocedures for business need justification, partner connection eligibility, service levels, datotections, incident response information sharing and reporting, costs, dataownership, aontracting.The agencyuses only limited and welldefined services of external partners or permits externalpartners access to only limited and welldefined services of the agency “National Cybersecurity Protection System,” Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/nationalcybersecurityprotectionsystemncps.“Continuous Diagnostics and Mitigation,” Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/cdm. ��3 ��TIC 3.0 Traditional TIC Use CaseApril2021Each trust zone in a use case will be labeled with a high, medium, or low trust level, based on apilot implementation or best practice. The use cases aredepicted following the schema illustratein Figure 2. Agencies can modify this trust zone designation to meet their needs.Refer to theReference Architecturefor more details on trust zones. ure Use Case Trust Zone LegendWhen securing trust zones, agencies should consider unique data sensitivity criteria and theimpact of compromise to agency data stored in trust zones. Agencies may apply additionalsecurity capabilities that have not beincluded in the use case.Agencies have the discretion to determine the level of rigor necessary for applying securitycapabilities in use cases, based on federal guidelines and their risk tolerance. Refer to he Handbookforrenformation on TICases.The TIC 3.0 Traditional TIC Use Case (Traditional TIC Use Case) defines how network security can be applied when an agency routes traffic from an agency campus to the web, trusted external partners, or overnment agencies through a traditional TIC access point, either an agency TIC Access TICAP) or Managed Trusted Internet Protocol Services (MTIPS) provider.ternal anctionedcloud service provider, or includes network security patternsSecure gencycampus access to Public user to secure agency campus;Secure gencycampus access to agencysanctioned external partners; andSecure gency campus access to partner agenciesAn gencymay implement a subset of these traffic flows rather thanall. For instance, an agencymay not have trusted external partners. The Traditional TIC Use Case is the “default use case.” This use case demonstrates how TIC 2.2 sec

50 urity capabilities at a TIC access point
urity capabilities at a TIC access point can be used to implement TIC 3.0 to meet an agency’s specific requirements, risk tolerances, and other factors. OMB M-26 defines the Traditional TIC Use Case as the “default use case” which leverages agency TICAP and MTIPS providers.The Traditional TIC Use Case is intended to provide additional guidance to agencies and providers for how existing TIC 2.2 security capabilities at a TIC ccess oint can be used to implement TIC 3.0 capabilities.While the TIC 2.2 security capabilities are consistent with the TIC 3.0 objectives, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0 security capabilities to reflect their agency requirements, risk tolerances, and other factors. ��2 ��TIC 3.0 Traditional TIC Use CaseApril2021Telemetry: Artifacts derived from security capabilities that provide visibility into security posture.TIC: The term “TIC” is used throughout the Federal Government to denote different aspects of the TICinitiative; including the overall TIC progr, a physical TIC access point (also known as a Traditional TIC), and a TIC Access Provider (TICAP – see below). This document refers to TIC as an adjective or as the Trusted Internet Connections initiative.TIC Access Point: The physical location where afederal civilian agency consolidates its externaconnections and has security controls in place to secure and monitor the connections.TIC Access Provider (TICAP): An agency or vendor that manages and hosts one or more TIC access points. Single Service TICAPs serve as a TIC Access Provider only to their own agency. MultiService TICAPs also provide TIC services to other agencies through a shared services model. TIC Overlay:A mapping of products and services to TIC ecurity apabilities.TIC Use Case:Guidanceon the secure implementation and/or configuration of specific platforms, services, and environments. A TIC use case contains a conceptual architecture, one or more security pattern options, security capability implementation guidance, and CISA telemetry guidance for a common agency computing scenario. Trust Zone:A discrete computing environment designated for information processing, storage, and/or transmission that sharethe rigor or robustness of the applicable securitycapabilitiesnecessary to protect the traffic transiting in and out of a zone and/or the information within the zone.Web:An environment used for web browsing purposes. Also see Internet. Overviewof TIC Use CaseTIC use casesprovide guidance on the secure implementation and configuration of specific platforms, services, and environments, and will be released on an individual basis. The guidance is derived from pilot programs and best practices from the public and private sectors. The purpose of each TIC use case is to identify the applicable security architectures, data flows, and policy enforcement points (PPs)and to describe the implementation of the security capabilities in a given scenario. TIC use cases articulate:Network scenarios for TIC implementation,Security patterns commonly used within the federal civilian enterprise, andTechnologyagnostic methods for securing current and emerging network models.TIC use cases build upon the key concepts and conceptual implementation of TIC 3.0 presented in the TIC 3.0 Reference Architecture(Reference Architecture) and provides implementation guidance for applicable security capabilities defined in the TIC 3.0 Security Capabilities Catalog(Security Capabilities Catalog). The TIC 3.0 Use Case Handbook(Use Case Handbook) provides general guidance for how agencies canuse and combine use cases.Agencies have flexibility in implementing TIC use cases. In particular:An agency may combine one or more use cases to best design and implementtheir TchitecturesUse cases may provide more than one option for implementing a security pattern in order to giveagencies flexibility. ��1 ��TIC 3.0 Traditional TIC Use CaseApril20211.IntroductionTrusted InternetConnections (TIC), originally established in 2007, is a federal cybersecurity initiative intended to enhance networkand perimetersecurity across the Federal GovernmentThe Office of Management and Budget (OMB), the Department of Homeland Security (DHS)Cybersecurity and Infrastructure Security Agency (CISA), and the General Services Administration (GSA) oversee the TIC initiativethrough a robust program that sets guidance and an execution framework for agencies to implement a baseline perimeter security standard.The initial versions of the TIC initiative sought to consolidate federal networks and standardize perimetersecurity for the federal enterpriseAs outlined in OMB Memorandum (M) 26:Update to the Trusted InternetConnections (TIC) Initiative, this modernized version of the initiative expands upon the original to drive security standards and leverage advances in technology as agencies adopt mobile and cloud environmentsThe goal of TIC 3.0 is to secure federaldata, networks, and boundaries while providing visibility into agency traffic, including cloud communications.1.1Key Termsavoid confusion, terms frequently used throughout the TIC 3.0 documentation are defined below. Some of these terms are explained ingreater detail throughout the TIC 3.0 guidance. A comprehensive glossary and acronyms list with applicable attributions can be found in Appendix A.Boundary:A notional concept that describes the perimeter of a zone (e.gmobile device services, general support system (GSS), Software-a-Service (SaaS), agency, etc.) within a network architecture. The bounded area must have an information technology (IT) utility.Internet:The internet

51 is discussed in two capacities througho
is discussed in two capacities throughout TIC documentation. means of data and IT traffic transportAn environment used for web browsing purposes, hereafter referred to as “Web.”Managed Trusted Internet Protocol Services (MTIPS):Services undeGSA’s Enterprise Infrastructure Solutions (EIS) contract vehicle thatprovideTIC solutions to government clients as a managed security service. It is of note that the EIS contract is replacing the GSA Networx contract vehicle that is set to expire inscal Year (FY) 2023.Management Entity (MGMT): A notional concept of anentity that oversees and controls security capabilities. The entity can be an organization, network device, tool, service,or application. The entity can control the collection, processing, analysis, and display of information collected from the policy forcement points (PEPs), and allows IT professionals to control devices on the network.Policy Enforcement Point (PEP):A security device, tool, function, or application that enforces security policies through technical capabilities.Security CapabilityA combination of mutuallyreinforcing security controls (i.e., safeguards and countermeasures) implemented by technical means (i.e., functionality in hardware, software, and firmware), physical means (i.e., physical devices and protective measures), and procedural means (i.e., procedures performed by individuals).Security capabilities help to define protections for information being processed, stored, or transmitted by information systems. “Update to the Trusted Internet Connections (TIC) Initiative,” Office of Management and Budget M-26 (2019). https://www.whitehouse.gov/wpcontent/uploads/2019/09/M26.pdf. "Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 80053 R)," September. http://dx.doi.org/10.6028/NIST.SP.8005. ��v ��TIC 3.0 Traditional TIC Use CaseApril2021List of TablesTable 1: Revision HistoryTable 2: Trust Zones in the Traditional TIC Use Case 7Table 3: Universal Security CapabilitiesTable 4: Files PEP Security CapabilitiesTable 5: Email PEP Security CapabilitiesTable 6: Web PEP Security CapabilitiesTable 7: Network PEP SecurityCapabilitiesTable 8: Resiliency PEP Security CapabilitiesTable 9: Domain Name System PEP Security CapabilitiesTable 10: Intrusion Detection PEP Security CapabilitiesTable 11: Enterprise PEP Security CapabilitiesTable 12: Unified Communications and Collaboration PEP Security CapabilitiesTable 13: Data Protection PEP Security CapabilitiesTable 14: TIC 2.2 Capabilities to TIC 3.0 CapabilitiesTable 15: Universal TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 16: Files PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 17: Email PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 18: Web PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 19: Networking PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 20: Resiliency PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities Table 21: DNS PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 22: Intrusion Detection PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 23: Enterprise PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiTable 24: Unified Communications and Collaboration PEP TIC 3.0 Capabilities to TIC 2.2 CapabilitiesTable 25: Data Protection PEP TIC 3.0 Capabilities to TIC 2.2 Capabilities ��iv &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021TIC 3.0 Traditional TIC Use Caseable of Contents1.Introduction 11.1Key Terms 1Overview of TIC Use Cases 2Purpose of the Traditional TIC Use Case 3Assumptions and Constraints 4Conceptual Architecture 5Security Patterns 96.1Security Pattern 1: Agency Campus to Web 96.2Security Pattern 2: Public User to Agency Campus6.3Security Pattern 3: Agency Campus to External Partner6.4Security Pattern 4: Agency Campus to Partner AgencyApplicable Security Capabilities7.1niversal Security Capabilities7.2Policy Enforcement Point Security CapabilitiesTelemetry Requirements9.ConclusionAppendix A – Glossary and DefinitionsAppendix B – Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesAppendix B.1 – TIC 2.2 Capabilities to TIC 3.0 CapabilitiesAppendix B.2 – TIC 3.0 Capabilities to TIC 2.2 CapabilitiesList of FiguresFigure 1: TIC 3.0 Guidance SnapshotFigure 2: Use Case Trust Zone Legend 3Figure 3: Traditional TIC Conceptual Architecture 6gure 4: Security Pattern 1: Agency Campus to Web 9Figure 5: Security Pattern 2: Public User to AgencyFigure 6: Security Pattern 3: Agency to External PartnerFigure 7: Security Pattern 4: Agency Campus to Partner AgencyFigure 8: Traditional TIC Telemetry Sharing with CISA ��iii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Reader’s GuideThe TrustedInternet Connections (TIC) initiative is defined through key documents that describe the directive, the program, the capabilities, the implementation guidance, and capability mappings. Each document has an es

52 sential role in describing TIC and its i
sential role in describing TIC and its implementation. The documents provide an understanding of how changes have led to the latest version of TIC and why those changes have occurred. The documents go into highlevel technical detail to describe the exact changes inarchitecture for TIC 3.0. The documents are additive; each builds on the other like chapters in a book. As depicted in Figure 1, the documents should be referenced in order and to completion to gain a full understanding of the modernized initiative. Figure 1TIC 3.0 Guidance Snapshot ��iii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Reader’s GuideThe TrustedInternet Connections (TIC) initiative is defined through key documents that describe the directive, the program, the capabilities, the implementation guidance, and capability mappings. Each document has an essential role in describing TIC and its implementation. The documents provide an understanding of how changes have led to the latest version of TIC and why those changes have occurred. The documents go into highlevel technical detail to describe the exact changes inarchitecture for TIC 3.0. The documents are additive; each builds on the other like chapters in a book. As depicted in Figure 1, the documents should be referenced in order and to completion to gain a full understanding of the modernized initiative. Figure 1TIC 3.0 Guidance Snapshot ��3 ��TIC 3.0 Traditional TIC Use CaseApril2021ach trust zone in a use case will be labeled with a high, medium, or low trust level, based on apilot implementation or best practice. The use cases aredepicted following the schema illustratein Figure 2. Agencies can modify this trust zone designation to meet their needs.Refer to theReference Architecturefor more details on trust zones. ure Use Case Trust Zone LegendWhen securing trust zones, agencies should consider unique data sensitivity criteria and theimpact of compromise to agency data stored in trust zones. Agencies may apply additionalsecurity capabilities that have not beincluded in the use case.Agencies have the discretion to determine the level of rigor necessary for applying securitycapabilities in use cases, based on federal guidelines and their risk tolerance. Refer to he ndbookforrenformation on TICases.The TIC 3.0 Traditional TIC Use Case (Traditional TIC Use Case) defines how network security can be applied when an agency routes traffic from an agency campus to the web, trusted external partners, or partner government agencies through a traditional TIC access point, either an agency TIC Access Provider (TICAP) or Managed Trusted Internet Protocol Services (MTIPS) provider.ternal anctionedcloud service provider, or includes network security patternsSecurgencycampus access to Public user to secure agency campus;Secure gencycampus access to agencysanctioned external partners; andSecure gency campus access to partner agenciesAn gencymay implement a subset of these traffic flows rather thanall. For instance, an agencymay not have trusted external partners. The Traditional TIC Use Case is the “default use case.” This use case demonstrates how TIC 2.2 security capabilities at a TIC access point can be used to implement TIC 3.0 to meet an agency’s specific requirements, risk tolerances, and other factors. OMB M-26 defines the Traditional TIC Use Case as the “default use case” which leverages agency TICAP and MTIPS providers.The Traditional TIC Use Case is intended to provide additional guidance to agencies and providers for how existing TIC 2.2 security capabilities at a TIC ccess oint can be used to implement TIC 3.0 capabilities.While the TIC 2.2 security capabilities are consistent with the TIC 3.0 objectives, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0 security capabilities to reflect their agency requirements, risk tolerances, and other factors. ��ii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021Revision HistoryThe version number will be updated as the document is modified. This documentwill be updated as needed to reflect modern security practices and technologies.Table 1: Revision History Versi on Date Revision Description Section/Pages Affected Draft December 2019 Initial Release All 1.0 April 2021 Response t o RFC and S takeholder Feedback A ll This use case references rusted nternet onnections3.0 Security Capabilities Catalog v, dated AprilThe applicable security capabilities will be further explained in the document. ��iii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&

53 #xinat;&#xion ;TIC 3.0 Traditional TIC U
#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Reader’s GuideThe TrustedInternet Connections (TIC) initiative is defined through key documents that describe the directive, the program, the capabilities, the implementation guidance, and capability mappings. Each document has an essential role in describing TIC and its implementation. The documents provide an understanding of how changes have led to the latest version of TIC and why those changes have occurred. The documents go into highlevel technical detail to describe the exact changes inarchitecture for TIC 3.0. The documents are additive; each builds on the other like chapters in a book. As depicted in Figure 1, the documents should be referenced in order and to completion to gain a full understanding of the modernized initiative. Figure 1TIC 3.0 Guidance Snapshot ��iv &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 TIC 3.0 Traditional TIC Use Caseable of Contents1.Introduction 11.1Key Terms 1Overview of TIC Use Cases 2Purpose of the Traditional TIC Use Case 3Assumptions and Constraints 4Conceptual Architecture 5Security Patterns 96.1Security Pattern 1: Agency Campus to Web 96.2Security Pattern 2: Public User to Agency Campus6.3Security Pattern 3: Agency Campus to External Partner6.4Security Pattern 4: Agency Campus to Partner AgencyApplicable Security Capabilities7.1niversal Security Capabilities7.2Policy Enforcement Point Security CapabilitiesTelemetry Requirements9.ConclusionAppendix A – Glossary and DefinitionsAppendix B – Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesAppendix B.1 – TIC 2.2 Capabilities to TIC 3.0 CapabilitiesAppendix B.2 – TIC 3.0 Capabilities to TIC 2.2 CapabilitiesList of FiguresFigure 1: TIC 3.0 Guidance SnapshotFigure 2: Use Case Trust Zone Legend 3Figure 3: Traditional TIC Conceptual Architecture 6Fie 4: Security Pattern 1: Agency Campus to Web 9Figure 5: Security Pattern 2: Public User to AgencyFigure 6: Security Pattern 3: Agency to External PartnerFigure 7: Security Pattern 4: Agency Campus to Partner AgencyFigure 8: Traditional TIC Telemetry Sharing with CISA Trusted Internet Connections 3.0 Traditional TIC Use CaseApril 2021 Version 1.0Cybersecurity and Infrastructure Security AgencyCybersecurity Division ��3 ��TIC 3.0 Traditional TIC Use CaseApril2021Each trust zone in a use case will be labeled with a high, medium, or low trust level, based on apilot implementation or best practice. The use cases aredepicted following the schema illustratein Figure 2. Agencies can modify this trust zone designation to meet their needs.Refer to theReference Architecturefor more details on trust zones. ure Use Case Trust Zone LegendWhen securing trust zones, agencies should consider unique data sensitivity criteria and theimpact of compromise to agency data stored in trust zones. Agencies may apply additionalsecurity capabilities that have not beincluded in the use case.Agencies have the discretion to determine the level of rigor necessary for applying securitycapabilities in use cases, based on federal guidelines and their risk tolerance. Refer to he Handbookforrenformation on TICases. The TIC 3.0 Traditional TIC Use Case (Traditional TIC Use Case) defines how network security can be applied when an agency routes traffic from an agency campus to the web, trusted external partners, or partner government agencies through a traditional TIC access point, either an agency TIC Access Provider (TICAP) or Managed Trusted Internet Protocol Services (MTIPS) provider.ternal anctionedcloud service provider, or includes network security patterns Secure gencycampus access to Public user to secure agency campus;Secure gencycampus access to agencysanctioned external partners; andSecure gency campus access to partner agenciesAn gencymay implement a subset of these traffic flows rather thanall. For instance, an agencymay not have trusted external partners. The Traditional TIC Use Case is the “default use case.” This use case demonstrates how TIC 2.2 security capabilities at a TIC access point can be used to implement TIC 3.0 to meet an agency’s specific requirements, risk tolerances, and other factors. OMB M-26 defines the Traditional TIC Use Case as the “default use case” which leverages agency TICAP and MTIPS providers.The Traditional TIC Use Case is intended to provide additional guidance to agencies and providers for how existing TIC 2.2 security capabilities at a TIC ccess oint can be used to implement TIC 3.0 capabilities.While the TIC 2.2 security capabilities are consistent with the TIC 3.0 objectives, agencies may supplement the existing TIC 2.2 security capabilities with new TIC 3.0 security capabilities to reflect their agency requirements, risk tolerances, and other factors. ��iii &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021 Reader’s GuideThe TrustedInternet Connections (TIC

54 ) initiative is defined through key docu
) initiative is defined through key documents that describe the directive, the program, the capabilities, the implementation guidance, and capability mappings. Each document has an essential role in describing TIC and its implementation. The documents provide an understanding of how changes have led to the latest version of TIC and why those changes have occurred. The documents go into highlevel technical detail to describe the exact changes inarchitecture for TIC 3.0. The documents are additive; each builds on the other like chapters in a book. As depicted in Figure 1, the documents should be referenced in order and to completion to gain a full understanding of the modernized initiative. Figure 1TIC 3.0 Guidance Snapshot ��iv &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021TIC 3.0 Traditional TIC Use Caseable of Contents1.1Key Terms 1Overview of TIC Use Cases 2 Purpose of the Traditional TIC Use Case 3ssumptions and Constraints 4Conceptual Architecture 5Security Patterns 96.1Security Pattern 1: Agency Campus to Web 96.2Security Pattern 2: Public User to Agency Campus6.3Security Pattern 3: Agency Campus to External Partner6.4Security Pattern 4: Agency Campus to Partner AgencyApplicable Security Capabilities7.1niversal Security Capabilities7.2Policy Enforcement Point Security CapabilitiesTelemetry Requirements9.ConclusionAppendix A – Glossary and DefinitionsAppendix B – Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesAppendix B.1 – TIC 2.2 Capabilities to TIC 3.0 CapabilitiesAppendix B.2 – TIC 3.0 Capabilities to TIC 2.2 CapabilitiesList of FiguresFigure 1: TIC 3.0 Guidance SnapshotFigure 2: Use Case Trust Zone Legend 3Figure 3: Traditional TIC Conceptual Architecture 6Figure 4: Security Pattern 1: Agency Campus to Web 9Figure 5: Security Pattern 2: Public User to AgencyFigure 6: Security Pattern 3: Agency to External PartnerFigure 7: Security Pattern 4: Agency Campus to Partner AgencyFigure 8: Traditional TIC Telemetry Sharing with CISA Introduction 1 ��iv &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021TIC 3.0 Traditional TIC Use Caseable of Contents1.1Key Terms 1erview of TIC Use Cases 2urpose of the Traditional TIC Use Case 3Assumptions and Constraints 4 Conceptual Architecture 5Security Patterns 96.1Security Pattern 1: Agency Campus to Web 96.2Security Pattern 2: Public User to Agency Campus6.3Security Pattern 3: Agency Campus to External Partner6.4Security Pattern 4: Agency Campus to Partner AgencyApplicable Security Capabilities7.1niversal Security Capabilities7.2Policy Enforcement Point Security CapabilitiesTelemetry Requirements9.ConclusionAppendix A – Glossary and DefinitionsAppendix B – Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesAppendix B.1 – TIC 2.2 Capabilities to TIC 3.0 CapabilitiesAppendix B.2 – TIC 3.0 Capabilities to TIC 2.2 CapabilitiesList of FiguresFigure 1: TIC 3.0 Guidance SnapshotFigure 2: Use Case Trust Zone Legend 3Figure 3: Traditional TIC Conceptual Architecture 6Figure 4: Security Pattern 1: Agency Campus to Web 9Figure 5: Security Pattern 2: Public User to AgencyFigure 6: Security Pattern 3: Agency to External PartnerFigure 7: Security Pattern 4: Agency Campus to Partner AgencyFigure 8: Traditional TIC Telemetry Sharing with CISA 1.Introduction 1 ��iv &#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;&#x/Att;¬he; [/; ott;&#xom ];&#x/BBo;&#xx [6;.76;4 4;.02;‘ 5;b.4;ّ ;U.8;ƒ ;&#x]/Su; typ; /F;&#xoote;&#xr /T;&#xype ;&#x/Pag;&#xinat;&#xion ;TIC 3.0 Traditional TIC Use CaseApril2021TIC 3.0 Traditional TIC Use Caseable of Contents1.1Key Terms 1Overview of TIC Use C 2Purpose of the Traditional TIC Use Case 3ssumptions and Constraints 4onceptual Architecture 5Security Patterns 96.1Security Pattern 1: Agency Campus to Web 96.2Security Pattern 2: Public User to Agency Campus6.3Security Pattern 3: Agency Campus to External Partner6.4Security Pattern 4: Agency Campus to Partner AgencyApplicable Security Capabilities7.1niversal Security Capabilities7.2Policy Enforcement Point Security CapabilitiesTelemetry Requirements9.ConclusionAppendix A – Glossary and DefinitionsAppendix B – Mapping TIC 2.2 Capabilities and TIC 3.0 CapabilitiesAppendix B.1 – TIC 2.2 Capabilities to TIC 3.0 CapabilitiesAppendix B.2 – TIC 3.0 Capabilities to TIC 2.2 CapabilitiesList of FiguresFigure 1: TIC 3.0 Guidance SnapshotFigure 2: Use Case Trust Zone Legend 3Figure 3: Traditional TIC Conceptual Architecture 6Figure 4: Security Pattern 1: Agency Campus to Web 9Figure 5: Security Pattern 2: Public User to AgencyFigure 6: Security Pattern 3: Agency to External PartnerFigure 7: Security Pattern 4: Agency Campus to Partner AgencyFigure 8: Traditional TIC Telemetry Sharing with CISA1.Introd