CISA - TIC 3.0 Vol. 3 Security Capabilities Catalog
CISA - TIC 3.0 Vol. 3 Security Capabilities Catalog
Connections 3.0
TIC Core Guidance Volume 3:
Security Capabilities Catalog
July 2020
Version 1.0
Cybersecurity and Infrastructure Security Agency
Cybersecurity Division
ii
Revision History
The version number will be updated as the document is modified. This document will be updated as
needed to reflect modern security practices and technologies.
Reader’s Guide
The TIC initiative is defined through key documents that describe the directive, the program, the
capabilities, the implementation guidance, and capability mappings. Each document has an essential role
in describing TIC and its implementation. The documents provide an understanding of how changes have
led up to the latest version of TIC and why those changes have occurred. The documents go into high-
level technical detail to describe the exact changes in architecture for TIC 3.0. The documents are
additive; each builds on the other like chapters in a book. As depicted in Figure 1, the documents should
be referenced in order and to completion to gain a full understanding of the modernized initiative.
List of Figures
Figure 1: TIC 3.0 Guidance Snapshot .......................................................................................................... iii
Figure 2: TIC Lens on the Cybersecurity Framework Functions ................................................................. 4
List of Tables
Table 1: Revision History ............................................................................................................................. ii
Table 2: TIC 3.0 Security Objectives............................................................................................................ 3
Table 3: Universal Security Capabilities ...................................................................................................... 6
Table 4: Policy Enforcement Point Security Capabilities for Files .............................................................. 9
Table 5: Policy Enforcement Point Security Capabilities for Email ............................................................. 9
Table 6: Policy Enforcement Point Security Capabilities for Web ............................................................. 10
Table 7: Policy Enforcement Point Security Capabilities for Networking ................................................. 12
Table 8: Policy Enforcement Point Security Capabilities for Resiliency ................................................... 13
Table 9: Policy Enforcement Point Security Capabilities for DNS ............................................................ 13
Table 10: Policy Enforcement Point Security Capabilities for Intrusion Detection ................................... 14
Table 11: Policy Enforcement Point Security Capabilities for Enterprise .................................................. 14
Table 12: Policy Enforcement Point Security Capabilities for Unified Communications and Collaboration
.................................................................................................................................................................... 15
Table 13: Policy Enforcement Point Security Capabilities for Data Protection ......................................... 16
1. Introduction
Trusted Internet Connections (TIC), originally established in 2007, is a federal cybersecurity initiative
intended to enhance network and boundary security across the Federal Government. The Office of
Management and Budget (OMB), the Department of Homeland Security (DHS) Cybersecurity and
Infrastructure Security Agency (CISA), and the General Services Administration (GSA) oversee the TIC
initiative through a robust program that sets guidance and an execution framework for agencies to
implement a baseline boundary security standard.
The initial versions of the TIC initiative sought to consolidate federal networks and standardize perimeter
security for the federal enterprise. As outlined in OMB Memorandum (M) 19-26: Update to the Trusted
Internet Connections (TIC) Initiative 1, this modernized version of the initiative expands upon the original
to drive security standards and leverage advances in technology as agencies adopt mobile and cloud
environments. The goal of TIC 3.0 is to secure federal data, networks, and boundaries while providing
visibility into agency traffic, including cloud communications.
1
“Update to the Trusted Internet Connections (TIC) Initiative,” Office of Management and Budget M-19-26 (2019).
https://www.whitehouse.gov/wp-content/uploads/2019/09/M-19-26.pdf.
2
"Security and Privacy Controls for Federal Information Systems and Organizations (NIST SP 800-53 R4)," April
2013. http://dx.doi.org/10.6028/NIST.SP.800-53r4.
Telemetry: Artifacts derived from security capabilities that provide visibility into security posture.
TIC: The term “TIC” is used throughout the Federal Government to denote different aspects of the TIC
initiative; including the overall TIC program, a physical TIC access point (also known as a Traditional
TIC), and a TIC Access Provider (TICAP – see below). This document refers to TIC as an adjective or as
the Trusted Internet Connections initiative.
TIC Access Point: The physical location where a federal civilian agency consolidates its external
connections and has security controls in place to secure and monitor the connections.
TIC Access Provider (TICAP): An agency or vendor that manages and hosts one or more TIC access
points. Single Service TICAPs serve as a TIC Access Provider only to their own agency. Multi-Service
TICAPs also provide TIC services to other agencies through a shared services model.
TIC Overlay: A mapping of products and services to TIC security capabilities.
TIC Use Case: Guidance on the secure implementation and/or configuration of specific platforms,
services, and environments. A TIC use case contains a conceptual architecture, one or more security
pattern options, security capability implementation guidance, and CISA telemetry guidance for a common
agency computing scenario.
Trust Zone: A discrete computing environment designated for information processing, storage, and/or
transmission that share the rigor or robustness of the applicable security capabilities necessary to protect
the traffic transiting in and out of a zone and/or the information within the zone.
Web: An environment used for web browsing purposes. Also see Internet.
• Scoped to TIC Initiative: Does the capability’s purpose fall within the scope of TIC (i.e.,
baseline network security, consolidation of trusted connections, address TIC security objectives)?
• Use Case Applicability: Does the capability apply to one or more networking scenarios (such as
those outlined in TIC use cases)?
• Goal-Based: Does the capability specify a goal to be achieved (rather than specifying how to
achieve a goal)?
The list of security capabilities in this catalog does not represent an exhaustive listing of security
capabilities; many otherwise valuable security capabilities are excluded by the selection criteria above.
For example, while supply chain risk is an important security consideration, it falls outside the scope of
the TIC initiative.
The Security Capabilities Catalog is intended to keep pace with the evolution of policy and technology.
Consequently, this document will be updated periodically to assess existing TIC capabilities against
changes in business mission needs, market trends, and threat landscape.
Agencies are granted discretion to apply the objectives at a level commensurate to the
type of resources being protected.
The TIC security objectives should be viewed independently of the types of traffic being secured, but
different types of traffic will influence how the objectives are interpreted. Each objective stands on its
own, independent of the other objectives. They should not be considered an order-of-operations. In other
words, the intent of the objectives is not to suggest that an agency must execute one objective to execute
another.
The TIC objectives, described in Table 2, are intended to set expectations for architectures, guide
implementation, and establish clear goals at the network level. The term “traffic” in the TIC objectives
refers to network traffic or data in transit between trust zones or stored at either or both trust zones.
Table 2: TIC 3.0 Security Objectives
Objective 3 Description
Manage Traffic Observe, validate, and filter data connections to align with authorized
activities; least privilege and default deny
3
The term “traffic” in the TIC objectives refers to network traffic or data in transit between trust zones or stored at
either or both trust zones.
Objective 3 Description
Protect Traffic Ensure only authorized parties can discern the contents of data in transit;
Confidentiality sender and receiver identification and enforcement
Protect Traffic Prevent alteration of data in transit; detect altered data in transit
Integrity
Ensure Service Promote resilient application and security services for continuous operation
Resiliency as the technology and threat landscape evolve
Ensure Effective Promote timely reaction and adapt future response to discovered threats;
Response policies defined and implemented; simplified adoption of new
countermeasures
The TIC security objectives can be mapped to the five functions of the National Institute of Standards and
Technology (NIST) Cybersecurity Framework (CSF) 4: Identify, Protect, Detect, Respond, and Recover.
The relationship between the CSF and TIC security objectives is depicted in Figure 2. Furthermore, the
TIC security capabilities are mapped to the NIST CSF in the Security Capabilities Catalog in the
following sections. This mapping will facilitate the development of TIC overlays for several of the more
widely used vendors.
4
“Framework for Improving Critical Infrastructure Cybersecurity,” National Institute of Standards and Technology
SP 800-53 Rev 1.1 (2018). https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.
Table 3 below provides: (1) a list of the universal security capabilities, (2) a description of each
capability, and (3) a mapping of each capability to relevant NIST CSF categories.
Table 3: Universal Security Capabilities
Backup and Recovery Keeping copies of configuration and data, ID.BE, PR.IP, PR.DS,
as needed, to allow for the quick RS.MI, RC.RP
restoration of service in the event of
malicious incidents, system failures, or
corruption.
Central Log Management Collecting, storing, and analyzing ID.AM, PR.PT, DE.AE,
with Analysis telemetry, where the collection and RS.AN
storage are designed to facilitate data
fusion and the security analysis aids in
discovery and response to malicious
activity.
Incident Response Plan and Documenting and implementing a set of ID.GV, ID.RA, PR.IP,
Incident Handling instructions, procedures, or technical DE.DP, DE.AE, RS.RP,
capabilities to sense and detect, respond RS.CO, RS.AN, RS.MI
to, limit consequences of malicious
cyberattacks, and restore the integrity of
the network and associated systems.
Least Privilege Designing the security architecture such ID.AM, PR.AC, PR.IP,
that each entity is granted the minimum PR.PT, DE.CM
system resources and authorizations that
the entity needs to perform its function.
Auditing and Accounting Capturing business records, including ID.SC, PR.AC, PR.PT
logs and other telemetry, and making
them available for auditing and
accounting as required. Design of the
auditing system should take insider threat
into consideration, including separation of
duties violation tracking, such that insider
abuse or misuse can be detected.
Enterprise Threat Obtaining threat intelligence from private ID.RA, DE.AE, DE.CM,
Intelligence and government sources and DE.DP
implementing mitigations for the
identified risks.
Dynamic Threat Discovery Using dynamic approaches (e.g. ID.RA, DE.AE, DE.CM,
heuristics, baselining, etc.) to discover DE.DP
new malicious activity.
Policy Enforcement Parity Consistently applying security protections PR.DS, PR.IP, PR.MA
and other policies, independent of the
communication mechanism, forwarding
path, or endpoints used.
Effective Use of Shared Employing shared services, where ID.AM, ID.GV, ID.RM,
Services applicable, that can be individually ID.SC, PR.AT, RS.CO
tailored, measured to independently
validate service conformance, and offer
effective protections for tenants against
malicious actors, both external as well as
internal to the service provider.
Integrated Desktop, Mobile, Defining polices such that they apply to a ID.AM, PR.AC, PR.DS,
and Remote Policies given agency entity no matter its location. PR.IP, PR.MA
Content Disarm & Content disarm and reconstruction PR.PT, DE.CM, DE.DP
Reconstruction technology detects the presence of
unapproved active content and facilitates its
removal.
Content Filtering Content filtering protections detect the PR.PT, DE.CM, DE.DP
presence of unapproved content and facilitate
its removal or denial of access.
Malicious Content Malicious content filtering protections detect PR.DS, PR.PT, DE.CM
Filtering the presence of malicious content and
facilitate its removal.
Access Control Access control protections prevent the ingest, PR.AC, PR.IP, DE.CM
egress, or transiting of unauthorized network
traffic.
Regional Delivery Regional delivery technologies enable the ID.AM, PR.AC, PR.DS
deployment of agency services across
geographically diverse locations.
Table 10: Policy Enforcement Point Security Capabilities for Intrusion Detection
Virtual Private Virtual private network (VPN) solutions PR.AC, PR.DS, PR.IP,
Network (VPN) provide a secure communications mechanism PR.MA, PR.PT
between networks that may traverse across
unprotected or public networks.
Table 12: Policy Enforcement Point Security Capabilities for Unified Communications and Collaboration
UCC Connection Mechanisms that ensure the meeting host can PR.AC, PR.IP, PR.AT
Termination positively control participation. These can
include inactivity timeouts, on-demand
prompts, unique access codes for each
meeting, host participant eviction, and even
meeting duration limits.
Table 13: Policy Enforcement Point Security Capabilities for Data Protection
Access Control Access control technologies allow an agency PR.AC, PR.IP, DE.CM
to define policies concerning the allowable
activities of users and entities to data and
resources.
Data Access and Identify agency sensitive data stored, ID.AM, PR.AC, PR.DS,
Use Telemetry processed, or transmitted, including those PR.PT, DE.AE, DE.CM
located at a service provider. Enforce
detailed logging for access or changes to
sensitive data.
5. Conclusion
This document lists the TIC security capabilities. TIC use cases will reference capabilities from this
catalog and will provide guidance on how to deploy these capabilities within the context of a unique use
case. TIC overlays will provide mappings from these capabilities to vendor-specific tools and services.
Over time, this catalog will be updated and will be informed by TIC pilot activities, TIC use cases,
emerging technologies, and threat insight.
Security Information and Event Management (SIEM): An approach to security management that
combines SIM (security information management) and SEM (security event management) functions into
one security management system.
Telemetry: Artifacts derived from security capabilities that provide visibility into security posture.
TIC: The term “TIC” is used throughout the Federal Government to denote different aspects of the TIC
initiative; including the overall TIC program, a physical TIC access point (also known as a Traditional
TIC), and a TIC Access Provider (TICAP – see below). This document refers to TIC as an adjective or as
the Trusted Internet Connections initiative.
TIC Access Point: The physical location where a federal civilian agency consolidates its external
connections and has security controls in place to secure and monitor the connections.
TIC Access Provider (TICAP): An agency or vendor that manages and hosts one or more TIC access
points. Single Service TICAPs serve as a TIC Access Provider only to their own agency. Multi-Service
TICAPs also provide TIC services to other agencies through a shared services model.
TIC Initiative: Program established to optimize and standardize the security of individual external
network connections currently in use by the Federal Government, to include connections to the internet.
Key stakeholders include CISA, OMB, and GSA.
TIC Overlay: A mapping from products and services to TIC security capabilities.
TIC Use Case: Guidance on the secure implementation and/or configuration of specific platforms,
services, and environments. A TIC use case contains a conceptual architecture, one or more security
pattern options, security capability implementation guidance, and CISA telemetry guidance for a common
agency computing scenario.
Trust Zone: A discrete computing environment designated for information processing, storage, and/or
transmission that dictates the level of security necessary to protect the traffic transiting in and out of a
zone and/or the information within the zone.
Unified Communications and Collaboration (UCC): A collection of solutions designed to facilitate
communication and collaboration, including in real-time, such as required by remote work or
collaboration between locations.
Universal Security Capabilities: Enterprise-level capabilities that outline guiding principles for TIC use
cases.
Web: An environment used for web browsing purposes. Also see Internet.
Zero Trust: A security model based on the principle of maintaining strict access controls and not trusting
anyone by default, even those already inside the network perimeter.