trusted internet connections

5G Edge Vs Core

The Edge vs. Core - An Increasingly Less Pronounced Distinction in 5G Networks informs stakeholders about how edge computing increases the risks of untrusted components into 5G networks by moving core functions away from traditional network boundaries. The product is intended to provide an overview of edge computing and represents CISA’s analysis of the risks associated with installation of untrusted components into 5G infrastructures.

Securing Connections: Meet the New TIC

Today, the Cybersecurity and Infrastructure Security Agency (CISA) is releasing final versions of the TIC 3.0 core guidance documents: the Program Guidebook, Reference Architecture, and Security Capabilities Catalog (formerly known as the Security Capabilities Handbook). These documents collectively lay the baseline for agencies to modernize their architecture in a secure way.

TIC 3.0 Interim Telework Guidance

To help secure the .gov during the unprecedented surge in telework, CISA released the TIC 3.0 Interim Telework Guidance document in support OMB Memorandum (M) 20-19 and the surge in teleworking. This document provides security capabilities for remote federal employees securely connecting to private agency networks and cloud environments. CISA recognizes that it is not comprehensive; the scope is limited to scenarios in which teleworkers access sanctioned cloud services.