TIC 3.0 core guidance documents are intended to be used collectively in order to achieve the goals of the program. The documents are additive; each builds on the other like chapters in a book. The final core guidance is available below.
The TIC 3.0 core guidance includes:
- Program Guidebook (Volume 1) – Outlines the modernized TIC program and includes its historical context
- Reference Architecture (Volume 2) – Defines the concepts of the program to guide and constrain the diverse implementations of the security capabilities
- Security Capabilities Catalog (Volume 3) – Indexes security capabilities relevant to TIC
- Use Case Handbook (Volume 4) – Introduces use cases, which describe an implementation of TIC for each identified use
- Draft Traditional TIC Use Case – Describes the architecture and security capabilities guidance for the conventional TIC implementation
- Draft Branch Office Use Case – Describes the architecture and security capabilities guidance for remote offices
- Draft Remote User Use Case – Describes the architecture and security capabilities guidance for remote users
- Overlay Handbook (Volume 5) – Introduces overlays, which map the security functions of a service provider to the TIC capabilities
- Pilot Process Handbook - Establishes a framework for agencies to execute pilots
- Response to Comments on Draft TIC 3.0 Guidance Documentation – Summarizes the comments, and modifications in response to, the feedback received for the draft core documents
Deprecated versions of the core guidance can be referenced here for comparison. Additional information regarding TIC 3.0 documentation can be found on the CISA website. Historical TIC program documentation has been archived to the TIC page on OMB MAX.