Trusted Internet Connections (TIC) 3.0 core guidance documents are intended to be used collectively in order to achieve the goals of the program. The documents are additive; each builds on the other like chapters in a book. The current versions of guidance are available below.
The TIC 3.0 core guidance are sequential in nature and include:
- Program Guidebook v1.1 (Volume 1) (pdf, 1.79MB) – Outlines the modernized TIC program and includes its historical context
- Reference Architecture v1.1 (Volume 2) (pdf, 1.34MB) – Defines the concepts of the program to guide and constrain the diverse implementations of the security capabilities
- Security Capabilities Catalog v2.0 (Volume 3) (pdf, 2.26MB) – Indexes security capabilities relevant to TIC
- Use Case Handbook v1.1 (Volume 4) (pdf, 985.45KB) – Introduces use cases, which describe an implementation of TIC for each identified use
- Overlay Handbook v1.1 (Volume 5) (pdf, 1.35MB) – Introduces overlays, which map the security functions of a vendor to the TIC capabilities
The current TIC use cases available, as generally described by the Use Case Handbook, are:
- Traditional TIC Use Case v1.0 (pdf, 5.34MB) – Describes the architecture and security capabilities guidance for the conventional TIC implementation
- Branch Office Use Case v1.0 (pdf, 3.86MB) – Describes the architecture and security capabilities guidance for remote offices
- Remote User Use Case v1.0 (pdf, 4.56MB) – Describes the architecture and security capabilities guidance for remote users
- Cloud Use Case (draft) (pdf, 7.79MB) – Describes the architecture and security considerations for deploying different cloud services. It is OPEN for Public comment until 22 July 2022.
In addition to the core guidance, the program also provides complementary guidance.
- Internet Protocol version 6 (IPv6) Considerations for TIC 3.0 (pdf, 539KB)
- Cloud Security Technical Reference Architecture version 2 (pdf, 3.23MB)
CISA released the version 2 of “Cloud Security Technical Reference Architecture (TRA)” guidance document, in accordance with Executive Order (EO) 14028 - "Improving the Nation's Cybersecurity." The Cloud Security TRA is designed to guide agencies’ secure migration to the cloud by defining and clarifying considerations for shared services, cloud migration, and cloud security posture management.
This page houses other pertinent references, such as:
- Pilot Process Handbook v1.0 (pdf, 1.4MB) – Establishes a framework for agencies to execute pilots
- Response to Comments on Draft TIC 3.0 Guidance Documentation (2020) (pdf, 224.36KB) – Summarizes the comments and modifications in response to the feedback received for the draft core documents in Summer 2020.
- Response to Comments on TIC 3.0 Traditional TIC Use Case and TIC 3.0 Branch Office Use Case (2021) (pdf, 624.72KB) – Summarizes the comments and modifications in response to feedback received for the draft TIC 3.0 Traditional TIC Use Case and draft TIC 3.0 Branch Office Use Case,
- Response to Comments on TIC 3.0 Remote User Use Case (2021) (pdf, 237.38KB) – Summarizes the comments and modifications in response to feedback received for the draft TIC 3.0 Remote User Use Case.
- Response to Comments on IPv6 Considerations for TIC 3.0 (2022) (pdf, 195KB) – Summarizes the comments and modifications in response to feedback received for the draft IPv6 Considerations for TIC 3.0.
- Response to Comments on Cloud Security Technical Reference Architecture (2022) (pdf, 221KB) – Summarizes the comments and modifications in response to feedback received for version 1 of the Cloud Security Technical Reference Architecture.
Additional information regarding TIC 3.0 documentation can be found on the TIC homepage.
Legacy and Deprecated TIC Guidance
To keep pace with technological innovation and emerging cybersecurity trends, CISA continues to produce and update the core guidance through collaboration with agencies and vendors to maintain relevancy. This section houses a repository of draft and deprecated versions of the TIC 3.0 guidance for comparative purposes.
Historical TIC program documentation has been archived to the TIC page on OMB MAX.
Note: The Security Capabilities Handbook below is now known as the Security Capabilities Catalog.
- Program Guidebook (Volume 1)
- Reference Architecture (Volume 2)
- Security Capabilities Catalog (Volume 3)
- Use Case Handbook (Volume 4)
- Overlay Handbook (Volume 5)
- Traditional TIC Use Case
- draft (pdf, 867.3KB)
- Branch Office Use Case
- draft (pdf, 1.04MB)
- Remote User Use Case
- draft (pdf, 4.92MB)
- Pilot Process Handbook
- draft (pdf, 759.9KB)
- IPv6 Considerations for TIC 3.0
- draft (pdf, 525.68KB)
- Cloud Security Technical Reference Architecture
- v1.0 (pdf, 2.48MB)
Prior to the release of OMB M-19-26 and the TIC 3.0 guidance in 2019, the security guidance for the legacy version of TIC (2017) was captured in the TIC Reference Architecture 2.2 (pdf, 3.02MB).
Contact
For questions concerning the TIC Program, please contact: tic@cisa.dhs.gov
Sean Connelly, Trusted Internet Connections Program Manager