Trusted Internet Connections Guidance Repository

Trusted Internet Connections (TIC) 3.0 core guidance documents are intended to be used collectively in order to achieve the goals of the program. The documents are additive; each builds on the other like chapters in a book. The current versions of guidance are available below.

The TIC 3.0 core guidance are sequential in nature and include:

The current TIC use cases available, as generally described by the Use Case Handbook, are:

In addition to the core guidance, the program also provides complementary guidance.

CISA’s "IPv6 Considerations for TIC 3.0" supports federal agencies as they implement Internet Protocol version 6 (IPv6) network protocol, in accordance with the Office of Management and Budget’s (OMB) Memorandum (M) 21-07: "Completing the Transition to Internet Protocol Version 6." The "IPv6 Considerations for TIC 3.0" explains the background of IPv6, lists security considerations for the protocol in relation to the TIC 3.0 security capabilities, and provides awareness of IPv6 security features according to TIC guidance. This document is intended to be architecture-agnostic and broadly supports the government-wide deployment and use of the IPv6 network protocol.

This page houses other pertinent references, such as:

Additional information regarding TIC 3.0 documentation can be found on the TIC homepage.

Legacy and Deprecated TIC Guidance

To keep pace with technological innovation and emerging cybersecurity trends, CISA continues to produce and update the core guidance through collaboration with agencies and vendors to maintain relevancy. This section houses a repository of draft and deprecated versions of the TIC 3.0 guidance for comparative purposes.

Historical TIC program documentation has been archived to the TIC page on OMB MAX.

Note: The Security Capabilities Handbook below is now known as the Security Capabilities Catalog.

  • Program Guidebook (Volume 1)
  • Reference Architecture (Volume 2) 
  • Security Capabilities Catalog (Volume 3) 
  • Use Case Handbook (Volume 4) 
  • Overlay Handbook (Volume 5) 
  • Traditional TIC Use Case
  • Branch Office Use Case
  • Remote User Use Case
  • Pilot Process Handbook
  • IPv6 Considerations for TIC 3.0

Prior to the release of OMB M-19-26 and the TIC 3.0 guidance in 2019, the security guidance for the legacy version of TIC (2017) was captured in the TIC Reference Architecture 2.2 (pdf, 3.02MB).


For questions concerning the TIC Program, please contact:

Sean Connelly, Trusted Internet Connections Program Manager

Was this webpage helpful?  Yes  |  Somewhat  |  No