TIC 3.0 and zero-trust networking

network concept (Sashkin/ 

The Cybersecurity and Infrastructure Security Agency wants to address how zero-trust cybersecurity strategies work with the latest iteration of its Trusted Internet Connection policy, said one of CISA's top policy administrators.

"Everyone wants to talk about zero trust," said Sean Connelly, CISA's TIC  program manager, at a Feb. 20 FCW cloud security conference.

CISA, the Department of Homeland Security's cybersecurity agency, rolled out its draft of the third iteration of TIC policy guidance in late December. The documents include TIC 3.0 program handbook; a reference architecture; a use-case handbook; and an overlay handbook that can offer specific tech-based solutions.

Some commenters said they were concerned about how the TIC 3.0 policy will work with emerging zero-trust cybersecurity frameworks that don't automatically admit users inside network perimeters. Zero trust, which assumes bad actors are already present in a network, is a departure from traditional cybersecurity approaches that extend permissions to known users and devices and works to keep intruders out.

Under TIC 3.0, agencies can assign security "zones" of varying degrees of trust from high to low. Within those zones, some TIC 3.0 draft commenters said, users can share data. That capability, they said, is at odds with the "trust no one" interconnection approach of zero-trust principles.

Although TIC 3.0 is more aligned to zero-trust frameworks than TIC 2.0, CISA is thinking about how to bring it closer, according to Connelly.

"The trust zones," said Connelly, "are elastic and dynamic. It can be networked. It can be used with containers, an app, a user. We hope that that is understood by the greater community."

When CISA releases its final draft of TIC 3.0 guidance, the agency will also issue a separate "lessons-learned" document distilled from the comments as a whole, Connelly said.

Additionally, he said CISA might take up zero trust in coming use cases it is developing with agencies.

"We understand the interest in it. It's possible we may be able to tie to the remote-user use case, which is in the OMB [Office of Management and Budget] memo," he said.

CISA's draft handbook release in December, contained two kinds of use cases, "traditional" and "branch office--remote."

Although Connelly said CISA is hoping to publish the final draft of the documents this spring, he declined to give FCW a specific publication date, citing OMB and others' review of the document.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at [email protected] or follow him on Twitter at @MRockwell4.


  • Management
    shutterstock image By enzozo; photo ID: 319763930

    Where does the TMF Board go from here?

    With a $1 billion cash infusion, relaxed repayment guidelines and a surge in proposals from federal agencies, questions have been raised about whether the board overseeing the Technology Modernization Fund has been scaled to cope with its newfound popularity.

  • IT Modernization
    shutterstock image By enzozo; photo ID: 319763930

    OMB provides key guidance for TMF proposals amid surge in submissions

    Deputy Federal CIO Maria Roat details what makes for a winning Technology Modernization Fund proposal as agencies continue to submit major IT projects for potential funding.

Stay Connected