ClearanceJobs
  • Candidates
  • Job Search
  • Employers
  • Hiring Companies
  • News & Career Advice
  • Login
  • Register Now
ClearanceJobs
Log In
  • Candidates
  • Job Search
  • Employers
  • Hiring Companies
  • News & Career Advice
  • Register Now
  • Log In
  • Security Clearance
  • Career Advice
  • NatSec@Work
  • Career Fairs
  • Military Transition
  • OCONUS
  • DoD Contracts
  • Intelligence
  • Cybersecurity
  • Government Contractor
  • Recruiting
    Subscribe
    • ClearanceJobs
    • News & Career Advice

    In-person, Remote, and Hybrid! Oh My! Securing your new norm with TIC 3.0


    ClearanceJobs / Sep 6, 2022
    Sponsored

    It’s been over two years since much of the Federal Government workforce headed to work from home due to the COVID-19 pandemic. As work around the world continues to shift between in-person, full-time remote, and hybrid, network defenders remain focused on maintaining a strong security posture to protect critical assets and data.

    TIC 3.0 AND REMOTE WORK   

    The modernized Trusted Internet Connections (TIC) 3.0 initiative, outlined in Office of Management and Budget’s (OMB) M-19-26, is intentionally designed to be flexible and adaptive to agency needs, focusing on strategy, architecture, and visibility. The Cybersecurity and Infrastructure Security Agency’s (CISA) finalized TIC 3.0 Remote User Use Case is the latest document in the collection of TIC 3.0 guidance. The new TIC use case provides guidance on applying network and multi-boundary security for federal agencies that permit remote users on their networks. These users could be personnel working from home, connecting from a hotel, or telecommuting from a non-agency-controlled location. The use case also extends the definition of remote users to mobile devices, including Bring Your Own Device (BYOD).

    Built off of and replacing the TIC 3.0 Interim Telework Guidance, issued in April 2020 to meet urgent requirements imposed by the COVID-19 pandemic, the finalized Remote User Use Case provides significantly more depth and detail. The new TIC use case considers additional security patterns that agencies may face with remote users and includes four new security capabilities: User Awareness and Training, Domain Name Monitoring, Application Container, and Remote Desktop Access.

    The final TIC 3.0 Remote User Use Case is aligned to complement CISA’s ongoing efforts to modernize federal networks and support security initiatives driven by the President’s Cyber Executive Order.  Ensuring protected and resilient remote user connections to agency-sanctioned cloud services and internal agency services is paramount for CISA and we expect the security guidance will help agencies improve application performance and reduce costs through reduction of private links.

    A COLLABORATIVE EFFORT 

    The release of this use case represents the conclusion of the adjudication period following the issuance of draft Remote User Use Case in December 2020. CISA received more than 70 comments on the use case from agencies, industry, and trade organizations during the January 2020 comment period. In collaboration with the Office of Management and Budget (OMB), the General Services Administration (GSA), and the Federal Chief Information Security Officer (CISO) Council TIC Subcommittee, CISA adjudicated the comments and updated the draft to address the comments’ prevailing themes. A summary of the comments and CISA’s response is available in the Response to Comments on TIC 3.0 Remote User Use Case.

    ADDITIONAL TIC 3.0 GUIDANCE 

    In addition to the Remote User Use Case, CISA updated and published two other TIC 3.0 guidance resources today, to help support agencies security efforts.

    In developing the Remote User Use Case, CISA produced new TIC 3.0 security capabilities, which necessitated a refresh to the TIC 3.0 Security Capabilities Catalog. Indexing and describing all TIC security capabilities across all of the use cases, the revised catalog provides an updated list of deployable security controls, security capabilities, and best practices. It also includes capability identifiers and the four new security capabilities: User Awareness and Training, Domain Name Monitoring, Application Container, and Remote Desktop Access.

    CISA, in collaboration with the Federal Chief Information Security Officer (FCISO) Council, also finalized the TIC 3.0 Pilot Process Handbook. The handbook describes the process by which agencies will conduct TIC 3.0 pilots, in accordance with M-19-26.

    We recognize that for most agencies and businesses a remote or hybrid work environment will be in place for the foreseeable future. CISA is focused on ensuring we provide appropriate guidance and resources to better support our federal agency partners. All of these new documents and other helpful reference materials, like frequently asked questions (FAQs) and trainings, can be found on the TIC homepage.

     

    Related News

    A digital globe labeled "Tensorglobe™" on the left, showing a purple and black wireframe map of Earth. To the right, a layered 3D schematic illustrates different data layers: AI-powered insights, Vivid™ Features (2D & 3D vectors), Vivid™ Terrain (3D basemaps), Vivid™ Mosaic (2D basemaps), and WorldView™ tasking suite. The Vantor logo is at the bottom left. The design uses purple lines and shapes on a black background.
    Sponsored
    Vantor Emerges: Maxar Intelligence Rebrands and Launches AI-Powered Spatial Intelligence Platform
    work from home
    Security Clearance
    National Security Work Embraces Hybrid Options
    remote work
    Career Advice
    Women Much More Likely to Want Remote Work to Continue
    future-remote-work
    Intelligence
    Leveraging Technology for Hybrid Work in Government
    ClearanceJobs.com, the largest security-cleared career network, specializes in defense jobs for professionals with security clearances. Search thousands of jobs from pre-screened, registered defense industry employers.


    About Cybersecurity And Infrastructure Security Agency

    The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor, working with partners to defend against today’s threats and collaborating to build more secure and resilient infrastructure for the future. Our partners in this mission span the public and private sectors.

    View Cybersecurity And Infrastructure Security Agency profile

    Cybersecurity And Infrastructure Security Agency Jobs

    Network Administrator

    Program Manager-Security Services

    Building/Facility Manager

    Quality Engineer I-IV

    Cleared Senior Security Consultant

    View all Cybersecurity And Infrastructure Security Agency Jobs


    Cybersecurity And Infrastructure Security Agency News

    Polygraph Basics: What You Need to Know

    The Proposal Hiring Playbook

    Government Shutdown Threatens Cybersecurity Just as Nation Marks Cyber Awareness Month

    What ITAR Taught Me About Recruiting in National Security

    Kratos Soars on Defense Deals, But Its Valuation Could Ground Further Gains

    U.S. Coast Guard Secures Pay During Government Shutdown with DHS Workaround

    Which College Degrees Deliver the Best Return on Investment?

    Making Cleared Careers Cool Again: AI, Partnerships, and the New Talent Playbook

    Leading from Behind: 10 Signs You’re a Leader (Even Without the Corner Office)

    Government Shutdown Fallout: RIF Notices Hit CISA as Cyber Threats Rise

    ClearanceJobs
    • About Us
    • Support
    • Browse Jobs
    • Security Clearance FAQs
    • AgileATS
    • FedWork
    • Blog
    • Privacy Policy
    • Terms of Service
    • My Privacy Rights
    • Pay My Bill
    • Contact Us
    • EULA
    Download on the App Store    Get it on Google Play

    © 2025 ClearanceJobs - All rights reserved. ClearanceJobs is a DHI service.