The Transition to TIC 3.0: Ensuring Agency Readiness for Network Modernization

The Transition to TIC 3.0: Ensuring Agency Readiness for Network Modernization

The recent sophisticated attacks on multiple federal agencies by nation-state hackers demonstrate that new approaches are required to protect federal networks and IT infrastructures. 


Trusted Internet Connection 3.0, managed by the Cybersecurity and Infrastructure Security Agency, is needed now more than ever to strengthen cyber defenses in a world in which the network perimeter has become increasingly more amorphous.


TIC 3.0 Building Blocks


The transition to cloud and mobile environments, along with the increase in remote workers across the nation, heightens the need for cyber protection that can address agencies’ distributed network requirements, including branch offices, remote users and service providers.


Network connectivity is the foundational phase for agencies preparing for TIC 3.0. IT and security teams will need the right building blocks to accommodate a range of use cases. Operations teams will have to understand how network traffic and data transfers to and from remote offices and workers will perform in the new paradigm.


Zero Trust Preparation


TIC 3.0 is also designed to fit with other federal initiatives such as the Continuous Diagnostics and Mitigation program and the National Institute of Standards and Technology Zero Trust Architecture. TIC 3.0 divides agency architectures by trust zones, shifting the emphasis from a strictly physical network perimeter to the boundaries of each zone within an agency environment, with the goal of ensuring baseline security protections across dispersed network environments. This is an opportune time for agencies to start framing their zero trust strategy.


Technologies such as software-defined wide area networks, or SD-WAN, aligned with TIC 3.0 guidance will help agencies build a foundation for secure network access at the edge, and eventually transition to a zero trust architecture.


A single vendor approach cannot solve every TIC 3.0 use case. Efforts to bolster remot ..

Support the originator by clicking the read the rest link below.