Difference between revisions of "Trusted Internet Connection"
From MgmtWiki
(→Full Title) |
(→Context) |
||
Line 4: | Line 4: | ||
Trusted Internet Connections 3.0 Remote User Use Case<ref>Cybersecurity and Infrastructure Security Agency Version 1.0 Remote User Use Case | Trusted Internet Connections 3.0 Remote User Use Case<ref>Cybersecurity and Infrastructure Security Agency Version 1.0 Remote User Use Case | ||
(2021-10) https://www.cisa.gov/sites/default/files/publications/CISA%20TIC%203.0%20Remote%20User%20Use%20Case_1.pdf</ref> | (2021-10) https://www.cisa.gov/sites/default/files/publications/CISA%20TIC%203.0%20Remote%20User%20Use%20Case_1.pdf</ref> | ||
+ | * This initiative is based on trust zones and so is not directly compatible with a [[Zero Trust Architecture]] | ||
+ | |||
+ | ==References== | ||
+ | |||
+ | [[Category: Trust]] |
Revision as of 15:27, 6 October 2022
Full Title
Trusted Internet Connections (TIC), originally established in 2007, is a federal cybersecurity initiative intended to enhance network and perimeter security across the Federal Government.
Context
Trusted Internet Connections 3.0 Remote User Use Case[1]
- This initiative is based on trust zones and so is not directly compatible with a Zero Trust Architecture
References
- ↑ Cybersecurity and Infrastructure Security Agency Version 1.0 Remote User Use Case (2021-10) https://www.cisa.gov/sites/default/files/publications/CISA%20TIC%203.0%20Remote%20User%20Use%20Case_1.pdf