New TIC 3.0 Guidance Grounded in Zero Trust, CDM
CISA is creating a cohesive cybersecurity approach for federal agencies.
The Cybersecurity Infrastructure and Security Agency released new TIC 3.0 remote user case guidance to help federal agencies secure their networks in a teleworking environment.
The new draft guidance, which is open to public comment, comes almost 10 months after federal agencies shifted to remote work due to the COVID-19 pandemic.
Zero trust and Continuous Diagnostics and Mitigation (CDM) principles ground CISA’s recommendations in the draft guidance, pointing to the agency’s consistent, interconnected approach to cybersecurity for federal agencies.
CISA recommends federal agencies collect device logs of all devices connected to their networks, including personal devices, and track data sent and received from remote user devices.
“These logs should, when possible, be integrated with the agency’s central log management solution,” CISA said.
CISA also recommends ongoing monitoring of devices connected to the network and constantly verifying compliance with security standards and procedures, which is a central tenet of CISA’s CDM program.
“When possible, agencies should verify device configuration compliance when authorizing access to agency networks, services and data,” CISA said. “This compliance should be verified in an ongoing manner while a device maintains access to agency networks or services.”
In a remote working environment, CISA advises a zero trust approach to security controls.
“Agency users’ access to agency services and data should consider the security of the device being used to access the service or data, enabling higher levels of access to users with more secure devices,” according to the draft guidance. “If agencies permit the administration of services by remote users, they should employ MFA and should account for device security and compliance before authorizing administrative access. Agencies should track and analyze administrative logins and activities, especially when inconsistent with normal usage, and should have procedures in place for quickly revoking administrative access.”
When patching devices, CISA also recommends a zero trust approach. “Assume that remote devices have not been patched until confirmed otherwise. Based upon agency risk tolerances, unpatched devices may merit follow up with the remote user and access restrictions on those devices until patched, particularly if active exploits are known,” CISA said in its recommendations.
Aligning desktop, mobile and remote policies is also key, CISA added, as is continuous monitoring for “changes or discrepancies” in remote users’ “use of agency services or data.”
These security measures, CISA added, are especially important when so many federal employees are now teleworking.
In addition to these recommendations, CISA advised caution when sharing information and materials in virtual meetings.
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Trump's Intelligence Pick Backs Cybersecurity, Tech Accountability
The former congresswoman has called for improving cyber defenses and advocated for accountability in federal tech and data practices.
2m read -
Trump's Education Nominee Calls for Tech Vocational Programs
Linda McMahon has called for investments in the tech workforce and small businesses to remain competitive.
3m read -
DHS Leads Government’s Largest Civilian AI Hiring Effort
On this AI GovCast miniseries, Boyce discusses his journey to the agency with his prior roles at the Office of Management and Budget.
15m listen -
Federal IT Trends in 2024, Outlook for 2025
Federal IT advancements in 2024 showcased the transformative potential of emerging technologies, particularly artificial intelligence.
2m read