{"catalog":{"description":"Trusted Internet Connections (TIC), originally established in 2007, is a federal cybersecurity initiative intended to enhance network and boundary security across the Federal Government. The Office of Management and Budget (OMB), the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA), and the General Services Administration (GSA) oversee the TIC initiative through a robust program that sets guidance and an execution framework for agencies to implement a baseline boundary security standard.","uuid":"e5acface-fb63-4d06-b230-7c6699ca906a","datePublished":"2021-10-01T00:00:00","version":"1.0.0","master":false,"url":"https://www.cisa.gov/publication/tic-30-core-guidance-documents","abstract":"The scope of the TIC 3.0 guidance encompasses the TIC initiative and other federal program artifacts and publications necessary to explain key elements, goals, and objectives of TIC 3.0.","defaultName":"tic30","title":"Trusted Internet Connection (TIC) 3.0 Security Capabilities Catalogue (Volume 3)","lastRevisionDate":"2021-10-01T00:00:00","regulationDatePublished":"2020-07-01","keywords":"TIC; 3.0; DHS;","securityControls":[{"id":25580,"description":"Backup and recovery entails keeping copies of configuration and data, as needed, to allow for the quick restoration of service in the event of malicious incidents, system failures, or corruption.","references":"","tenantsId":1,"uuid":"d4b63e4f-f0d6-45a0-a66c-501fe0289e4d","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Backup and Recovery","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.BRECO"},{"id":25581,"description":"Central log management with analysis is the collection, storage, and analysis of telemetry, where the collection and storage are designed to facilitate data fusion and where the security analysis aids in discovery and response to malicious activity.","references":"","tenantsId":1,"uuid":"5fb500eb-27f8-4e4b-931a-4e460e4d4975","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Central Log Management with Analysis","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.CLMAN"},{"id":25582,"description":"Configuration management is the implementation of a formal plan for documenting and managing changes to the environment, and monitoring for deviations, preferably automated.","references":"","tenantsId":1,"uuid":"1d3c5e7c-b482-4f3c-a6c5-db7dd9f1b46f","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Configuration Management","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.CMANA"},{"id":25583,"description":"Incident response planning and incident handling is the documentation and implementation of a set of instructions, procedures, or technical capabilities to sense and detect, respond to, limit consequences of malicious cyberattacks, and restore the integrity of the network and associated systems.","references":"","tenantsId":1,"uuid":"2b0d6202-7521-4acf-84bc-7ea1e4b91191","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Incident Response Planning and Incident Handling","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.IRPIH"},{"id":25584,"description":"Inventory entails developing, documenting, and maintaining a current inventory of all systems, networks, and components so that only authorized devices are given access, and unauthorized and unmanaged devices are found and restricted from gaining access.","references":"","tenantsId":1,"uuid":"bef89f23-f3c8-4ae2-8163-952b24c68883","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Inventory","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.INVENT"},{"id":25585,"description":"Least privilege is a design principle whereby each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.","references":"","tenantsId":1,"uuid":"7fa1fffd-cad5-482f-88ad-e446006e4f3d","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Least Privilege","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.LPRIV"},{"id":25586,"description":"Secure administration entails performing administrative tasks in a secure manner, using secure protocols.","references":"","tenantsId":1,"uuid":"8509e8b3-378b-43b7-8193-cedd36d0aadf","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Secure Administration","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.SADMI"},{"id":25587,"description":"Strong authentication verifies the identity of users, devices, or other entities through rigorous means (e.g., multi-factor authentication) before granting access.","references":"","tenantsId":1,"uuid":"dadc703e-123a-4789-98a9-2b88884b52d5","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Strong Authentication","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.SAUTH"},{"id":25588,"description":"Time synchronization is the coordination of system (e.g., servers, workstations, network devices) clocks to minimize the difference between system clock times and enable accurate comparison of timestamps between systems.","references":"","tenantsId":1,"uuid":"6ff539a5-1ec6-41d9-9f2a-39cc9ce8d4e0","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Time Synchronization","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.TSYNC"},{"id":25589,"description":"Vulnerability management is the practice of proactively working to discover vulnerabilities by including the use of both active and passive means of discovery and by taking action to mitigate discovered vulnerabilities.","references":"","tenantsId":1,"uuid":"ce702809-a857-4baf-803d-96b8568bf3af","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Vulnerability Management","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.VMANG"},{"id":25590,"description":"Patch management is the identification, acquisition, installation, and verification of patches for products and systems.","references":"","tenantsId":1,"uuid":"2d0beb8f-ed60-409e-9281-9e474866d95b","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Patch Management","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.PMANA"},{"id":25591,"description":"Auditing and accounting includes capturing business records (e.g., logs and other telemetry), making them available for auditing and accounting as required, and designing an auditing system that considers insider threat (e.g., separation of duties violation tracking) such that insider abuse or misuse can be detected.","references":"","tenantsId":1,"uuid":"3489ea35-5ced-4421-ba70-dc88565b3bb8","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Auditing and Accounting","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.AACCO"},{"id":25592,"description":"Resilience entails ensuring that systems, services, and protections maintain acceptable performance under adverse conditions.","references":"","tenantsId":1,"uuid":"bb1bf5b0-d8df-40ed-946d-9a3e9b84aefa","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Resilience","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.RESIL"},{"id":25593,"description":"Enterprise threat intelligence is the usage of threat intelligence from private or government sources to implement mitigations for the identified risks.","references":"","tenantsId":1,"uuid":"a3b58e6c-79ca-42d3-9ede-eac519e5f86e","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Enterprise Threat Intelligence","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.ETINT"},{"id":25594,"description":"Situational awareness is maintaining effective awareness, both current and historical, across all components.","references":"","tenantsId":1,"uuid":"b8da7bfe-e265-4108-8288-1505d84767dd","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Situational Awareness","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.SAWAR"},{"id":25595,"description":"Dynamic threat discovery is the practice of using dynamic approaches (e.g., heuristics, baselining, etc.) to discover new malicious activity.","references":"","tenantsId":1,"uuid":"e6bf3a56-d4e7-4405-a7ad-544547f75bf0","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Dynamic Threat Discovery","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.DTDIS"},{"id":25596,"description":"Policy enforcement parity entails consistently applying security protections and other policies, independent of the communication mechanism, forwarding path, or endpoints used.","references":"","tenantsId":1,"uuid":"f723a68b-bdf7-46ec-99d7-95279643e04e","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Policy Enforcement Parity","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.PEPAR"},{"id":25597,"description":"Effective use of shared services means that shared services are employed, where applicable, and individually tailored and measured to independently validate service conformance, and offer effective protections for tenants against malicious actors, both external and internal to the service provider.","references":"","tenantsId":1,"uuid":"48e7401e-bb30-45db-9c23-0669387a07b5","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Effective Use of Shared Services","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.EUSSE"},{"id":25598,"description":"This entails the definition and enforcement of policies that apply to a given agency entity independent of its location.","references":"","tenantsId":1,"uuid":"420dc3d2-275d-4ec5-8626-9ced398f8e15","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Integrated Desktop, Mobile, and Remote Policies","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.IDMRP"},{"id":25599,"description":"User awareness and training entails that all users are informed of their roles and responsibilities and appropriate cybersecurity education is provisioned to enable users to perform their duties in a secure manner.","references":"","tenantsId":1,"uuid":"df3e3da5-f2af-4bb9-b932-f304ca869e13","family":"Universal Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"User Awareness and Training","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.UNI.UATRA"},{"id":25600,"description":"Anti-malware protections detect the presence of malicious code and facilitate its quarantine or removal.","references":"","tenantsId":1,"uuid":"d5b45969-b72b-4657-8c74-ebfffc7c01eb","family":"Files PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Anti-malware","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.FI.AMALW"},{"id":25601,"description":"Content disarm and reconstruction technology detects the presence of unapproved active content and facilitates its removal.","references":"","tenantsId":1,"uuid":"18d528ab-14be-47c5-88ee-d20109e03292","family":"Files PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Content Disarm and Reconstruction","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.FI.CDREC"},{"id":25602,"description":"Detonation chambers facilitate the detection of malicious code using protected and isolated execution environments to analyze the files.","references":"","tenantsId":1,"uuid":"e5a299d5-773d-4129-99ee-9b872610c32a","family":"Files PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Detonation Chamber","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.FI.DCHAM"},{"id":25603,"description":"Data loss prevention (DLP) technologies detect instances of the exfiltration, either malicious or accidental, of agency data.","references":"","tenantsId":1,"uuid":"2737fc04-6607-4494-963b-df77480bf171","family":"Files PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Data Loss Prevention","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.FI.DLPRE"},{"id":25604,"description":"Anti-phishing protections detect instances of phishing and prevent users from accessing them.","references":"","tenantsId":1,"uuid":"7647bd4d-93b4-4af0-9a4d-772f6c4c9c96","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Anti-phishing Protections","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.APPRO"},{"id":25605,"description":"Anti-spam protections detect and quarantine instances of spam.","references":"","tenantsId":1,"uuid":"8cddb763-3048-4b90-b383-89992248b9e1","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Anti-spam Protections","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.ASPRO"},{"id":25606,"description":"Authenticated received chain allows for an intermediary, like a mailing list or forwarding service, to sign its own authentication of the original email, allowing downstream entities to accept the intermediary’s authentication even if the email was changed.","references":"","tenantsId":1,"uuid":"ae2db28b-5114-4858-9dff-f6372e031da3","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Authenticated Received Chain","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.ARCHA"},{"id":25607,"description":"DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data.","references":"","tenantsId":1,"uuid":"f60473eb-e260-41b7-be1a-df7e39d665c2","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Data Loss Prevention","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.DLPRE"},{"id":25608,"description":"Domain signature verification protections authenticate incoming email according to the Domain-based Message Authentication Reporting and Conformance (DMARC) email authentication protocol defined in Request for Comments (RFC) 7489 5.","references":"","tenantsId":1,"uuid":"af17891e-ca0b-4793-ab22-75d8dd418e97","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Signature Verification for Incoming Email","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.DSVIE"},{"id":25609,"description":"Domain signature protections facilitate the authentication of outgoing email by signing the emails and ensuring that external parties may validate the email signatures according to the DMARC email authentication protocol that is defined in RFC 7489.","references":"","tenantsId":1,"uuid":"5d36b7bc-2043-4108-a2be-6424354c8dbf","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Signatures for Outgoing Email","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.DSOEM"},{"id":25610,"description":"Email services are configured to use encrypted connections, when possible, for communications between clients and other email servers.","references":"","tenantsId":1,"uuid":"e5146395-bf78-4b7f-85ee-d7920e4cbddc","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Encryption for Email Transmission","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.EETRA"},{"id":25611,"description":"Malicious link protections detect malicious links in emails and prevent users from accessing them.","references":"","tenantsId":1,"uuid":"9d7931e4-0b03-4d35-b57d-aa993da2fc0f","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Malicious Link Protections","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.MLPRO"},{"id":25612,"description":"Link click-through protections ensure that when a link from an email is clicked, the requester is directed to a protection that verifies the security of the link destination before permitting access.","references":"","tenantsId":1,"uuid":"dc57dc50-a470-4a1a-a0c8-ccf811486946","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Link Click- through Protection","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.LCTPR"},{"id":25613,"description":"EINSTEIN 3 Accelerated (E3A) 6 is an intrusion prevention capability offered by NCPS, provided by CISA, that includes an email filtering security service.","references":"","tenantsId":1,"uuid":"fae24b24-3491-4e46-9fe3-3a4e13f659f2","family":"Email PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"EINSTEIN 3 Accelerated Email Protections","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EM.E3AEP"},{"id":25614,"description":"Break and Inspect systems, or encryption proxies, terminate encrypted traffic, logging or performing policy enforcement against the plaintext, and re- encrypting the traffic, if applicable, before transmitting to the final destination.","references":"","tenantsId":1,"uuid":"3026990b-5527-42c5-b8c2-7da96ee174c4","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Break and Inspect","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.BINSP"},{"id":25615,"description":"Active content mitigation protections detect the presence of unapproved active content and facilitate its removal.","references":"","tenantsId":1,"uuid":"f215ea24-9ec2-4a35-acfe-08da63e51526","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Active Content Mitigation","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.ACMIT"},{"id":25616,"description":"Certificate denylisting protections prevent communication with entities that use a set of known bad certificates.","references":"","tenantsId":1,"uuid":"c2f0c33f-014c-44c7-acf0-f2ea465b6348","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Certificate Denylisting","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.CDENY"},{"id":25617,"description":"Content filtering protections detect the presence of unapproved content and facilitate its removal or denial of access.","references":"","tenantsId":1,"uuid":"f1a2cfdd-145c-4e3e-938a-49baf676b262","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Content Filtering","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.CFILT"},{"id":25618,"description":"Authenticated proxies require entities to authenticate with the proxy before making use of it, enabling user, group, and location-aware security controls.","references":"","tenantsId":1,"uuid":"bfb744fa-80b2-46e4-b91e-fb31ccb6af9e","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Authenticated Proxy","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.APROX"},{"id":25619,"description":"DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data.","references":"","tenantsId":1,"uuid":"797078aa-1f87-4126-9fe3-c4c1af950778","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Data Loss Prevention","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.DLPRE"},{"id":25620,"description":"Domain resolution filtering prevents entities from using the DNS-over- Hypertext Transfer Protocol Secure (HTTPS), or DoH, domain resolution protocol, possibly evading DNS-based protections.","references":"","tenantsId":1,"uuid":"6b686272-8f40-40b1-96bf-6bc8b2e158d6","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Resolution Filtering","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.DRESF"},{"id":25621,"description":"Protocol compliance enforcement technologies ensure that traffic complies with protocol definitions, documented by the Internet Engineering Task Force (IETF) 7.","references":"","tenantsId":1,"uuid":"68f77ee6-4052-48a4-be99-4739f1ff5616","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Protocol Compliance Enforcement","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.PCENF"},{"id":25622,"description":"Domain category filtering technologies allow for classes of domains (e.g., banking, medical) to receive a different set of security protections.","references":"","tenantsId":1,"uuid":"462de9c6-31bb-4ac3-8067-3278ef1f0e6b","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Category Filtering","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.DCFIL"},{"id":25623,"description":"Domain reputation filtering protections are a form of domain denylisting based on a domain’s reputation, as defined by either the agency or an external entity.","references":"","tenantsId":1,"uuid":"88af3e6d-e645-412c-bd6f-10c20e43cd89","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Reputation Filtering","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.DREPF"},{"id":25624,"description":"Bandwidth control technologies allow for limiting the amount of bandwidth used by different classes of domains.","references":"","tenantsId":1,"uuid":"0f234d18-1585-415c-a27a-75b24a2e0ef4","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Bandwidth Control","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.BCONT"},{"id":25625,"description":"Malicious content filtering protections detect the presence of malicious content and facilitate its removal.","references":"","tenantsId":1,"uuid":"0ae6472b-cdb5-4de9-8b26-444fcdc67ed4","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Malicious Content Filtering","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.MCFIL"},{"id":25626,"description":"Access control technologies allow an agency to define policies limiting what actions may be performed by connected users and entities.","references":"","tenantsId":1,"uuid":"4da30415-6006-4994-a813-549065f5f8a0","family":"Web PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Access Control","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.WE.ACONT"},{"id":25627,"description":"Access control protections prevent the ingress, egress, or transmission of unauthorized network traffic.","references":"","tenantsId":1,"uuid":"19f8860a-8b13-46b2-9d6e-3b38fa01f9fa","family":"Networking PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Access Control","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.NE.ACONT"},{"id":25628,"description":"Internet address denylisting protections prevent the ingest or transiting of traffic received from or destined to a denylisted internet address.","references":"","tenantsId":1,"uuid":"1928b0d6-218c-47e4-811b-b0e7cea86303","family":"Networking PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Internet Address Denylisting","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.NE.IADEN"},{"id":25629,"description":"Host containment protections enable a network to revoke or quarantine a host’s access to the network.","references":"","tenantsId":1,"uuid":"cd3dd374-4e47-46f5-ab05-257689f8a13f","family":"Networking PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Host Containment","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.NE.HCONT"},{"id":25630,"description":"Network segmentation separates a given network into subnetworks, facilitating security controls between the subnetworks, and decreasing the attack surface of the network.","references":"","tenantsId":1,"uuid":"d9752fb0-f8c2-480d-a525-72ef0aa2e631","family":"Networking PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Network Segmentation","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.NE.NSEGM"},{"id":25631,"description":"Microsegmentation divides the network, either physically or virtually, according to the communication needs of application and data workflows, facilitating security controls to protect the data.","references":"","tenantsId":1,"uuid":"568164f7-430f-493f-936e-ce567d50680a","family":"Networking PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Micro- segmentation","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.NE.MICRO"},{"id":25632,"description":"Distributed Denial of Service (DDoS) protections mitigate the effects of distributed denial of service attacks.","references":"","tenantsId":1,"uuid":"2b1896c0-d90f-4342-b635-169e039f2ace","family":"Resiliency PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Distributed Denial of Service Protections","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.RE.DDSPR"},{"id":25633,"description":"Elastic expansion enables agencies to dynamically expand the resources available for services as conditions require.","references":"","tenantsId":1,"uuid":"9a9532e2-7faa-42a9-bfcb-8b73e709ce8e","family":"Resiliency PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Elastic Expansion","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.RE.EEXPS"},{"id":25634,"description":"Regional delivery technologies enable the deployment of agency services across geographically diverse locations.","references":"","tenantsId":1,"uuid":"c7eadba0-ebc9-41f9-9168-a41477eb2ea5","family":"Resiliency PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Regional Delivery","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.RE.RDELI"},{"id":25635,"description":"Domain name sinkholing protections are a form of denylisting that protect clients from accessing malicious domains by responding to DNS queries for those domains.","references":"","tenantsId":1,"uuid":"2918dc52-ed65-4f2b-8083-6a69a2d024db","family":"DNS PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Name Sinkholing","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DO.DNSIN"},{"id":25636,"description":"Domain name verification protections ensure that domain name lookups from agency clients, whether for internal or external domains, are validated according to Domain Name System Security Extensions (DNSSEC).","references":"","tenantsId":1,"uuid":"9d107515-5d57-4a1b-baf8-5f9cbe2d77fb","family":"DNS PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Name Verification for Agency Clients","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DO.DNVAC"},{"id":25637,"description":"Domain name validation protections ensure that all agency domain names are secured using DNSSEC, enabling external entities to validate their resolution to the domain names.","references":"","tenantsId":1,"uuid":"7efc4530-ac97-4518-af39-6b8ae42ea2c9","family":"DNS PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Name Validation for Agency Domains","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DO.DNVAD"},{"id":25638,"description":"Domain name monitoring allows agencies to discover the creation of or changes to agency domains.","references":"","tenantsId":1,"uuid":"54782ee7-c99b-43d0-bea2-67ea168e180b","family":"DNS PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Domain Name Monitoring","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DO.DNMON"},{"id":25639,"description":"E3A is an intrusion prevention capability offered by NCPS, provided by CISA, that includes a DNS sinkholing security service.","references":"","tenantsId":1,"uuid":"50c3739b-8e7d-4add-bbfc-624d11cb6ba6","family":"DNS PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"EINSTEIN 3 - Accelerated Domain Name Protections","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DO.E3ADN"},{"id":25640,"description":"Endpoint detection and response (EDR) tools combine endpoint and network event data to aid in the detection of malicious activity.","references":"","tenantsId":1,"uuid":"881202de-89be-4a10-90ff-a47ddd777207","family":"Intrusion Detection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Endpoint Detection and Response","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.IN.EDRES"},{"id":25641,"description":"Intrusion detection systems detect and report malicious activity. Intrusion prevention systems attempt to stop the activity.","references":"","tenantsId":1,"uuid":"dce3e242-1d11-40f9-b013-f3a7bda4cfb5","family":"Intrusion Detection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Intrusion Detection and Prevention Systems","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.IN.IDSY"},{"id":25642,"description":"Adaptive access control technologies factor in additional context, like security risk, operational needs, and other heuristics, when evaluating access control decisions.","references":"","tenantsId":1,"uuid":"427edcb2-1566-4a01-8d87-b97115ee472c","family":"Intrusion Detection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Adaptive Access Control","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.IN.AACON"},{"id":25643,"description":"Deception platform technologies provide decoy environments, from individual machines to entire networks, that can be used to deflect attacks away from the operational systems supporting agency missions/business functions.","references":"","tenantsId":1,"uuid":"82228110-5fc0-4819-b36b-2407178893d6","family":"Intrusion Detection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Deception Platforms","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.IN.DPLAT"},{"id":25644,"description":"Certificate transparency log monitoring allows agencies to discover when new certificates are issued for agency domains.","references":"","tenantsId":1,"uuid":"0cf66f37-8d5d-4254-aabd-c9251d8aae06","family":"Intrusion Detection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Certificate Transparency Log Monitoring","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.IN.CTLMO"},{"id":25645,"description":"Security Orchestration, Automation, and Response (SOAR) tools define, prioritize, and automate the response to security incidents.","references":"","tenantsId":1,"uuid":"60b4bd65-8078-4e57-b465-ead0915104f8","family":"Enterprise PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Security Orchestration, Automation, and Response","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EN.SOARE"},{"id":25646,"description":"Shadow information technology (IT) detection systems detect the presence of unauthorized software and systems in use by an agency.","references":"","tenantsId":1,"uuid":"4a591fec-f697-4d26-b646-4e9f7034f614","family":"Enterprise PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Shadow Information Technology Detection","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EN.SITDE"},{"id":25647,"description":"Virtual private network (VPN) solutions provide a secure communications mechanism between networks that may traverse across unprotected or public networks.","references":"","tenantsId":1,"uuid":"0bbfd0d2-2056-4df6-a000-cee6b65f1ee0","family":"Enterprise PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Virtual Private Network","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EN.VPNET"},{"id":25648,"description":"A virtualization approach in which applications are isolated to a known set of dependencies, access methods, and interfaces.","references":"","tenantsId":1,"uuid":"394a19ca-142b-467e-bc0b-c8f72fb065cb","family":"Enterprise PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Application Container","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EN.ACONT"},{"id":25649,"description":"Remote desktop access solutions provide a mechanism for connecting to and controlling a remote physical or virtual computer.","references":"","tenantsId":1,"uuid":"e07d3b9d-9031-4d1b-8738-8eb82a0648a6","family":"Enterprise PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Remote Desktop Access","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.EN.RDACC"},{"id":25650,"description":"Identity verification ensures that access to the virtual meeting is limited to appropriate individuals. Waiting room features, where the meeting host authorizes vetted individuals to join the meeting, can also be utilized.","references":"","tenantsId":1,"uuid":"204868b7-fc64-4490-aac0-34512761c436","family":"Unified Communications and Collaboration PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Identity Verification","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.UN.IVERI"},{"id":25651,"description":"Communication between virtual meeting participants and any data exchanged is encrypted at rest and in transit. Some UCC offerings support end- to-end encryption, where encryption is performed on the clients and can only be decrypted by the other authenticated participants and cannot be decrypted by the UCC vendor.","references":"","tenantsId":1,"uuid":"cf6218ef-65dd-4493-8d18-32594005c2c1","family":"Unified Communications and Collaboration PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Encrypted Communication","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.UN.ECOMM"},{"id":25652,"description":"Connection termination mechanisms ensure the meeting host can positively control participation through inactivity timeouts, on-demand prompts, unique access codes for each meeting, host participant eviction, and even meeting duration limits.","references":"","tenantsId":1,"uuid":"a3df710a-34d0-4602-8a3d-e811b918fc0b","family":"Unified Communications and Collaboration PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Connection Termination","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.UN.CTERM"},{"id":25653,"description":"Mechanisms should be implemented to control the sharing of information between UCC participants, intentional or incidental. This may be integrated into additional agency DLP technologies and can include keyword matching, attachment file type or existence prohibitions, attachment size limitations, or even audio/visual filters.","references":"","tenantsId":1,"uuid":"d96eff86-5556-4560-8f24-ab5d74d75443","family":"Unified Communications and Collaboration PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Data Loss Prevention","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.UN.DLPRE"},{"id":25654,"description":"Access control technologies allow an agency to define policies concerning the allowable activities of users and entities to data and resources.","references":"","tenantsId":1,"uuid":"268df9bd-a75e-4b26-aa95-1b6736ef0050","family":"Data Protection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Access Control","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DA.ACONT"},{"id":25655,"description":"Data protection at rest aims to secure data stored on any device or storage medium.","references":"","tenantsId":1,"uuid":"534b7e32-ffe7-44cb-bc50-72e5a3019a74","family":"Data Protection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Protections for Data at Rest","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DA.PDRES"},{"id":25656,"description":"Data protection in transit, or data in motion, aims to secure data that is actively moving from one location to another, such as across the internet or through a private enterprise network.","references":"","tenantsId":1,"uuid":"5b19b54a-6d48-4028-a87f-66bc8c7d59df","family":"Data Protection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Protections for Data in Transit","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DA.PDTRA"},{"id":25657,"description":"DLP technologies detect instances of the exfiltration, either malicious or accidental, of agency data.","references":"","tenantsId":1,"uuid":"3ebd6939-2dcc-4407-a9ab-8e0542dab15d","family":"Data Protection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Data Loss Prevention","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DA.DLPRE"},{"id":25658,"description":"This entails identifying agency sensitive data stored, processed, or transmitted, including those located at a service provider and enforcing detailed logging for access or changes to sensitive data.","references":"","tenantsId":1,"uuid":"dcef63f1-71cd-4198-94c8-7126ebc2ee99","family":"Data Protection PEP Security Capabilities","subControls":"","weight":0,"archived":false,"isPublic":true,"enhancements":"","controlType":"Stand-Alone","title":"Data Access and Use Telemetry","relatedControls":"","catalogueID":155,"assessmentPlan":"","practiceLevel":"","mappings":"","controlId":"3.PEP.DA.DAUTE"}]}} |