<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Franklin Gothic Book";
panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
p.xxxmsonormal, li.xxxmsonormal, div.xxxmsonormal
{mso-style-name:x_x_x_msonormal;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.xxxmsonospacing, li.xxxmsonospacing, div.xxxmsonospacing
{mso-style-name:x_x_x_msonospacing;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.xxxcontentpasted1
{mso-style-name:x_x_x_contentpasted1;}
span.xxxcontentpasted4
{mso-style-name:x_x_x_contentpasted4;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<div>
<div>
<div>
<p class="xxxmsonormal" style="margin-bottom:8.0pt;background:white;text-autospace:ideograph-other">
<span class="xxxcontentpasted1"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">Highlighting unique considerations for Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Email-as-a-Service
(EaaS), the Cybersecurity and Infrastructure Security Agency (CISA) published the Trusted Internet Connections (TIC) 3.0
<a href="https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic" title="https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic">
Cloud Use Case</a> that provides common network and multi-boundary security guidance for federal civilian executive branch agencies that operate in cloud environments. Today’s release of the final version includes feedback provided during the public comment
period in 2022. </span></span><span style="color:black"><o:p></o:p></span></p>
<p class="MsoNormal" style="background:white"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
<p class="xxxmsonormal" style="margin-bottom:8.0pt;background:white;text-autospace:ideograph-other">
<span class="xxxcontentpasted1"><span lang="EN" style="font-family:"Franklin Gothic Book",sans-serif;color:black">CISA also released the final version of the Trusted Internet Connections (TIC) 3.0
</span></span><span lang="EN" style="font-family:"Franklin Gothic Book",sans-serif;color:black"><a href="https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic" title="https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic">Cloud
Use Case</a><span class="xxxcontentpasted1"> </span></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">and the updated versions of the Security Capabilities Catalog, the Branch Office Use Case, and the Remote User Use Case. </span><span class="xxxcontentpasted1"><span lang="EN" style="font-family:"Franklin Gothic Book",sans-serif;color:black">The
Cloud Use Case is the last of the “Initial Common Trusted Internet Connections Use Cases” outlined in
</span></span><span style="color:black"><a href="https://www.whitehouse.gov/wp-content/uploads/2019/09/M-19-26.pdf"><span lang="EN" style="font-family:"Franklin Gothic Book",sans-serif">OMB Memorandum M-19-26</span></a></span><span class="xxxcontentpasted1"><span lang="EN" style="font-family:"Franklin Gothic Book",sans-serif;color:black">.</span></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span><span style="color:black"><o:p></o:p></span></p>
<p class="xxxmsonospacing" style="background:white"><span class="xxxcontentpasted1"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#333333;background:white">All of these new documents and other helpful reference materials, like frequently
asked questions (FAQs) and trainings, can be found on the </span></span><span style="font-family:"Franklin Gothic Book",sans-serif;color:#2B72AF;background:white"><a href="https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic" title="https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic">TIC
homepage</a></span><span class="xxxcontentpasted1"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#333333;background:white">. We also encourage you to read CISA's
<a href="https://go.dhs.gov/4xP" title="https://go.dhs.gov/4xP">blog</a> highlighting today's announcement: "</span></span><span class="xxxcontentpasted4"><i><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">Final Version of TIC Use Cases
Covering Cloud Services"</span></i></span><span class="xxxcontentpasted4"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> by Kevin Wortman, CISA Senior Cybersecurity Engineer.</span></span><span class="xxxcontentpasted4"><span style="font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></span></p>
<p class="xxxmsonospacing" style="background:white"><o:p> </o:p></p>
</div>
</div>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity State Coordinator/Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt;color:#0563C1">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image001.png@01D97141.C43857A0"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="xxxmsonospacing" style="background:white"><o:p> </o:p></p>
<p class="MsoNormal" style="background:white"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
<p class="MsoNormal" style="background:white"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
</div>
</body>
</html>