{"id":3745,"date":"2016-11-08T13:00:29","date_gmt":"2016-11-08T18:00:29","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/azuregov\/?p=3745"},"modified":"2016-11-08T13:00:29","modified_gmt":"2016-11-08T18:00:29","slug":"azure-government-supports-tic-capabilities","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/azuregov\/azure-government-supports-tic-capabilities\/","title":{"rendered":"Azure Government supports TIC capabilities"},"content":{"rendered":"<p>Federal customers that are part of the Trusted Internet Connection (TIC) initiative are using Microsoft Azure Government.\u00a0Any Federal government agencies or departments can leverage Azure Government to build applications and services that comply with the TIC initiative.<\/p>\n<p><strong>What is TIC?\u00a0<\/strong><\/p>\n<p>The TIC initiative is the common name for initiative number one of the <a href=\"https:\/\/www.whitehouse.gov\/issues\/foreign-policy\/cybersecurity\/national-initiative\">Comprehensive National Cybersecurity Initiative<\/a> (CNCI). On November 20, 2007, the Office of Management and Budget (OMB) designated the Department of Homeland Security (DHS) as the coordinator of the TIC initiative through <a href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-05.pdf\">Memorandum M-08-5<\/a> (with OMB continuing oversight).<\/p>\n<p>The initial TIC initiative direction called for the consolidation of the Federal Government\u2019s external access points (including those to the Internet) for resulting common security solutions such as baseline security capabilities and the ability to validate agency adherence. DHS has since published the current <a href=\"https:\/\/www.fedramp.gov\/files\/2015\/04\/TIC_Ref_Arch_v2-0_2013.pdf\">TIC Reference Architecture v2.0<\/a> (2013) which introduced new capabilities and clarifies critical capabilities for the optimization and standardization of Federal Government external network connections.<\/p>\n<p>Most recently introduced is the <a href=\"https:\/\/www.fedramp.gov\/draft-fedramp-tic-overlay\/\">TIC Overlay pilot program<\/a> with a goal of optimized connectivity to FedRAMP compliant cloud service providers (such as <a href=\"https:\/\/www.microsoft.com\/en-us\/TrustCenter\/Compliance\/FedRAMP\">Azure Government<\/a>) with security capabilities to meet TIC initiative obligations.<\/p>\n<p><strong>Designing for TIC\u00a0<\/strong><\/p>\n<p>System owners\/designers have three possible approaches to take advantage of Azure Government cloud services while meeting their TIC obligations:<\/p>\n<ul>\n<li>Based on TIC Reference Architecture v2.0 Appendix H, Federal customers can access Azure Government as an extension of their department or agency network by utilizing Azure capabilities including <a href=\"https:\/\/azure.microsoft.com\/en-us\/documentation\/articles\/documentation-government-networking\/\">ExpressRoute<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/documentation\/services\/virtual-network\/\">VNETs<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/documentation\/articles\/virtual-networks-nsg\/\">Network Security Groups<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/en-us\/documentation\/articles\/virtual-networks-udr-overview\/\">User Defined Routes<\/a>, to establish a managed boundary that does not require traffic to transit a TIC because no traffic is traversing the Internet.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/\"><img decoding=\"async\" width=\"419\" height=\"392\" class=\"aligncenter  wp-image-3857\" alt=\"tic2-0-appendix-h-page-001\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/43\/2019\/03\/TIC2.0-Appendix-H-page-001-e1478627360910.jpg\" \/><\/a><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/\"><\/a><\/p>\n<ul>\n<li>While the TIC Overlay is not finalized, Federal departments and agencies can seek support from DHS to begin their own TIC Overlay pilot with Microsoft Azure Government.\u00a0 We see this as having great potential for many if not all Federal departments and agencies to optimally utilize cloud services.\u00a0\u00a0 If your agency or department is interested, please e-mail AzureBlueprint@microsoft.com and we will be happy to help you build a plan.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/\"><img decoding=\"async\" width=\"442\" height=\"363\" class=\"aligncenter  wp-image-3855\" alt=\"tic-overlay-page-001\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/43\/2019\/03\/TIC-Overlay-page-001-e1478627077319.jpg\" \/><\/a><\/p>\n<ul>\n<li>Federal customers can access Azure Government cloud services from their existing agency network through their current TIC\/TICAP resources.\u00a0 This requires that your current TIC\/TICAP provides enough bandwidth to meet your application needs.\u00a0 This design meets all initial requirements of the TIC initiative.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/\"><img decoding=\"async\" width=\"369\" height=\"347\" class=\"aligncenter  wp-image-3865\" alt=\"tic2-0-page-001\" src=\"https:\/\/devblogs.microsoft.com\/wp-content\/uploads\/sites\/43\/2019\/03\/TIC2.0-page-001-e1478627694625.jpg\" \/><\/a><\/p>\n<p>We continue to partner with DHS, OMB, other Federal departments &amp; agencies, along with other cloud service providers, to mature cyber security capabilities of cloud services for the Federal Government. As significant developments occur, we will be reporting updates and solutions through the <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/\">Azure Government Blog<\/a> and <a href=\"https:\/\/azure.microsoft.com\/en-us\/documentation\/government\/\">Azure Government Documentation<\/a> site.<\/p>\n<p>We welcome your comments and suggestions to help us continually improve your Azure Government experience. To stay up to date on all things Azure Government, be sure to subscribe to our <a href=\"https:\/\/blogs.msdn.microsoft.com\/azuregov\/feed\/\">RSS feed<\/a> and to receive emails, click \u201cSubscribe by Email!\u201d on the <a href=\"https:\/\/blogs.msdn.microsoft.com\/azuregov\/\">Azure Government Blog<\/a>. To experience the power of Azure Government for your organization, sign up for an <a href=\"https:\/\/azuregov.microsoft.com\/trial\/azuregovtrial\">Azure Government Trial<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal customers that are part of the Trusted Internet Connection (TIC) initiative are using Microsoft Azure Government.\u00a0Any Federal government agencies or departments can leverage Azure Government to build applications and services that comply with the TIC initiative. What is TIC?\u00a0 The TIC initiative is the common name for initiative number one of the Comprehensive National [&hellip;]<\/p>\n","protected":false},"author":1786,"featured_media":20423,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1],"tags":[75,95,550],"class_list":["post-3745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements","category-azuregov","tag-azure","tag-azure-government","tag-tic"],"acf":[],"blog_post_summary":"<p>Federal customers that are part of the Trusted Internet Connection (TIC) initiative are using Microsoft Azure Government.\u00a0Any Federal government agencies or departments can leverage Azure Government to build applications and services that comply with the TIC initiative. What is TIC?\u00a0 The TIC initiative is the common name for initiative number one of the Comprehensive National [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/3745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/users\/1786"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/comments?post=3745"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/3745\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media\/20423"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media?parent=3745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/categories?post=3745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/tags?post=3745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}