RegScale Announces Support for Trusted Internet Connection (TIC) 3.0

October 26, 2021 | By J. Travis Howerton

The Department of Homeland Security (DHS) Trusted Internet Connection (TIC) 3.0 program has evolved from simply reducing external network connections to protecting agency enterprise perimeters, mobile, and cloud connections with a focus on increasing the use of boundary protection capabilities to protect agency assets from an evolving threat landscape. Over time, greater bandwidth demands, transport encryption, and perimeter services were placed on agency TIC access points beyond their ability to scale. With this update, DHS seeks to reduce barriers to cloud adoption while increasing performance and lowering costs. While this policy provides enhanced flexibility, it will require agencies to carefully evaluate risk when implementing TIC controls to protect applications in the cloud.

At RegScale, we give agencies easy and free tools to get started with building a TIC 3.0 compliant protection program with support for tracking policies, related assessments, evidence collection, issues management/performance improvement, and other related compliance workflows. As of October 26, 2021, RegScale has announced that we officially support TIC 3.0 as a catalog within RegScale with automated tools/wizards for building compliant protection programs. In addition, we have published multiple machine readable formats of TIC 3.0 including an Excel spreadsheet, raw JSON, and NIST OSCAL that available upon request. These artifacts are freely available for others to reuse in their compliance automation programs using machine readable formats.

Schedule a free demo today to learn how RegScale can help you continuously meet your TIC 3.0 protection requirements. If you are ready to start automating your compliance processes for creating and managing TIC security controls, this demo will also show you how you can leverage RegScale to deliver continuous compliance. In addition to offering free tools, we have experienced cyber professionals who can assist you in creating robust TIC 3.0 compliance artifacts that will help you pass security audits with ease. With RegScale, our customers get software with a service to provide a concierge like experience for achieving cloud security compliance.

Ready to get started?

Choose the path that is right for you! 

Skip the line

My organization doesn’t have GRC tools yet and I am ready to start automating my compliance with continuous monitoring pipelines now. 


My organization already has legacy compliance software, but I want to automate many of the manual processes that feed it.