Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

CISA Opens IPv6 Guidance to Public Feedback

The United States Cybersecurity and Infrastructure Security Agency (CISA) on Thursday announced that it’s asking for public feedback on new IPv6 guidance for federal agencies.

The United States Cybersecurity and Infrastructure Security Agency (CISA) on Thursday announced that it’s asking for public feedback on new IPv6 guidance for federal agencies.

Named IPv6 Considerations for TIC 3.0, the document was issued in line with Office of Management and Budget (OMB) Memorandum 21-07, which mandates CISA to enhance the Trusted Internet Connections (TIC) program to ensure Internet Protocol version 6 (IPv6) is implemented within federal IT systems.

The new IPv6 guidance is meant to provide information on IPv6 itself, to inform agencies of their responsibilities in regard to OMB M-21-07, to share security considerations regarding the protocol and the TIC 3.0 security capabilities, and to raise awareness on IPv6 security features.

“This document is intended to be architecture-agnostic and broadly supports the government-wide deployment and use of the IPv6 network protocol,” CISA explains.

Starting September 23, the document is open for public comment, and will remain so until October 15.

CISA encourages agencies, industry experts, and academic researchers to provide feedback on the document to “help support the successful deployment of IPv6 across federal information technology (IT) systems.”

Specifically, CISA seeks to learn whether there are other TIC 3.0 IPv6 considerations or security challenges that it should take into account, and what other TIC 3.0 IPv6 guidance agencies would be interested in receiving from CISA.

“CISA encourages IT decision-makers and administrators in all federal government agencies and organizations to review IPv6 Considerations for TIC 3.0 to facilitate advancing IPv6 networks and ensuring future growth and innovation in internet services and technology,” CISA notes.

Advertisement. Scroll to continue reading.

Those interested in submitting feedback can do so via email, at tic(at)cisa.dhs.gov. After reviewing the comments, CISA will produce the final version of the guidance.

Related: CISA, Microsoft Issue Guidance on Recent Azure Cosmos DB Vulnerability

Related: CISA Details Additional Malware Targeting Pulse Secure Appliances

Related: CISA Details Malware Used in Attacks Targeting Pulse Secure Devices

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.