<?xml version="1.0" encoding="UTF-8"?>
<PerformancePlanOrReport xmlns="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

 xsi:schemaLocation="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport http://stratml.us/references/PerformancePlanOrReport20160216.xsd" Type="Strategic_Plan"><Name>Trusted Internet Connections 3.0 -- Vol. 3: Policy Enforcement Point Capabilities</Name><Description>Policy Enforcement Point (PEP) Capabilities are network-level capabilities that inform technical
implementation for relevant use cases. PEP Capabilities are divided into eight groups and fulfilled by
applications, devices, or services identified in TIC Use Cases and TIC Overlays. The eight PEP capability
groups correspond to the following security functions:
• Files,
• Email,
• Web,
• Networking,
• Resiliency,
• DNS,
• Intrusion Detection, and
• Enterprise.</Description><OtherInformation>The PEP capability groups listing is not exhaustive. Additional groups may be developed to reflect new
use cases. The following tables provide: (1) a list of PEP capabilities, (2) a description of each capability,
and (3) a mapping to relevant NIST CSF categories. </OtherInformation><StrategicPlanCore><Organization><Name>Cybersecurity and Infrastructure Security Agency</Name><Acronym>CISA</Acronym><Identifier>_b6ee542c-9a4e-11ea-824e-10e01783ea00</Identifier><Description>Cybersecurity Division</Description><Stakeholder><Name/><Description/></Stakeholder></Organization><Vision><Description/><Identifier>_9d97ab60-9af1-11ea-9f5b-21a3fa82ea00</Identifier></Vision><Mission><Description>To inform technical implementation of network-level capabilities</Description><Identifier>_9d97acbe-9af1-11ea-9f5b-21a3fa82ea00</Identifier></Mission><Value><Name/><Description/></Value><Goal><Name>Files</Name><Description>Secure files</Description><Identifier>_9d97ad7c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Files PEP Security Capabilities</OtherInformation><Objective><Name>Malware</Name><Description>Detect the presence of malicious code and facilitate its quarantine or removal</Description><Identifier>_9d97ae1c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>1.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Anti-Malware -- Anti-malware protections detect the presence of malicious code and facilitate its quarantine or removal.</OtherInformation></Objective><Objective><Name>Disarming &amp; Reconstruction</Name><Description>Detect the presence of unapproved active content and facilitates its removal</Description><Identifier>_9d97aebc-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>1.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Content Disarm &amp; Reconstruction -- Content Disarm &amp; Reconstruction
technology detects the presence of unapproved active content and facilitates its removal.</OtherInformation></Objective><Objective><Name>Detonation</Name><Description>Facilitate the detection of malicious code through the use of protected and isolated execution environments</Description><Identifier>_9d97af5c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>1.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Detonation Chambers -- Detonation Chambers facilitate the detection of malicious code through the use of protected and isolated execution environments to analyze the files</OtherInformation></Objective></Goal><Goal><Name>E-Mail</Name><Description>Secure E-mail</Description><Identifier>_9d97affc-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Email PEP Security Capabilities</OtherInformation><Objective><Name>Phishing</Name><Description>Detect instances of phishing and prevent users from accessing
them</Description><Identifier>_9d97b0ec-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Anti-phishing Protections -- Anti-phishing protections detect instances of
phishing and prevent users from accessing
them.</OtherInformation></Objective><Objective><Name>SPAM</Name><Description>Detect and quarantine SPAM</Description><Identifier>_9d97b1a0-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Anti-SPAM Protections -- Anti-SPAM protections detect and quarantine
instances of SPAM.</OtherInformation></Objective><Objective><Name>Authentication</Name><Description>Allow downstream entities to accept an intermediary’s authentication even if the email was changed</Description><Identifier>_9d97b24a-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Authenticated Received Chain -- Authenticated Received Chain allows for an
intermediary, like a mailing list or forwarding service, to sign its own authentication of the original email, allowing downstream entities to accept the intermediary’s authentication even if the email was changed.</OtherInformation></Objective><Objective><Name>Loss</Name><Description>Detect exfiltration of data</Description><Identifier>_9d97b2ea-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.4</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Data Loss Prevention -- Data Loss Prevention technologies detect
instances of the exfiltration, either malicious or accidental, of agency data</OtherInformation></Objective><Objective><Name>Incoming</Name><Description>Authenticate incoming email</Description><Identifier>_9d97b38a-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.5</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DMARC for Incoming Email -- DMARC protections authenticate incoming
email according to the DMARC email authentication protocol defined in RFC 7489.</OtherInformation></Objective><Objective><Name>Outgoing</Name><Description>Sign emails</Description><Identifier>_9d97b434-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.6</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DMARC for Outgoing Email -- DMARC protections facilitate the
authentication of outgoing email by signing the emails and ensuring that external parties may validate the email signatures. The DMARC email authentication protocol is defined in RFC4789.</OtherInformation></Objective><Objective><Name>Encryption</Name><Description>Configured email services to use encrypted connections</Description><Identifier>_9d97b4de-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.7</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Encryption for Email Transmission -- Email Services are configured to use
encrypted connections, when possible, when interacting with Clients and other Email Servers.</OtherInformation></Objective><Objective><Name>URLs</Name><Description>Detect malicious URLs in emails and prevent users from accessing them</Description><Identifier>_9d97b588-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.8</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Malicious URL Protections -- Malicious URL Protections detect malicious
URLs in emails and prevent users from accessing them.</OtherInformation></Objective><Objective><Name>Click-Throughs</Name><Description>Verify the security of URL destinations before permitting access</Description><Identifier>_9d97b63c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.9</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>URL Click-Through Protection -- URL Click-Through Protections ensures that when a URL from an email is clicked, the requester is directed to a protection that verifies the security of the URL destination before permitting access.</OtherInformation></Objective><Objective><Name>Intrusions</Name><Description>Prevent intrusions</Description><Identifier>_9d97b6e6-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>2.10</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>NCPS E3A Protections -- NCPS E3A is an intrusion prevention capability, provided by DHS, that includes an Email Filtering security service.</OtherInformation></Objective></Goal><Goal><Name>Web</Name><Description>Secure Web access</Description><Identifier>_9d97b79a-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Web PEP Security Capabilities</OtherInformation><Objective><Name>Break &amp; Inspect</Name><Description>Terminate encrypted traffic, inspect, and re-encrypt it</Description><Identifier>_9d97b858-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Break and Inspect -- Break-and-Inspect systems terminate encrypted traffic, logging or performing policy enforcement against the plaintext, and re-encrypting the traffic, if applicable, before transmitting to the final destination.</OtherInformation></Objective><Objective><Name>Active Content</Name><Description>Detect and facilitate removal of unapproved active content</Description><Identifier>_9d97b90c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Active Content Mitigation -- Active Content Mitigation protections detect
the presence of unapproved active content and facilitate its removal.</OtherInformation></Objective><Objective><Name>Blacklisting</Name><Description>Prevent communication with entities using bad certificates</Description><Identifier>_9d97b9c0-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Certificate Blacklisting -- Certificate Blacklisting protections prevent communication with entities that use a set of known bad certificates.</OtherInformation></Objective><Objective><Name>Certificates</Name><Description>Prevent use of inconsistent credentials</Description><Identifier>_9d97ba7e-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.4</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Certificate Consensus -- Certificate Consensus provides a comparison of all observed certificates in use for consistency and preventing use of inconsistent credentials.</OtherInformation></Objective><Objective><Name>Unapproved Content</Name><Description>Detect and facilitate removal of unapproved content</Description><Identifier>_9d97bb3c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.5</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Content Filtering -- Content Filtering protections detect the presence of unapproved content and facilitate its removal.</OtherInformation></Objective><Objective><Name>Authentication</Name><Description>Require entities to authenticate with the proxy</Description><Identifier>_9d97bbfa-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.6</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Authenticated Proxy -- Authenticated Proxies require entities to authenticate with the proxy before making use of it, enabling user, group, and location-aware security controls.</OtherInformation></Objective><Objective><Name>Data Loss</Name><Description>Detect instances of the exfiltration</Description><Identifier>_9d97bcb8-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.7</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Data Loss Prevention -- Data Loss Prevention technologies detect instances of the exfiltration, either malicious or accidental, of agency data.</OtherInformation></Objective><Objective><Name>DNS-over-HTTPS</Name><Description>Prevent usage of the DNS-over-HTTPS protocol</Description><Identifier>_9d97bd80-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.8</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DNS-over-HTTPS -- Filtering DNS-over-HTTPS filtering prevents entities from using the DNS-over-HTTPS protocol, possibly evading DNS-based protections. </OtherInformation></Objective><Objective><Name>Enforcement</Name><Description>Ensure that traffic complies with protocol definitions</Description><Identifier>_9d97be3e-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.9</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>RFC Compliance Enforcement -- RFC Compliant Enforcement technologies
ensure that traffic complies with protocol definitions.</OtherInformation></Objective><Objective><Name>Filtering</Name><Description>[Establish] different security protections for classes of domains</Description><Identifier>_9d97bf06-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.10</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Domain Category Filtering -- Domain Category Filtering technologies allow for classes of domains (e.g. banking, medical) to receive a different set of security protections.</OtherInformation></Objective><Objective><Name>Reputation</Name><Description>Blacklist domains based on reputation</Description><Identifier>_9d97bfce-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.11</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Domain Reputation Filter -- Domain Reputation Filtering protections are
a form of Domain Blacklisting based on a domain’s reputation, as defined by either the agency or an external entity.</OtherInformation></Objective><Objective><Name>Bandwidth</Name><Description>Limit the amount of bandwidth used by different classes of domains</Description><Identifier>_9d97c096-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.12</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Bandwidth Control -- Bandwidth Control technologies allow for limiting the amount of bandwidth used by different classes of domains.</OtherInformation></Objective><Objective><Name>Filtering</Name><Description>Detect and facilitate removal of malicious content</Description><Identifier>_9d97c15e-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.13</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Malicious Content Filtering -- Malicious Content Filtering protections
detect the presence of malicious content and facilitate its removal.</OtherInformation></Objective><Objective><Name>Access</Name><Description>Define policies concerning what entities may perform</Description><Identifier>_9d97c230-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>3.14</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Access Control -- Access Control technologies allow an agency to define policies concerning what entities may perform.</OtherInformation></Objective></Goal><Goal><Name>Networks</Name><Description>Secure networks</Description><Identifier>_9d97c302-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>4</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Networking PEP Security Capabilities</OtherInformation><Objective><Name>Access</Name><Description>Prevent the ingest or transiting of unauthorized network traffic</Description><Identifier>_9d97c4d8-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>4.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Network Access Controls -- Network Access Control protections prevent
the ingest or transiting of unauthorized network traffic.</OtherInformation></Objective><Objective><Name>Blacklisting</Name><Description>Prevent the ingest or transiting of traffic received from or destined to a blacklisted IP address</Description><Identifier>_9d97c5c8-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>4.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>IP Blacklisting -- IP Blacklisting protections prevent the ingest or transiting of traffic received from or destined to a blacklisted IP address.</OtherInformation></Objective><Objective><Name>Containment</Name><Description>Enable revocation of hosts' access to networks</Description><Identifier>_9d97c6a4-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>4.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Host Containment -- Host Containment protections enable a network to revoke a host’s access to the network.</OtherInformation></Objective><Objective><Name>Segmentation</Name><Description>Separate networks into subnetworks</Description><Identifier>_9d97c7d0-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>4.4</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Network Segmentation -- Network Segmentation separates a given network into subnetworks, facilitating security controls between the subnetworks,
and decreasing the attack surface of the network.</OtherInformation></Objective><Objective><Name>Microsegmentation</Name><Description>Divide networks according to the communication needs of application and data workflows</Description><Identifier>_9d97c8b6-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>4.5</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Microsegmentation -- Microsegmentation divides the network, either physically or virtually, according to the communication needs of application and data workflows, facilitating security controls to protect the data.</OtherInformation></Objective></Goal><Goal><Name>Resiliency</Name><Description/><Identifier>_9d97c992-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>5</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Resiliency PEP Security Capabilities</OtherInformation><Objective><Name>DDoS</Name><Description>Mitigate the effects of distributed denial of service attacks</Description><Identifier>_9d97ca78-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>5.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DDoS Protections -- DDoS protections mitigate the effects of distributed denial of service attacks.</OtherInformation></Objective><Objective><Name>Expansion</Name><Description>Dynamically expand the resources available for services as conditions require</Description><Identifier>_9d97cc80-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>5.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Elastic Expansion -- Elastic expansion enables agencies to dynamically expand the resources available for services as conditions require.</OtherInformation></Objective><Objective><Name/><Description/><Identifier>_9d97cde8-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator/><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>5.3 Regional Delivery -- Regional Delivery technologies enable the deployment of agency services across geographically diverse locations.</OtherInformation></Objective></Goal><Goal><Name>DNS</Name><Description/><Identifier>_9d97cf5a-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>6</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DNS PEP Security Capabilities</OtherInformation><Objective><Name>Blackholing</Name><Description>Protect clients from accessing malicious domains</Description><Identifier>_9d97d0b8-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>6.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DNS Blackholing -- DNS Blackholing protections are a form of blacklisting that protect clients from accessing malicious domains by responding to DNS queries for those domains.</OtherInformation></Objective><Objective><Name>Domain Validation</Name><Description>Ensure that domain name lookups from agency clients validated</Description><Identifier>_9d97d20c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>6.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DNSSEC for Agency Clients -- DNSSEC protections ensure that domain
name lookups from agency clients, whether for internal or external domains, are
validated.</OtherInformation></Objective><Objective><Name>Agency Domains</Name><Description>Ensure that agency domain names are secured</Description><Identifier>_9d97d388-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>6.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DNSSEC for Agency Domains -- DNSSEC protections ensure that all agency domain names are secured using DNSSEC, enabling external entities to validate their resolution the domain names.</OtherInformation></Objective></Goal><Goal><Name>Intrusions</Name><Description/><Identifier>_9d97d4fa-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>7</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Intrusion Detection PEP Security Capabilities</OtherInformation><Objective><Name>Endpoints</Name><Description>Combine endpoint and network event data to aid in the detection of malicious activity</Description><Identifier>_9d97d66c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>7.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Endpoint Detection and Response -- Endpoint Detection and Response tools
combine endpoint and network event data to aid in the detection of malicious activity.</OtherInformation></Objective><Objective><Name>Malicious Activity</Name><Description>Detect malicious activity, attempt to stop the activity, and report the activity</Description><Identifier>_9d97d7fc-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>7.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Intrusion Protection Systems (IPS) -- Intrusion Protection Systems detect malicious activity, attempt to stop the activity, and report the activity.</OtherInformation></Objective><Objective><Name>Access</Name><Description>Evaluate access control decisions</Description><Identifier>_9d97d90a-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>7.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Adaptive Access Control -- Adaptive Access Control technologies factor
in additional context, like security risk, operational needs, and other heuristics, when evaluating access control decisions.</OtherInformation></Objective><Objective><Name>Deceptions</Name><Description>Deflect attacks away from the operational systems</Description><Identifier>_9d97da04-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>7.4</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Deception Platforms -- Deception Platform technologies provide decoy environments, from individual machines to entire networks, that can be used to deflect attacks away from the operational systems supporting agency missions/business functions.</OtherInformation></Objective><Objective><Name>Log Monitoring</Name><Description>Discover when new certificates are issued for agency domains</Description><Identifier>_9d97db12-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>7.5</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Certificate Transparency Log Monitoring -- Certificate Transparency Log Monitoring allows agencies to discover when new certificates are issued for agency domains. </OtherInformation></Objective></Goal><Goal><Name>Enterprises</Name><Description/><Identifier>_9d97dc0c-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>8</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Enterprise PEP Security Capabilities</OtherInformation><Objective><Name>SOAR</Name><Description>Define, prioritize and automate the response to security incidents</Description><Identifier>_9d97dd06-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>8.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Security Orchestration, Automation, and Response (SOAR) -- Security Orchestration, Automation and Response tools define, prioritize and automate the response to security incidents.</OtherInformation></Objective><Objective><Name>Shadow IT</Name><Description>Detect the presence of unauthorized software and systems</Description><Identifier>_9d97de14-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>8.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Shadow IT Detection -- Shadow IT Detection systems detect the presence of unauthorized software and systems in use by an agency.</OtherInformation></Objective><Objective><Name>VPN</Name><Description>Provide a secure communications mechanism between networks</Description><Identifier>_9d97df18-9af1-11ea-9f5b-21a3fa82ea00</Identifier><SequenceIndicator>8.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>VPN -- Virtual Private Network solutions provide a secure communications mechanism between networks that may traverse across unprotected or public networks.</OtherInformation></Objective></Goal></StrategicPlanCore><AdministrativeInformation><StartDate>2019-12-31</StartDate><EndDate>2020-01-31</EndDate><PublicationDate>2020-05-20</PublicationDate><Source>https://www.cisa.gov/sites/default/files/publications/Draft%20TIC%203.0%20Vol.%203%20Security%20Capabilities%20Handbook.pdf</Source><Submitter><GivenName>Owen</GivenName><Surname>Ambur</Surname><PhoneNumber/><EmailAddress>Owen.Ambur@verizon.net</EmailAddress></Submitter></AdministrativeInformation></PerformancePlanOrReport>