The Trusted Internet Connections (TIC) initiative was introduced to improve security in government by limiting the number of individual external network connections to the internet. With different connections for each agency or department it is nearly impossible to monitor and secure each connection.
Implementing TIC requires the creation of specific ingress and egress points that allow the opportunity to create secure connections. With the proliferation of data storage in the cloud, government agencies and departments have far less monitoring control than they did in simpler times. While the goal of the TIC program is to limit the number of internet connections, cloud computing relies on leveraging numerous internet access points for efficiency and speed.
A solution is to work with a cloud service provider to replicate TIC infrastructure in the cloud, implementing monitoring services to track who is accessing data and applications and from where.
Summarized from nexgov.com