Peak InfoSec – 3.13.7 and Split Tunneling

Peak InfoSec - 3.13.7 and Split Tunneling

In this “As the CMMC Churns” they take a look at the keywords (e.g., remote devices, simultaneous, non-remote connections, et al) and describe how the requirement, when implemented operates as intended.