<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WFH Fail - Organizations Allow VPN Split Tunneling in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35654#M2678</link>
    <description>&lt;P&gt;Recently had the exact same conversation with C-suite - not interested in stirring the hornet's nest during the current crisis.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, implemented a new sort of split tunnel based on route at source. All our cloud apps are now routed over VPN and then internet, allowing all other traffic to go out locally. It's not perfect, at all, but it's a better middle ground to build from.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fun times.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2020 09:26:25 GMT</pubDate>
    <dc:creator>HTCPCP-TEA</dc:creator>
    <dc:date>2020-05-14T09:26:25Z</dc:date>
    <item>
      <title>WFH Epic Fail: VPN Split Tunneling</title>
      <link>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35642#M2674</link>
      <description>&lt;P&gt;Think your communications are safe? What about that connection to your corporate application? Many corporate VPNs simply allow sensitive data to shuffle across the Internet. How? They allow split tunneling (previous discussion is &lt;A href="https://community.isc2.org/t5/Industry-News/VPN-Split-tunnel-pros-and-cons-especially-for-high-bandwidth/td-p/5471" target="_blank" rel="noopener"&gt;here&lt;/A&gt;). IT loves to offload as much traffic as they can onto the Internet. In this new era of WHF don't you think you should be reviewing your VPN traffic and shaping policies? Buckle up or loose your data.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 02:06:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35642#M2674</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-05-15T02:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: WFH Fail - Organizations Allow VPN Split Tunneling</title>
      <link>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35644#M2675</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Think your communications are safe? What about that connection to your corporate application? Many corporate VPNs simply allow sensitive data to shuffle across the Internet. How? They allow split tunneling (previous discussion is &lt;A href="https://community.isc2.org/t5/Industry-News/VPN-Split-tunnel-pros-and-cons-especially-for-high-bandwidth/td-p/5471" target="_blank" rel="noopener"&gt;here&lt;/A&gt;). IT loves to offload as much traffic as they can onto the Internet. In this new era of WHF don't you think you should be reviewing your VPN traffic and shaping policies? Buckle up or loose your data.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;EM&gt;"But if I don't have split tunnel how can I send my office report to my printer at home?"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That was the basic complaint years ago when colleagues on WFH days learned of that limitation. IT chiefs2 ,CIOs and CISOs should hold firm on the rule of no split tunnels, and point out those folks can work just fine without paper copies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 03:12:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35644#M2675</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-05-14T03:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: WFH Fail - Organizations Allow VPN Split Tunneling</title>
      <link>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35647#M2676</link>
      <description>&lt;P&gt;Amen.&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 03:54:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35647#M2676</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2020-05-14T03:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: WFH Fail - Organizations Allow VPN Split Tunneling</title>
      <link>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35654#M2678</link>
      <description>&lt;P&gt;Recently had the exact same conversation with C-suite - not interested in stirring the hornet's nest during the current crisis.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, implemented a new sort of split tunnel based on route at source. All our cloud apps are now routed over VPN and then internet, allowing all other traffic to go out locally. It's not perfect, at all, but it's a better middle ground to build from.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fun times.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 09:26:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35654#M2678</guid>
      <dc:creator>HTCPCP-TEA</dc:creator>
      <dc:date>2020-05-14T09:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: WFH Fail - Organizations Allow VPN Split Tunneling</title>
      <link>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35669#M2679</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;HR /&gt;&lt;EM&gt;"But if I don't have split tunnel how can I send my office report to my printer at home?"&lt;/EM&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Or, allow split tunnelling to 192.168.0.0/16.&amp;nbsp; Fixes local printers while still intercepting the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security is more about finding a balance everyone can accept than just enforcing "best practices".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 15:34:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35669#M2679</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-05-14T15:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: WFH Fail - Organizations Allow VPN Split Tunneling</title>
      <link>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35714#M2684</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But there are alternatives to Split tunneling.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just ensure you have a printer, which accepts Bluetooth or WiFI connection from the Work Desktop locally?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are in control of the printer i.e. it is almost beside you, it is part of your own local network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The alternatives are filtering, egress monitoring, all of which are overheads, which the organisation may not implement but actually put the emphasis on the individual abiding by the corporate regulations, Acceptable Use Policy or similar.&amp;nbsp;&amp;nbsp; Or in fact monitor discretely via usage of remote agents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2020 03:17:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/WFH-Epic-Fail-VPN-Split-Tunneling/m-p/35714#M2684</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-05-16T03:17:13Z</dc:date>
    </item>
  </channel>
</rss>

