NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-7(7)Split Tunneling for Remote Devices

Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using {{ insert: param, sc-07.07_odp }}.

CMMC Practice Mapping

NIST 800-171 Mapping

Related Controls

No related controls listed

Supplemental Guidance

Split tunneling is the process of allowing a remote user or device to establish a non-remote connection with a system and simultaneously communicate via some other connection to a resource in an external network. This method of network access enables a user to access remote devices and simultaneously, access uncontrolled networks. Split tunneling might be desirable by remote users to communicate with local system resources, such as printers or file servers. However, split tunneling can facilitate unauthorized external connections, making the system vulnerable to attack and to exfiltration of organizational information. Split tunneling can be prevented by disabling configuration settings that allow such capability in remote devices and by preventing those configuration settings from being configurable by users. Prevention can also be achieved by the detection of split tunneling (or of configuration settings that allow split tunneling) in the remote device, and by prohibiting the connection if the remote device is using split tunneling. A virtual private network (VPN) can be used to securely provision a split tunnel. A securely provisioned VPN includes locking connectivity to exclusive, managed, and named environments, or to a specific set of pre-approved addresses, without user control.

Practitioner Notes

Split tunneling on VPN allows remote workers to access the internet directly while also connected to your corporate network. This creates a bypass around your perimeter security. This control says to prevent or restrict it.

Example 1: Configure your VPN (Cisco AnyConnect, GlobalProtect) to force full-tunnel mode. All traffic from the remote device routes through your corporate firewall and web proxy — no direct internet access. This ensures the same security filtering applies whether the user is in the office or remote.

Example 2: If full-tunnel creates performance problems, use Microsoft 365 split-tunnel exceptions only for trusted M365 endpoints (as Microsoft recommends) while routing all other traffic through the corporate tunnel. Document this decision and ensure your endpoint protection still monitors direct connections.