PRESENTED BY: Jim Goepel, Phantom CyberNow that we have a good visual of our system and the components that store, process, transmit, and secure CUI, the next step is to assign the different components to appropriate CMMC categories. In this session, we will discuss different physical and logical separation techniques that can be used to help make assets “out of scope” and why that is advantageous. We will also look at some tools that are available to create “enclaves” and the use cases where enclaves work, when they won’t, and the business-level considerations that ultimately go along with the decision whether to create an enclave or not.