Upon examining a contractor's security and awareness training policy for compliance with AT.L2-3.2.2 – Role-Based Training, you determine that they offer their employees training on handling CUI securely. However, system auditors, system administrators, penetration testers, and other cybersecurity roles are all provided biannual training on CUI handling and cybersecurity best practices. How would you assess the contractor's implementation of CMMC practice AT.L2-3.2.2 – Role-Based Training?
Submit