Voice Video Endpoint Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V2R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 62 rules matched cleanly.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-NET-000015-VVEP-00013
- Vuln IDs
-
- V-206746
- V-67985
- Rule IDs
-
- SV-206746r604140_rule
- SV-82475
Checks: C-7002r363761_chk
Verify the Voice Video Endpoint registers with a Voice Video Session Manager. If the Voice Video Endpoint does not registers with a Voice Video Session Manager, this is a finding.
Fix: F-7002r363762_fix
Configure the Voice Video Endpoint to register with a Voice Video Session Manager.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-NET-000015-VVEP-00019
- Vuln IDs
-
- V-206747
- V-66717
- Rule IDs
-
- SV-206747r604140_rule
- SV-81207
Checks: C-7003r363764_chk
Verify the Voice Video Endpoint dynamically implements configuration file changes. If the Voice Video Endpoint does not dynamically implement configuration file changes, this is a finding.
Fix: F-7003r363765_fix
Configure the Voice Video Endpoint to dynamically implement configuration file changes.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-NET-000041-VVEP-00020
- Vuln IDs
-
- V-206748
- V-66719
- Rule IDs
-
- SV-206748r604140_rule
- SV-81209
Checks: C-7004r363767_chk
If the Voice Video Endpoint is a hardware endpoint, this is Not Applicable. If the Voice Video Endpoint is a Unified Capabilities (UC) or Video Conferencing (VC) software client, verify the Voice Video Endpoint displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the network. If the Voice Video Endpoint does not display the Standard Mandatory DoD Notice and Consent Banner before granting access to the network, this is a finding.
Fix: F-7004r363768_fix
Configure the Unified Capabilities (UC) or Video Conferencing (VC) software client Voice Video Endpoint to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the network.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-NET-000042-VVEP-00021
- Vuln IDs
-
- V-206750
- V-66725
- Rule IDs
-
- SV-206750r604140_rule
- SV-81215
Checks: C-7006r363773_chk
If the Voice Video Endpoint is a hardware endpoint, this is Not Applicable. If the Voice Video Endpoint is a Unified Capabilities (UC) or Video Conferencing (VC) software client, verify the Voice Video Endpoint retains the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. If the Voice Video Endpoint does not retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users take explicit actions to log on for further access, this is a finding.
Fix: F-7006r363774_fix
Configure the Unified Capabilities (UC) or Video Conferencing (VC) software client Voice Video Endpoint to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-NET-000053-VVEP-00009
- Vuln IDs
-
- V-206751
- V-66699
- Rule IDs
-
- SV-206751r604140_rule
- SV-81189
Checks: C-7007r363776_chk
Verify the Voice Video Endpoint limits the number of concurrent sessions to two users. Local policy may justify and increase the limit on concurrent user sessions to a number higher than two. If the Voice Video Endpoint does not limit the number of concurrent sessions to two users, or the limit set by local policy, this is a finding.
Fix: F-7007r363777_fix
Configure the Voice Video Endpoint to limit the number of concurrent sessions to two users or the limit set by local policy.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000057-VVEP-00012
- Vuln IDs
-
- V-206752
- V-66705
- Rule IDs
-
- SV-206752r604140_rule
- SV-81195
Checks: C-7008r363779_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint PC port maintains VLAN separation from the voice video VLAN or is disabled. For networks with both VoIP and videoconferencing, best practice is to have a separate voice VLAN and video VLAN. If the hardware Voice Video Endpoint PC port is disabled, this is not a finding. If the hardware Voice Video Endpoint PC port does not maintain VLAN separation from the voice video VLAN, this is a finding.
Fix: F-7008r363780_fix
Configure the hardware Voice Video Endpoint PC port to maintain VLAN separation from the voice video VLAN or be disabled.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-VVEP-00022
- Vuln IDs
-
- V-206753
- V-66727
- Rule IDs
-
- SV-206753r604140_rule
- SV-81217
Checks: C-7009r363782_chk
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing what type of connection occurred. The record must include the session type (voice/direct, voice/conference, video/direct, video/conference, etc.), the specific protocols used for control and media traffic (SIP/SRTP, H.323, etc.), and the type of endpoint (mobile, telephone, codec, etc.). If the Voice Video Endpoint does not produce session records containing what type of connection occurred, this is a finding.
Fix: F-7009r363783_fix
Configure the Voice Video Endpoint to produce session records containing what type of connection occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-VVEP-00023
- Vuln IDs
-
- V-206754
- V-66729
- Rule IDs
-
- SV-206754r604140_rule
- SV-81219
Checks: C-7010r363785_chk
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing when the connection occurred. The record must include session start/join/leave/stop times. If the Voice Video Endpoint does not produce session records containing the date and time when the connection occurred, this is a finding.
Fix: F-7010r363786_fix
Configure the Voice Video Endpoint to produce session records containing the date and time when the connection occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-VVEP-00024
- Vuln IDs
-
- V-206755
- V-66731
- Rule IDs
-
- SV-206755r604140_rule
- SV-81221
Checks: C-7011r363788_chk
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing where the connection occurred. The record must include IP addresses and port numbers. If the Voice Video Endpoint does not produce session records containing where the connection occurred, this is a finding.
Fix: F-7011r363789_fix
Configure the Voice Video Endpoint to produce session records containing where the connection occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-VVEP-00025
- Vuln IDs
-
- V-206756
- V-66733
- Rule IDs
-
- SV-206756r604140_rule
- SV-81223
Checks: C-7012r363791_chk
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing the outcome of the connection. Outcomes of the connection would include call completed, conference completed, destination busy, network busy, etc. If the Voice Video Endpoint does not produce session records containing the outcome of the connection, this is a finding.
Fix: F-7012r363792_fix
Configure the Voice Video Endpoint to produce session records containing the outcome of the connection.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-VVEP-00026
- Vuln IDs
-
- V-206757
- V-66735
- Rule IDs
-
- SV-206757r604140_rule
- SV-81225
Checks: C-7013r363794_chk
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing the identity of all users on the call. If the Voice Video Endpoint does not produce session records containing the identity of all users on the call, this is a finding.
Fix: F-7013r363795_fix
Configure the Voice Video Endpoint to produce session records containing the identity of all users on the call.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-NET-000113-VVEP-00027
- Vuln IDs
-
- V-206758
- V-66737
- Rule IDs
-
- SV-206758r604140_rule
- SV-81227
Checks: C-7014r363797_chk
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint provides session record generation capability. If the Voice Video Endpoint does not provide session record generation capability, this is a finding.
Fix: F-7014r363798_fix
Configure the Voice Video Endpoint to provide session record generation capability.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-VVEP-00056
- Vuln IDs
-
- V-206759
- V-66793
- Rule IDs
-
- SV-206759r604140_rule
- SV-81283
Checks: C-7015r363800_chk
Verify the Voice Video Endpoint is configured to disable or remove non-essential capabilities. Non-essential capabilities would include peer services and other functions not directly pertaining to Voice Video Endpoint functionality. If the Voice Video Endpoint cannot be configured to disable or remove non-essential capabilities, this is a finding.
Fix: F-7015r363801_fix
Configure the Voice Video Endpoint to disable or remove non-essential capabilities.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VVEP-00059
- Vuln IDs
-
- V-206760
- V-66799
- Rule IDs
-
- SV-206760r604140_rule
- SV-81289
Checks: C-7016r459019_chk
Verify the Voice Video Endpoint only uses ports, protocols, and services allowed per the PPSM CAL and VAs. If the Voice Video Endpoint uses ports, protocols, and services not allowed per the PPSM CAL and VAs, this is a finding.
Fix: F-7016r459020_fix
Configure the Voice Video Endpoint to only use ports, protocols, and services allowed per the PPSM CAL and VAs.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SRG-NET-000138-VVEP-00029
- Vuln IDs
-
- V-206761
- V-66741
- Rule IDs
-
- SV-206761r604140_rule
- SV-81231
Checks: C-7017r363806_chk
Verify the Voice Video Endpoint used for videoconferencing uniquely identifies participating users. Identification must be visible and displayed locally. If the Voice Video Endpoint used for videoconferencing does not uniquely identify participating users, this is a finding.
Fix: F-7017r363807_fix
Configure the Voice Video Endpoint used for videoconferencing to uniquely identify participating users.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-NET-000140-VVEP-00032
- Vuln IDs
-
- V-206762
- V-66747
- Rule IDs
-
- SV-206762r604140_rule
- SV-81237
Checks: C-7018r588382_chk
If the Voice Video Endpoint is a hardware endpoint, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for videoconferencing uses multifactor authentication for network access. If the Voice Video Endpoint used for videoconferencing does not use multifactor authentication for network access, this is a finding.
Fix: F-7018r363810_fix
Configure the Voice Video Endpoint used for videoconferencing to use multifactor authentication for network access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- SRG-NET-000147-VVEP-00015
- Vuln IDs
-
- V-206763
- V-66709
- Rule IDs
-
- SV-206763r604140_rule
- SV-81199
Checks: C-7019r363812_chk
Verify the Voice Video Endpoint implements replay-resistant authentication mechanisms for network access. If the Voice Video Endpoint does not implement replay-resistant authentication mechanisms for network access, this is a finding.
Fix: F-7019r363813_fix
Configure the Voice Video Endpoint to implement replay-resistant authentication mechanisms for network access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- SRG-NET-000147-VVEP-00016
- Vuln IDs
-
- V-206764
- V-66711
- Rule IDs
-
- SV-206764r604140_rule
- SV-81201
Checks: C-7020r363815_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint using SIP or AS-SIP signaling prevents cross-site scripting attacks caused by improper filtering or validation of the content of SIP invitation fields. If the hardware Voice Video Endpoint does not use SIP or AS-SIP, this is not a finding. If the hardware Voice Video Endpoint does not prevent cross-site scripting attacks caused by improper filtering or validation of the content of SIP invitation fields, this is a finding.
Fix: F-7020r363816_fix
Configure the hardware Voice Video Endpoint using SIP or AS-SIP signaling to prevent cross-site scripting attacks caused by improper filtering or validation of the content of SIP invitation fields.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-NET-000164-VVEP-00035
- Vuln IDs
-
- V-206765
- V-66753
- Rule IDs
-
- SV-206765r604140_rule
- SV-81243
Checks: C-7021r363818_chk
Verify the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, validates certificates by constructing a certification path to an accepted trust anchor. The constructed certification path must include status information. If the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, does not validate certificates by constructing a certification path that includes status information to an accepted trust anchor, this is a finding.
Fix: F-7021r363819_fix
Configure the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, to validate certificates by constructing a certification path, including status information, to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- SRG-NET-000165-VVEP-00034
- Vuln IDs
-
- V-206766
- V-66751
- Rule IDs
-
- SV-206766r604140_rule
- SV-81241
Checks: C-7022r363821_chk
Verify the Voice Video Endpoint, when using PKI-based authentication, enforces authorized access only to the corresponding private key. If the Voice Video Endpoint, when using PKI-based authentication, does not enforce authorized access to the corresponding private key, this is a finding.
Fix: F-7022r363822_fix
Configure the Voice Video Endpoint, when using PKI-based authentication, to enforce authorized access to the corresponding private key.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-NET-000190-VVEP-00044
- Vuln IDs
-
- V-206767
- V-66769
- Rule IDs
-
- SV-206767r604140_rule
- SV-81259
Checks: C-7023r363824_chk
Verify the Voice Video Endpoint prevents unauthorized and unintended information transfer via shared system resources. If the Voice Video Endpoint does not prevent unauthorized and unintended information transfer via shared system resources, this is a finding.
Fix: F-7023r363825_fix
Configure the Voice Video Endpoint to prevent unauthorized and unintended information transfer via shared system resources.
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- SRG-NET-000213-VVEP-00028
- Vuln IDs
-
- V-206768
- V-66739
- Rule IDs
-
- SV-206768r604140_rule
- SV-81229
Checks: C-7024r363827_chk
Verify the Voice Video Endpoint terminates all network connections associated with a communications session at the end of the session. If the Voice Video Endpoint does not terminate all network connections associated with a communications session at the end of the session, this is a finding.
Fix: F-7024r363828_fix
Configure the Voice Video Endpoint to terminate all network connections associated with a communications session at the end of the session.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-VVEP-00043
- Vuln IDs
-
- V-206769
- V-66767
- Rule IDs
-
- SV-206769r604140_rule
- SV-81257
Checks: C-7025r363830_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify that in the event of device failure, the hardware Voice Video Endpoint preserves any information necessary to determine cause of failure and return to operations with least disruption to service. If the hardware Voice Video Endpoint does not preserve any information necessary to determine cause of failure, this is a finding. If the hardware Voice Video Endpoint does not return to operations with least disruption to service after device failure, this is a finding.
Fix: F-7025r363831_fix
Configure the hardware Voice Video Endpoint, in the event of device failure, to preserve any information necessary to determine cause of failure. Also configure the hardware Voice Video Endpoint to return to operations with least disruption to service.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-NET-000311-VVEP-00062
- Vuln IDs
-
- V-206770
- V-77281
- Rule IDs
-
- SV-206770r604140_rule
- SV-91977
Checks: C-7026r363833_chk
If the Voice Video Endpoint is a soft client, this is Not Applicable. If the Voice Video Endpoint does not process classified calls, this is Not Applicable. Verify the Voice Video Endpoint processing classified calls is properly marked with the highest security level of the information being processed. If the Voice Video Endpoint processing classified calls is not properly marked with the highest security level of the information being processed, this is a finding.
Fix: F-7026r363834_fix
Properly mark the Voice Video Endpoint processing classified calls with the highest security level of the information being processed.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-NET-000311-VVEP-00063
- Vuln IDs
-
- V-206771
- V-77283
- Rule IDs
-
- SV-206771r604140_rule
- SV-91979
Checks: C-7027r363836_chk
If the Voice Video Endpoint does not process classified calls, this is Not Applicable. Verify the Voice Video Endpoint processing classified calls displays the classification level and SAL for the call or conference in progress. If the Voice Video Endpoint processing classified calls does not display the classification level and SAL for the call or conference in progress, this is a finding.
Fix: F-7027r363837_fix
Configure the Voice Video Endpoint to display the classification level and SAL for the call or conference in progress.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-NET-000341-VVEP-00030
- Vuln IDs
-
- V-206772
- V-66743
- Rule IDs
-
- SV-206772r604140_rule
- SV-81233
Checks: C-7028r363839_chk
If the Voice Video Endpoint is a hardware endpoint, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for videoconferencing accepts a CAC or derived credentials. For hardware endpoints, the devices must use certificates to register with the session manager or multipoint controller. If the Voice Video Endpoint used for videoconferencing does not accept a CAC or derived credentials, this is a finding.
Fix: F-7028r363840_fix
Configure the Voice Video Endpoint used for videoconferencing to accept a CAC or derived credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-NET-000342-VVEP-00031
- Vuln IDs
-
- V-206773
- V-66745
- Rule IDs
-
- SV-206773r604140_rule
- SV-81235
Checks: C-7029r363842_chk
If the Voice Video Endpoint is a hardware endpoint, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for videoconferencing electronically verifies the CAC or derived credentials. For hardware endpoints, the devices must use certificates to register with the session manager or multipoint controller. If the Voice Video Endpoint used for videoconferencing does not electronically verify the CAC or derived credentials, this is a finding.
Fix: F-7029r363843_fix
Configure the Voice Video Endpoint used for videoconferencing to electronically verify the CAC or derived credentials.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- SRG-NET-000345-VVEP-00036
- Vuln IDs
-
- V-206774
- V-66755
- Rule IDs
-
- SV-206774r604140_rule
- SV-81245
Checks: C-7030r363845_chk
Verify the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable. If the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, does not implement a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable, this is a finding.
Fix: F-7030r363846_fix
Configure the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000352-VVEP-00038
- Vuln IDs
-
- V-206775
- V-66759
- Rule IDs
-
- SV-206775r604140_rule
- SV-81249
Checks: C-7031r363848_chk
Verify the Voice Video Endpoint processing classified information over public networks implements NSA-approved cryptography. If the Voice Video Endpoint processing classified information over public networks does not implement NSA-approved cryptography, this is a finding.
Fix: F-7031r363849_fix
Configure the Voice Video Endpoint processing classified information over public networks to implement NSA-approved cryptography.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000353-VVEP-00042
- Vuln IDs
-
- V-206776
- V-66765
- Rule IDs
-
- SV-206776r604140_rule
- SV-81255
Checks: C-7032r363851_chk
Verify the Voice Video Endpoint provides an explicit indication of current participants in all VC-based and IP-based online meetings and conferences. This excludes audio-only teleconferences using traditional telephony. If the Voice Video Endpoint does not provide an explicit indication of current participants in all VC-based and IP-based online meetings and conferences, this is a finding.
Fix: F-7032r363852_fix
Configure the Voice Video Endpoint provides an explicit indication of current participants in all VC-based and IP-based online meetings and conferences.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000366-VVEP-00014
- Vuln IDs
-
- V-206777
- V-66707
- Rule IDs
-
- SV-206777r604140_rule
- SV-81197
Checks: C-7033r363854_chk
If UC and VC clients cannot be independently configured by either end users or external service providers, this is Not Applicable. Verify the Voice Video Endpoint blocks both inbound and outbound communications traffic between UC and VC clients independently configured by end users and external service providers for voice and video. If the Voice Video Endpoint does not block both inbound and outbound communications traffic between UC and VC clients independently configured by end users and external service providers, this is a finding.
Fix: F-7033r363855_fix
Configure the Voice Video Endpoint to block both inbound and outbound communications traffic between UC and VC clients independently configured by end users and external service providers.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-NET-000371-VVEP-00017
- Vuln IDs
-
- V-206778
- V-66713
- Rule IDs
-
- SV-206778r604140_rule
- SV-81203
Checks: C-7034r363857_chk
Verify the Voice Video Endpoint protects the integrity of transmitted configuration files from the Voice Video Session Manager. If the Voice Video Endpoint does not protect the integrity of transmitted configuration files from the Voice Video Session Manager, this is a finding.
Fix: F-7034r363858_fix
Configure the Voice Video Endpoint to protect the integrity of transmitted configuration files from the Voice Video Session Manager.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-NET-000371-VVEP-00018
- Vuln IDs
-
- V-206779
- V-66715
- Rule IDs
-
- SV-206779r604140_rule
- SV-81205
Checks: C-7035r363860_chk
Verify the Voice Video Endpoint protects the confidentiality of transmitted configuration files from the Voice Video Session Manager. If the Voice Video Endpoint does not protect the confidentiality of transmitted configuration files from the Voice Video Session Manager, this is a finding.
Fix: F-7035r363861_fix
Configure the Voice Video Endpoint to protect the confidentiality of transmitted configuration files from the Voice Video Session Manager.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-NET-000371-VVEP-00037
- Vuln IDs
-
- V-206780
- V-66757
- Rule IDs
-
- SV-206780r604140_rule
- SV-81247
Checks: C-7036r363863_chk
Verify the Voice Video Endpoint uses encryption for signaling and media traffic. If the Voice Video Endpoint does not use encryption for signaling and media traffic, this is a finding.
Fix: F-7036r363864_fix
Configure the Voice Video Endpoint to use encryption for signaling and media traffic.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-NET-000400-VVEP-00033
- Vuln IDs
-
- V-206781
- V-66749
- Rule IDs
-
- SV-206781r604140_rule
- SV-81239
Checks: C-7037r363866_chk
Verify the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, cryptographically protects the transmission. If the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, does not cryptographically protect the transmission, this is a finding.
Fix: F-7037r363867_fix
Configure the Voice Video Endpoint, when using passwords or PINs for authentication or authorization, to cryptographically protect the transmission.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000494-VVEP-00061
- Vuln IDs
-
- V-206782
- V-77277
- Rule IDs
-
- SV-206782r604140_rule
- SV-91973
Checks: C-7038r363869_chk
If the Voice Video Endpoint relies exclusively on the Voice Video Session Manager for session records and does not have any capability for generating session records, this check procedure is Not Applicable. Verify the Voice Video Endpoint produces session records containing classification level and SAL. If the Voice Video Endpoint does not produce session records containing classification level and SAL, this is a finding.
Fix: F-7038r363870_fix
Configure the Voice Video Endpoint to produce session records containing classification level and SAL.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VVEP-00039
- Vuln IDs
-
- V-206783
- V-66761
- Rule IDs
-
- SV-206783r604140_rule
- SV-81251
Checks: C-7039r363872_chk
Verify the Voice Video Endpoint processing unclassified information implements NIST FIPS-validated cryptography. If the Voice Video Endpoint processing unclassified information does not implement NIST FIPS-validated cryptography, this is a finding.
Fix: F-7039r363873_fix
Configure the Voice Video Endpoint processing unclassified information to implement NIST FIPS-validated cryptography.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VVEP-00040
- Vuln IDs
-
- V-206784
- V-66803
- Rule IDs
-
- SV-206784r604140_rule
- SV-81293
Checks: C-7040r363875_chk
Verify the Voice Video Endpoint processing unclassified information implements NIST FIPS-validated cryptography to provision digital signatures. If the Voice Video Endpoint processing unclassified information does not implement NIST FIPS-validated cryptography to provision digital signatures, this is a finding.
Fix: F-7040r363876_fix
Configure the Voice Video Endpoint processing unclassified information to implement NIST FIPS-validated cryptography to provision digital signatures.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VVEP-00041
- Vuln IDs
-
- V-206785
- V-66763
- Rule IDs
-
- SV-206785r604140_rule
- SV-81253
Checks: C-7041r363878_chk
Verify the Voice Video Endpoint processing unclassified information implements NIST FIPS-validated cryptography to generate cryptographic hashes. If the Voice Video Endpoint processing unclassified information does not implement NIST FIPS-validated cryptography to generate cryptographic hashes, this is a finding.
Fix: F-7041r363879_fix
Configure the Voice Video Endpoint processing unclassified information to implement NIST FIPS-validated cryptography to generate cryptographic hashes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00001
- Vuln IDs
-
- V-206786
- V-66683
- Rule IDs
-
- SV-206786r604140_rule
- SV-81173
Checks: C-7042r363881_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint integrates into the implemented 802.1x network access control system. If the hardware Voice Video Endpoint does not integrate into the implemented 802.1x network access control system, this is a finding.
Fix: F-7042r363882_fix
Configure the hardware Voice Video Endpoint to integrate into the implemented 802.1x network access control system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00002
- Vuln IDs
-
- V-206787
- V-66685
- Rule IDs
-
- SV-206787r604140_rule
- SV-81175
Checks: C-7043r363884_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. If an 802.1x network access control system is not implemented on the network, this is Not Applicable. Verify the hardware Voice Video Endpoint is an 802.1x supplicant. If the hardware Voice Video Endpoint is not an 802.1x supplicant, this is a finding.
Fix: F-7043r363885_fix
Configure the hardware Voice Video Endpoint to be an 802.1x supplicant in the implemented 802.1x network access control system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00003
- Vuln IDs
-
- V-206788
- V-66687
- Rule IDs
-
- SV-206788r604140_rule
- SV-81177
Checks: C-7044r363887_chk
If the Voice Video Endpoint is not a hardware endpoint with a PC port, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint PC port connects to an 802.1x supplicant or is disabled. If the hardware Voice Video Endpoint PC port is disabled, this is not a finding. If the hardware Voice Video Endpoint PC port is not disabled and is not an 802.1x authenticator, this is a finding.
Fix: F-7044r363888_fix
Configure the hardware Voice Video Endpoint PC port to connect to an 802.1x supplicant in the implemented 802.1x network access control system or be disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00004
- Vuln IDs
-
- V-206789
- V-66689
- Rule IDs
-
- SV-206789r604140_rule
- SV-81179
Checks: C-7045r363890_chk
If the Voice Video Endpoint is not a hardware endpoint with a PC port, this check procedure is Not Applicable. Verify the unused hardware Voice Video Endpoint PC port is disabled. If the unused hardware Voice Video Endpoint PC port is not disabled, this is a finding.
Fix: F-7045r363891_fix
Configure the unused hardware Video Endpoint PC port to be disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00005
- Vuln IDs
-
- V-206790
- V-66691
- Rule IDs
-
- SV-206790r604140_rule
- SV-81181
Checks: C-7046r363893_chk
If the Voice Video Endpoint is not a hardware endpoint with a PC port, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint with a PC port has the switchport configured as single-host or enable 802.1x multi-domain authentication. If the hardware Voice Video Endpoint with a PC port has the switchport configured as single-host, this is not a finding. If the hardware Voice Video Endpoint with a PC port does not have the switchport configured as single-host and does not enable 802.1x multi-domain authentication, this is a finding.
Fix: F-7046r363894_fix
Configure the hardware Voice Video Endpoint with a PC port to have the switchport configured as single-host or enable 802.1x multi-domain authentication.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00006
- Vuln IDs
-
- V-206791
- V-66693
- Rule IDs
-
- SV-206791r604140_rule
- SV-81183
Checks: C-7047r363896_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint not supporting 802.1x is configured to use MAB on the access switchport. If the hardware Voice Video Endpoint not supporting 802.1x is not configured to use MAB on the access switchport, this is a finding.
Fix: F-7047r363897_fix
Configure the hardware Voice Video Endpoint not supporting 802.1x to use MAB on the access switchport.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00045
- Vuln IDs
-
- V-206792
- V-66771
- Rule IDs
-
- SV-206792r604140_rule
- SV-81261
Checks: C-7048r363899_chk
If the Voice Video Endpoint does not support C2 communications, this check procedure is Not Applicable. Verify the Voice Video Endpoint supporting C2 communications implements MLPP dialing to enable Routine, Priority, Immediate, Flash, and Flash Override. If the Voice Video Endpoint supporting C2 communications does not implement MLPP dialing to enable Routine, Priority, Immediate, Flash, and Flash Override, this is a finding. If the MLPP dialing is not configured, this is a finding.
Fix: F-7048r363900_fix
Configure the Voice Video Endpoint supporting C2 communications to implement MLPP dialing to enable Routine, Priority, Immediate, Flash, and Flash Override.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00046
- Vuln IDs
-
- V-206793
- V-66773
- Rule IDs
-
- SV-206793r604140_rule
- SV-81263
Checks: C-7049r363902_chk
If the Voice Video Endpoint does not support C2 communications, this check procedure is Not Applicable. Verify the Voice Video Endpoint supporting C2 communications implements MLPP call disconnect to enable Routine, Priority, Immediate, Flash, and Flash Override. If the Voice Video Endpoint supporting C2 communications does not implement MLPP call disconnect to enable Routine, Priority, Immediate, Flash, and Flash Override, this is a finding. If the MLPP call disconnect is not configured for use, this is a finding.
Fix: F-7049r363903_fix
Configure the Voice Video Endpoint supporting C2 communications to implement MLPP call disconnect to enable Routine, Priority, Immediate, Flash, and Flash Override.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00047
- Vuln IDs
-
- V-206794
- V-66775
- Rule IDs
-
- SV-206794r604140_rule
- SV-81265
Checks: C-7050r363905_chk
If the Voice Video Endpoint does not support C2 communications, this check procedure is Not Applicable. Verify the Voice Video Endpoint supporting C2 communications implements AS-SIP. If the Voice Video Endpoint supporting C2 communications does not implement AS-SIP, this is a finding. If AS-SIP is not configured for use, this is a finding.
Fix: F-7050r363906_fix
Configure the Voice Video Endpoint supporting C2 communications to implement AS-SIP.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00048
- Vuln IDs
-
- V-206795
- V-66777
- Rule IDs
-
- SV-206795r604140_rule
- SV-81267
Checks: C-7051r363908_chk
If the unclassified Voice Video Endpoint is not deployed where sensitive or classified information is discussed, this check procedure is Not Applicable. Verify the Voice Video Endpoint microphone provides hardware mechanisms, such as push-to-talk handset switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks. If the Voice Video Endpoint microphone does not provide hardware mechanisms, such as push-to-talk handset switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks, this is a finding. If the Voice Video Endpoint microphone does provide hardware mechanisms but is not configured to use these features, this is a finding.
Fix: F-7051r363909_fix
Configure the Voice Video Endpoint microphone hardware mechanisms, such as push-to-talk handset switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00049
- Vuln IDs
-
- V-206796
- V-66779
- Rule IDs
-
- SV-206796r604140_rule
- SV-81269
Checks: C-7052r363911_chk
If the unclassified Voice Video Endpoint is not deployed where sensitive or classified information is displayed or discussed, this check procedure is Not Applicable. Verify the Voice Video Endpoint camera provides hardware mechanisms, such as push-to-see camera switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks. If the Voice Video Endpoint camera does not provide hardware mechanisms, such as push-to-see camera switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks, this is a finding. If the Voice Video Endpoint camera does provide hardware mechanisms but is not configured to use these features, this is a finding.
Fix: F-7052r363912_fix
Configure the Voice Video Endpoint camera hardware mechanisms, such as push-to-see camera switches, to prevent pickup and transmission of sensitive or classified information over non-secure networks.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00050
- Vuln IDs
-
- V-206797
- V-66781
- Rule IDs
-
- SV-206797r604140_rule
- SV-81271
Checks: C-7053r363914_chk
Verify the Voice Video Endpoint auto-answer feature is disabled. If the Voice Video Endpoint auto-answer feature is not disabled, this is a finding.
Fix: F-7053r363915_fix
Configure the Voice Video Endpoint auto-answer feature to be disabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00051
- Vuln IDs
-
- V-206798
- V-66783
- Rule IDs
-
- SV-206798r604140_rule
- SV-81273
Checks: C-7054r363917_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint disables or restricts web browser capabilities permitting the endpoint to browse the Internet or intranet. External applications and services approved for accessibility on the Voice Video Endpoint and implemented by the enterprise are permissible. If the hardware Voice Video does not disable or restrict web browser capabilities permitting the endpoint to browse the Internet or intranet, this is a finding.
Fix: F-7054r363918_fix
Configure the hardware Voice Video Endpoint to disable or restrict web browser capabilities permitting the endpoint to browse the Internet or intranet.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00052
- Vuln IDs
-
- V-206799
- V-66785
- Rule IDs
-
- SV-206799r604140_rule
- SV-81275
Checks: C-7055r363920_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. If the hardware Voice Video Endpoint does not contain a web server, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint disables or restricts built-in web servers. Web servers embedded in hardware Voice Video Endpoints must be restricted to authorized entities’ devices through an authentication mechanism or, minimally, through IP address filtering, or be otherwise disabled. Additionally, the connection must be for direct user or administrative functions. If the hardware Voice Video Endpoint does not disable or restrict built-in web servers, this is a finding.
Fix: F-7055r363921_fix
Configure the hardware Voice Video Endpoint to disable or restrict built-in web servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00053
- Vuln IDs
-
- V-206800
- V-66787
- Rule IDs
-
- SV-206800r604140_rule
- SV-81277
Checks: C-7056r363923_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint prevents the configuration of network IP settings without the use of a PIN or password. If the hardware Voice Video Endpoint does not prevent the configuration of network IP settings without the use of a PIN or password, this is a finding.
Fix: F-7056r363924_fix
Configure the hardware Voice Video Endpoint to prevent the configuration of network IP settings without the use of a PIN or password.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00054
- Vuln IDs
-
- V-206801
- V-66789
- Rule IDs
-
- SV-206801r604140_rule
- SV-81279
Checks: C-7057r363926_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint prevents the display of network IP settings without the use of a PIN or password. If the hardware Voice Video Endpoint does not prevent the display of network IP settings without the use of a PIN or password, this is a finding.
Fix: F-7057r363927_fix
Configure the hardware Voice Video Endpoint to prevent the display of network IP settings without the use of a PIN or password.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00055
- Vuln IDs
-
- V-206802
- V-66791
- Rule IDs
-
- SV-206802r604140_rule
- SV-81281
Checks: C-7058r363929_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint does not use the default PIN or password to access configuration and display of network IP settings. If the hardware Voice Video Endpoint uses the default PIN or password to access configuration and display of network IP settings, this is a finding.
Fix: F-7058r363930_fix
Configure the hardware Voice Video Endpoint to not use the default PIN or password to access configuration and display of network IP settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00057
- Vuln IDs
-
- V-206803
- V-66795
- Rule IDs
-
- SV-206803r604140_rule
- SV-81285
Checks: C-7059r363932_chk
Verify the Voice Video Endpoint prevents the user from installing third-party software. If the Voice Video Endpoint does not prevent the user from installing third-party software, this is a finding.
Fix: F-7059r363933_fix
Configure the Voice Video Endpoint to prevent the user from installing third-party software.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00058
- Vuln IDs
-
- V-206804
- V-66797
- Rule IDs
-
- SV-206804r604140_rule
- SV-81287
Checks: C-7060r363935_chk
Verify the Voice Video Endpoint prevents installation of untrusted third-party software. If the Voice Video Endpoint does not prevent installation of untrusted third-party software, this is a finding.
Fix: F-7060r363936_fix
Configure the Voice Video Endpoint to prevent installation of untrusted third-party software.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00060
- Vuln IDs
-
- V-206805
- V-66801
- Rule IDs
-
- SV-206805r604140_rule
- SV-81291
Checks: C-7061r363938_chk
Verify the Voice Video Endpoint is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. This requirement is intended to be used to allow best practices and other security guidance to be included within a vendor-produced STIG. If the Voice Video Endpoint is not configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs, this is a finding.
Fix: F-7061r363939_fix
Configure the Voice Video Endpoint to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VVEP-00065
- Vuln IDs
-
- V-206806
- V-71671
- Rule IDs
-
- SV-206806r604140_rule
- SV-86295
Checks: C-7062r459021_chk
If the Voice Video Endpoint is not used for unclassified communication within a SCIF or SAPF, this check procedure is Not Applicable. Verify the Voice Video Endpoint used for unclassified communication within a SCIF or SAPF is an NTSWG-approved device meeting the requirements outlined in CNSSI 5000. Confirm a valid NTSWG certification seal is affixed to the Voice Video Endpoint with no indication of tampering. If the Voice Video Endpoint is not an NTSWG-approved device with an affixed certification seal, this is a finding. If the Voice Video Endpoint reveals any evidence of tampering, or the seal is broken, cut, or in any way tampered with, this is a finding.
Fix: F-7062r459022_fix
Replace the Voice Video Endpoint used for unclassified communication within a SCIF or SAPF with an NTSWG-approved device meeting the requirements outlined in CNSSI 5000. Confirm a valid NTSWG certification seal is affixed to the Voice Video Endpoint with no indication of tampering. The list of NTSWG-approved instruments is available on the National Counterintelligence and Security Center website using the URL below, then clicking on "TSG-6-Approved Telephones (PDF)" link to download the list: https://www.dni.gov/index.php/ncsc-what-we-do/ncsc-physical-security-mission The manufacturer places the certification seals prior to shipment, and if the seal is broken, cut, or in any way tampered with, it is no longer considered valid.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000520-VVEP-00010
- Vuln IDs
-
- V-206807
- V-66701
- Rule IDs
-
- SV-206807r604140_rule
- SV-81191
Checks: C-7063r363944_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint applies 802.1Q VLAN tags to signaling and media traffic. If the hardware Voice Video Endpoint does not apply 802.1Q VLAN tags to signaling and media traffic, this is a finding.
Fix: F-7063r363945_fix
Configure the hardware Voice Video Endpoint to apply 802.1Q VLAN tags to signaling and media traffic.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000520-VVEP-00011
- Vuln IDs
-
- V-206808
- V-66703
- Rule IDs
-
- SV-206808r604140_rule
- SV-81193
Checks: C-7064r363947_chk
If the Voice Video Endpoint is not a hardware endpoint, this check procedure is Not Applicable. Verify the hardware Voice Video Endpoint uses a voice video VLAN separate from all other VLANs. For networks with both VoIP and videoconferencing, best practice is to have a separate voice VLAN and video VLAN. If the hardware Voice Video Endpoint does not use a voice video VLAN separate from all other VLANs, this is a finding.
Fix: F-7064r363948_fix
Configure the hardware Voice Video Endpoint to use a voice video VLAN separate from all other VLANs.