Check: VVoIP 9000
Voice/Video over Internet Protocol (VVoIP) STIG:
VVoIP 9000
(in version v3 r15)
Title
VVoIP guidance being utilized must be supported by DISA. (Cat I impact)
Discussion
Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously. Organization-defined time periods for updating security-relevant software may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). The current Voice Video STIG Guidance will be sunset because technology advancements and best practices have outpaced the existing guidelines. DISA recognizes the current VOIP STIGs require updating and will be placing the VOIP guidance on the STIG sunset list until new VOIP guidance can be developed. Plans are currently underway to draft new guidance, in the interim period, the sunset VOIP guidance can be utilized to the extent possible, but it will not be updated.
Check Content
The VVoIP STIG is no longer supported by DISA. If the STIG is being utilized, this is a finding.
Fix Text
Utilize vendor best practices and the sunset VVOIP guidance to the extent possible.
Additional Identifiers
Rule ID: SV-23456r3_rule
Vulnerability ID: V-23232
Group Title: VVoIP 9000
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |