The organization must manage Voice Video endpoint certificates by verifying, as part of the initial authenticator distribution, the Voice Video endpoint identifiers (e.g., phone number, MAC address, IP address).

From Voice Video Policy Security Technical Implementation Guide

Part of SRG-POL-300452

Associated with: CCI-001980

VVSP-01-000099_rule The organization must manage Voice Video endpoint certificates by verifying, as part of the initial authenticator distribution, the Voice Video endpoint identifiers (e.g., phone number, MAC address, IP address).

Vulnerability discussion

Individual authenticators for Voice Video endpoints are typically PKI certificates. In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, are easily discoverable, and present a significant security risk. For Voice Video systems, the Voice Video endpoints must authenticate as a network device using 802.1X and register with a session manager. Managing the unique certificates for each Voice Video endpoint ensures communications are restricted to only known devices.

Check content

Review the Voice Video system security plan (SSP). Ensure the organization manages Voice Video endpoint certificates by verifying, as part of the initial authenticator distribution, the Voice Video endpoint identifiers (e.g., phone number, MAC address, IP address). Each Voice Video endpoint must be inventoried and identifiers documented prior to fielding. If the organization does not manages Voice Video endpoint certificates by verifying, as part of the initial authenticator distribution, the Voice Video endpoint identifiers, this is a finding. NOTE: This inventory is separate from the inventory created within the session manager listing of registered instruments. Authorized instruments must be added to this inventory before configuration in the session manager.

Fix text

Document in the Voice Video SSP each Voice Video endpoint certificate in the inventory. Verify and document in the inventory during the initial authenticator distribution the Voice Video endpoint identifiers (e.g., phone number, MAC address, IP address) prior to deploying.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer