From Voice Video Policy Security Technical Implementation Guide
Part of SRG-POL-300605
Associated with: CCI-001639
Organizations consider rules of behavior based on individual user roles and responsibilities. Rules of behavior for both organizational and non-organizational users are essential for general unclassified communications and other specific or classified communications, which may require restrictions for those who may participate. The signed acknowledgment (user agreement) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior.
Review the organizational Voice Video training plan. Verify the plan includes training on the bridging risks associated with UC and VC soft client accessories. When a UC or VC soft client accessory providing a network bridging capability is approved for use to fulfill a validated and approved mission requirement, the ISSO must ensure personnel are properly trained in their implementation and proper use. The UC soft client accessories requiring training include PPGs, ATAs, USB phones, or wireless headsets. If the organizational Voice Video training plan does not include training on the bridging risks associated with UC and VC soft client accessories, this is a finding.
Document in the organizational Voice Video training plan training material regarding the bridging risks associated with UC and VC soft client accessories.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer