From Voice Video Policy Security Technical Implementation Guide
Part of SRG-POL-300605
Associated with: CCI-001639
Organizations consider rules of behavior based on individual user roles and responsibilities. Rules of behavior for both organizational and non-organizational users are essential for general unclassified communications and other specific or classified communications, which may require restrictions for those who may participate. The signed acknowledgment (user agreement) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior.
Review the organizational UC and VC soft client user guides. Verify the user guides are provided to all UC and VC soft client users. Verify the user guides address: - Awareness that UC soft clients for mission-critical decision-making communications may not provide adequate assured service and may require backup communications methods; - Awareness of the various aspects of the application's safe and proper use, as well as the application or service vulnerabilities; - Sharing control of a user's PC or applications with other users they are familiar with and who are identifiable as trustworthy; - Prohibiting the use of personally provided UC or VC soft client accessories; - Awareness of the bridging risks associated with UC and VC soft client accessories; and - Prohibiting the use of non-approved applications and hardware. If the organizational UC and VC soft client user guides are not provided to all UC and VC soft client users, this is a finding. If the organizational UC and VC soft client user guides do not address the specific items above, this is a finding.
Document and disseminate organizational UC and VC soft client user guides. Provide the user guides to all UC and VC soft client users. Ensure the user guides address: - Awareness that UC soft clients for mission-critical decision-making communications may not provide adequate assured service and may require backup communications methods; - Awareness of the various aspects of the application's safe and proper use, as well as the application or service vulnerabilities; - Sharing control of a user's PC or applications with other users they are familiar with and who are identifiable as trustworthy; - Prohibiting the use of personally provided UC or VC soft client accessories; - Awareness of the bridging risks associated with UC and VC soft client accessories; and - Prohibiting the use of non-approved applications and hardware.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer