The organization must conduct a benefit-to-risk analysis for reduced Voice Video cybersecurity configuration measures in highly mobile tactical LANs and systems supporting Voice Video communications.

From Voice Video Policy Security Technical Implementation Guide

Part of SRG-POL-300611

Associated with: CCI-003072

VVSP-01-000174_rule The organization must conduct a benefit-to-risk analysis for reduced Voice Video cybersecurity configuration measures in highly mobile tactical LANs and systems supporting Voice Video communications.

Vulnerability discussion

The information security architecture at the individual information system level must be consistent with and complement the more global, organization-wide information security architecture that is integral to and developed as part of the enterprise architecture. The information security architecture includes an architectural description, the placement/allocation of security functionality (including security controls), security-related information for external interfaces, information being exchanged across the interfaces, and the protection mechanisms associated with each interface. Voice Video systems developed and fielded at sites must be compatible and comparable to all DoD implementations. The network supporting a tactical Voice Video communications system must implement security as stringently as fixed strategic systems. The defined Voice Video architecture serves to segregate and hide the Voice Video communications and infrastructure (to the greatest extent possible on a converged LAN) from the data workstation users and associated platforms. Tactical deployments primarily support Command and Control (C2) mission-critical communications.

Check content

If cybersecurity configuration measures are reduced for highly mobile tactical networks (e.g., initial deployment packages) supporting hardware or Unified Capabilities (UC) soft client Voice Video communications, this is applicable. Review each Voice Video system security plan (SSP). Confirm with the ISSO that a benefit-to-risk analysis for reduced Voice Video cybersecurity configuration measures in highly mobile tactical LANs and systems supporting Voice Video communications is performed, documented, and approved in the Voice Video SSP. Deployable packages for highly mobile tactical networks may only support UC soft client Voice Video communications applications, which may not require separate VLANs for voice and data since all traffic will be in the data VLAN. If the Voice Video SSP does not contain a documented benefit-to-risk analysis for reduced Voice Video cybersecurity configuration measures in highly mobile tactical LANs and systems supporting Voice Video communications, this is a finding.

Fix text

Document in each Voice Video SSP the architecture of the highly mobile tactical LAN. Include network diagrams and device configurations with the cybersecurity measures implemented. Perform and document a benefit-to-risk analysis for the reduced cybersecurity measures when Voice Video cybersecurity configuration measures are reduced for highly mobile tactical networks (e.g., initial deployment packages) supporting Voice Video communications.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer