The organization must monitor the Voice Video system to detect unauthorized local connections.

From Voice Video Policy Security Technical Implementation Guide

Part of SRG-POL-300882

Associated with: CCI-002642

VVSP-01-000203_rule The organization must monitor the Voice Video system to detect unauthorized local connections.

Vulnerability discussion

Information system monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the information system boundary (i.e., part of perimeter defense and boundary protection). Internal monitoring includes the observation of events occurring within the information system. Organizations can monitor information systems, for example, by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events.Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software). A network connection is any connection with a device that communicates through a network (e.g., local area network, Internet).

Check content

Review each Voice Video system security plan (SSP). Verify that the organization requires the Voice Video system to monitor the network to detect unauthorized local connections. Commercial subscriber lines and trunks are provided over an Internet Service Provider (ISP) connection, which requires approval. Other unauthorized connections may also exist. If the Voice Video SSP does not document, and the organization does not enforce, that the Voice Video system is monitored to detect unauthorized local connections, this is a finding.

Fix text

Document in the Voice Video SSP the organizational details for monitoring the Voice Video system to detect unauthorized local connections.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer