STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

V-259973

CAT I (High)

The Enterprise Voice, Video, and Messaging Endpoint must be configured to use FIPS-compliant algorithms for network traffic.

Rule ID

SV-259973r948886_rule

STIG

Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

Version

V1R3

CCIs

CCI-002418

Discussion

Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communications can be intercepted and either read or altered. TLS can be used to secure SIP and SCCP signaling by configuring the session manager in a secure mode. DOD-to-DOD voice communications are generally considered to contain sensitive information and therefore DOD voice and data traffic crossing the unclassified DISN must be encrypted. Cryptographic mechanisms such as Media Access Control Security (MACsec) implemented to protect information include cryptographic hash functions that have common application in digital signatures, checksums, and message authentication codes.

Check Content

Verify the Enterprise Voice, Video, and Messaging Endpoint uses encryption for network traffic. 

If the Enterprise Voice, Video, and Messaging Endpoint does not use encryption for network traffic, this is a finding.

Fix Text

Configure the Enterprise Voice, Video, and Messaging Endpoint to use encryption for network traffic.