UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The sites telephone switch is not frequently monitored for changing calling patterns and system uses for possible security concerns.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7922 DSN01.02 SV-8408r1_rule ECMT-1 ECMT-2 ECSC-1 Low
Description
Requirement: The IAO will ensure that the site’s telephone switch is frequently monitored for changing calling patterns and system uses for possible security concerns. Changing calling patterns and system uses can be an indication of telephone misuse, abuse, or even security compromise. The ISSO/IAO should ensure the sites telephone switch is frequently monitored for changing calling patterns and system uses for possible security concerns.
STIG Date
Defense Switched Network (DSN) STIG 2015-06-30

Details

Check Text ( C-7303r1_chk )
Interview the IAO or SA and confirm compliance through discussion, review of site policy, diagrams, documentation, DAA approvals, etc as applicable.
Fix Text (F-7968r1_fix)
Implement processes / procedures, generate documents, and/or adjust configuration(s) / architecture, as necessary to comply with policy.