UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Voice Video Endpoint must dynamically implement configuration file changes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66717 SRG-NET-000015-VVEP-00019 SV-81207r2_rule High
Description
Configuration management includes the management of security features and assurances through control of changes made to device hardware, software, and firmware throughout the life cycle of a product. Secure configuration management relies on performance and functional attributes of products to determine the appropriate security features and assurances used to measure a system configuration state. When configuration changes are made, it is critical for those changes to be implemented by the Voice Video Endpoint as quickly as possible. This ensures that Voice Video Endpoints communicate using the correct address books, session managers, gateways, and border elements.
STIG Date
Voice Video Endpoint Security Requirements Guide 2019-03-15

Details

Check Text ( C-67343r1_chk )
Verify the Voice Video Endpoint dynamically implements configuration file changes.

If the Voice Video Endpoint does not dynamically implement configuration file changes, this is a finding.
Fix Text (F-72793r1_fix)
Configure the Voice Video Endpoint to dynamically implement configuration file changes.