UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

When using PKI-based authentication, the Voice Video Endpoint used for videoconferencing must implement a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66755 SRG-NET-000345-VVEP-00036 SV-81245r1_rule Medium
Description
Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked certificates). This does not apply to authentication for the purpose of configuring the device itself (i.e., device management).
STIG Date
Voice Video Endpoint Security Requirements Guide 2019-03-15

Details

Check Text ( C-67405r1_chk )
Verify the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable.

If the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, does not implement a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable, this is a finding.
Fix Text (F-72855r1_fix)
Configure the Voice Video Endpoint used for videoconferencing, when using PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in the event the network path becomes unavailable.