UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Voice Video Endpoint processing classified information over public networks must implement NSA-approved cryptography.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66759 SRG-NET-000352-VVEP-00038 SV-81249r2_rule High
Description
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
STIG Date
Voice Video Endpoint Security Requirements Guide 2019-03-15

Details

Check Text ( C-67409r1_chk )
Verify the Voice Video Endpoint processing classified information over public networks implements NSA-approved cryptography.

If the Voice Video Endpoint processing classified information over public networks does not implement NSA-approved cryptography, this is a finding.
Fix Text (F-72859r1_fix)
Configure the Voice Video Endpoint processing classified information over public networks to implement NSA-approved cryptography.