UCF STIG Viewer Logo

The Voice Video Endpoint must dynamically implement configuration file changes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-206747 SRG-NET-000015-VVEP-00019 SV-206747r604140_rule High
Description
Configuration management includes the management of security features and assurances through control of changes made to device hardware, software, and firmware throughout the life cycle of a product. Secure configuration management relies on performance and functional attributes of products to determine the appropriate security features and assurances used to measure a system configuration state. When configuration changes are made, it is critical for those changes to be implemented by the Voice Video Endpoint as quickly as possible. This ensures that Voice Video Endpoints communicate using the correct address books, session managers, gateways, and border elements.
STIG Date
Voice Video Endpoint Security Requirements Guide 2020-12-04

Details

Check Text ( C-7003r363764_chk )
Verify the Voice Video Endpoint dynamically implements configuration file changes.

If the Voice Video Endpoint does not dynamically implement configuration file changes, this is a finding.
Fix Text (F-7003r363765_fix)
Configure the Voice Video Endpoint to dynamically implement configuration file changes.