Under active development Content is continuously updated and improved

SC.L2-3.13.14Voice over Internet Protocol

>Control Description

Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.

>Cross-Framework Mappings

NIST SP 800-171

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What is your VoIP policy and governance?
  • How do you control and monitor VoIP usage?
  • What security requirements apply to VoIP implementations?
  • Who approves VoIP solutions and configurations?

Technical Implementation:

  • What VoIP security technologies are deployed?
  • What encryption protects VoIP communications?
  • What network controls isolate VoIP traffic?
  • What monitoring tools track VoIP usage?
  • What access controls restrict VoIP services?

Evidence & Documentation:

  • What network diagrams show boundary protection architecture?
  • What firewall rule sets and configurations can you provide?
  • What encryption implementation documentation shows FIPS-validated crypto?
  • What key management procedures can you provide?
  • What network segmentation documentation shows proper separation?
  • What evidence shows cryptographic mechanisms protect CUI?
  • What configuration documentation shows security controls are properly implemented?

Ask AI

Configure your API key to use AI features.