SC.L2-3.13.14—Voice over Internet Protocol
Level 2
800-171: 3.13.14
>Control Description
Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
>Cross-Framework Mappings
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What is your VoIP policy and governance?
- •How do you control and monitor VoIP usage?
- •What security requirements apply to VoIP implementations?
- •Who approves VoIP solutions and configurations?
Technical Implementation:
- •What VoIP security technologies are deployed?
- •What encryption protects VoIP communications?
- •What network controls isolate VoIP traffic?
- •What monitoring tools track VoIP usage?
- •What access controls restrict VoIP services?
Evidence & Documentation:
- •What network diagrams show boundary protection architecture?
- •What firewall rule sets and configurations can you provide?
- •What encryption implementation documentation shows FIPS-validated crypto?
- •What key management procedures can you provide?
- •What network segmentation documentation shows proper separation?
- •What evidence shows cryptographic mechanisms protect CUI?
- •What configuration documentation shows security controls are properly implemented?
Ask AI
Configure your API key to use AI features.