Level 5 CMMC - CMMC Practices

SC.3.189  

Reference: CMMC 1.02

Family: SC

Level Introduced: 3

Practice:
Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.

CMMC Clarification:
Controlling VoIP technologies starts with establishing guidelines and enforcing users’ proper and appropriate usage of VoIP technologies that are described in an organization’s policies. Monitoring should include the users’ activity for anything other than what is permitted and authorized and detection of insecure or unauthorized use of the VoIP technology. Security concerns for VoIP include eavesdropping on calls and using ID spoofing to impersonate trusted individuals.

Example 1
The organization has established an Acceptable Use Policy for using the VoIP technology. You are an IT administrator at the organization responsible for the VoIP system. You verify that the VoIP solution is setup and configured correctly with all required security settings in compliance with the company's policies and security standards. You also verify all softphone software installed for users is kept up to date and patched to address any security issues.

Example 2
You are an IT administrator at your organization. Your organization has established a policy stating that VoIP technology may not be used without permission. You do not allow users to install VoIP applications on their devices and monitor for the unapproved use of VoIP on your network.

3.13.14

Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.

Discussion:
VoIP has different requirements, features, functionality, availability, and service limitations when compared with the Plain Old Telephone Service (POTS) (i.e., the standard telephone service). In contrast, other telephone services are based on high-speed, digital communications lines, such as Integrated Services Digital Network (ISDN) and Fiber Distributed Data Interface (FDDI). The main distinctions between POTS and non-POTS services are speed and bandwidth. To address the threats associated with VoIP, usage restrictions and implementation guidelines are based on the potential for the VoIP technology to cause damage to the system if it is used maliciously. Threats to VoIP are similar to those inherent with any Internet-based application.

[SP 800-58] provides guidance on Voice Over IP Systems.

Source: NIST Special Publication 800-171 Rev. 2

SC-19

VOICE OVER INTERNET PROTOCOL

Description:
The organization:
    a. Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
    b. Authorizes, monitors, and controls the use of VoIP within the information system.

Supplemental Guidance:
Related controls: CM-6, SC-7, SC-15.

Source: NIST Special Publication 800-53 Rev. 4

Source: CMMC v1.02