Navigation :
Feature Overview
Installation and Configuration
Using the On-Demand Service
Using the Multi-Tenant Service
Security and Compliance Information
Crunchy Compliance Suite Report
-
STIG Compliance
-
NIST 800-53 Compliance
--
AC - Access Control
--
AT - Awareness And Training
--
AU - Audit And Accountability
--
CA - Security Assessment And Authorization
--
CM - Configuration Management
--
CP - Contingency Planning
--
IA - Identification And Authentication
--
IR - Incident Response
--
MA - Maintenance
--
MP - Media Protection
-- NIST 800-53 Baseline
--
PE - Physical And Environmental Protection
--
PL - Planning
--
PM - Program Management
--
PS - Personnel Security
--
RA - Risk Assessment
--
SA - System And Services Acquisition
--
SC - System And Communications Protection
--
SI - System And Information Integrity
--
NIST 800-53 Controls
---
AC - Access Control
---
AT - Awareness And Training
---
AU - Audit And Accountability
---
CA - Security Assessment And Authorization
---
CM - Configuration Management
---
CP - Contingency Planning
---
IA - Identification And Authentication
---
IR - Incident Response
---
MA - Maintenance
---
MP - Media Protection
---
PE - Physical And Environmental Protection
---
PL - Planning
---
PM - Program Management
---
PS - Personnel Security
---
RA - Risk Assessment
---
SA - System And Services Acquisition
---
SC - System And Communications Protection
---- SC-1: System And Communications Protection Policy And Procedures
---- SC-2: Application Partitioning
---- SC-3: Security Function Isolation
---- SC-4: Information In Shared Resources
---- SC-5: Denial Of Service Protection
---- SC-6: Resource Availability
---- SC-7: Boundary Protection
---- SC-8: Transmission Confidentiality And Integrity
---- SC-9: Transmission Confidentiality
---- SC-10: Network Disconnect
---- SC-11: Trusted Path
---- SC-12: Cryptographic Key Establishment And Management
---- SC-13: Cryptographic Protection
---- SC-14: Public Access Protections
---- SC-15: Collaborative Computing Devices
---- SC-16: Transmission Of Security Attributes
---- SC-17: Public Key Infrastructure Certificates
---- SC-18: Mobile Code
---- SC-19: Voice Over Internet Protocol
---- SC-20: Secure Name / Address Resolution Service (Authoritative Source)
---- SC-21: Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
---- SC-22: Architecture And Provisioning For Name / Address Resolution Service
---- SC-23: Session Authenticity
---- SC-24: Fail In Known State
---- SC-25: Thin Nodes
---- SC-26: Honeypots
---- SC-27: Platform-Independent Applications
---- SC-28: Protection Of Information At Rest
---- SC-29: Heterogeneity
---- SC-30: Concealment And Misdirection
---- SC-31: Covert Channel Analysis
---- SC-32: Information System Partitioning
---- SC-33: Transmission Preparation Integrity
---- SC-34: Non-Modifiable Executable Programs
---- SC-35: Honeyclients
---- SC-36: Distributed Processing And Storage
---- SC-37: Out-Of-Band Channels
---- SC-38: Operations Security
---- SC-39: Process Isolation
---- SC-40: Wireless Link Protection
---- SC-41: Port And I/o Device Access
---- SC-42: Sensor Capability And Data
---- SC-43: Usage Restrictions
---- SC-44: Detonation Chambers
---
SI - System And Information Integrity
Data Migration
Disaster Recovery
Cluster Metrics
Data Loading Tools Lab
Release Notes
Support
Administrator Runbooks
SC-19: Voice Over Internet Protocol
Generated
2019-05-20 15:48:11.984914
Status
Skipped
Statements
The organization:
Code
Description
SC-19a.
Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
SC-19b.
Authorizes, monitors, and controls the use of VoIP within the information system.
Additional Guidance