Navigation :
Feature Overview
Installation and Configuration
Using the On-Demand Service
Using the Multi-Tenant Service
Security and Compliance Information
Crunchy Compliance Suite Report
-
STIG Compliance
-
NIST 800-53 Compliance
--
AC - Access Control
--
AT - Awareness And Training
--
AU - Audit And Accountability
--
CA - Security Assessment And Authorization
--
CM - Configuration Management
--
CP - Contingency Planning
--
IA - Identification And Authentication
--
IR - Incident Response
--
MA - Maintenance
--
MP - Media Protection
-- NIST 800-53 Baseline
--
PE - Physical And Environmental Protection
--
PL - Planning
--
PM - Program Management
--
PS - Personnel Security
--
RA - Risk Assessment
--
SA - System And Services Acquisition
--
SC - System And Communications Protection
--- SC-1: System And Communications Protection Policy And Procedures
--- SC-2: Application Partitioning
--- SC-3: Security Function Isolation
--- SC-4: Information In Shared Resources
--- SC-5: Denial Of Service Protection
--- SC-6: Resource Availability
--- SC-7: Boundary Protection
--- SC-8: Transmission Confidentiality And Integrity
--- SC-9: Transmission Confidentiality
--- SC-10: Network Disconnect
--- SC-11: Trusted Path
--- SC-12: Cryptographic Key Establishment And Management
--- SC-13: Cryptographic Protection
--- SC-14: Public Access Protections
--- SC-15: Collaborative Computing Devices
--- SC-16: Transmission Of Security Attributes
--- SC-17: Public Key Infrastructure Certificates
--- SC-18: Mobile Code
--- SC-19: Voice Over Internet Protocol
--- SC-20: Secure Name / Address Resolution Service (Authoritative Source)
--- SC-21: Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
--- SC-22: Architecture And Provisioning For Name / Address Resolution Service
--- SC-23: Session Authenticity
--- SC-24: Fail In Known State
--- SC-25: Thin Nodes
--- SC-26: Honeypots
--- SC-27: Platform-Independent Applications
--- SC-28: Protection Of Information At Rest
--- SC-29: Heterogeneity
--- SC-30: Concealment And Misdirection
--- SC-31: Covert Channel Analysis
--- SC-32: Information System Partitioning
--- SC-33: Transmission Preparation Integrity
--- SC-34: Non-Modifiable Executable Programs
--- SC-35: Honeyclients
--- SC-36: Distributed Processing And Storage
--- SC-37: Out-Of-Band Channels
--- SC-38: Operations Security
--- SC-39: Process Isolation
--- SC-40: Wireless Link Protection
--- SC-41: Port And I/o Device Access
--- SC-42: Sensor Capability And Data
--- SC-43: Usage Restrictions
--- SC-44: Detonation Chambers
--
SI - System And Information Integrity
--
NIST 800-53 Controls
Data Migration
Disaster Recovery
Cluster Metrics
Data Loading Tools Lab
Release Notes
Support
Administrator Runbooks
SC-19: Voice Over Internet Protocol
Generated
2019-04-12 13:01:48.067729
Status
Skipped
Statements
The organization:
Code
Description
SC-19a.
Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
SC-19b.
Authorizes, monitors, and controls the use of VoIP within the information system.
Additional Guidance