STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Enterprise Voice, Video, and Messaging Session Management Security Requirements Guide

V-260003

CAT II (Medium)

The Enterprise Voice, Video, and Messaging Session Manager must protect session (call) records from unauthorized read access.

Rule ID

SV-260003r948970_rule

STIG

Enterprise Voice, Video, and Messaging Session Management Security Requirements Guide

Version

V1R2

CCIs

CCI-000162

Discussion

Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. Thus, it is imperative that the collected log data from the various network elements, as well as the auditing tools, be secured and can only be accessed by authorized personnel.

Check Content

Verify the Enterprise Voice, Video, and Messaging Session Manager protects session records from unauthorized read access.

If the Enterprise Voice, Video, and Messaging Session Manager does not protect session records from unauthorized read access, this is a finding.

Fix Text

Configure the Enterprise Voice, Video, and Messaging Session Manager to protect session records from unauthorized read access.