STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

V-259973

CAT I (High)

The Enterprise Voice, Video, and Messaging Endpoint must be configured to use FIPS-compliant algorithms for network traffic.

Rule ID

SV-259973r948886_rule

STIG

Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

Version

V1R3

CCIs

CCI-002418

Discussion

Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communications can be intercepted and either read or altered. TLS can be used to secure SIP and SCCP signaling by configuring the session manager in a secure mode. DOD-to-DOD voice communications are generally considered to contain sensitive information and therefore DOD voice and data traffic crossing the unclassified DISN must be encrypted. Cryptographic mechanisms such as Media Access Control Security (MACsec) implemented to protect information include cryptographic hash functions that have common application in digital signatures, checksums, and message authentication codes.

Check Content

Verify the Enterprise Voice, Video, and Messaging Endpoint uses encryption for network traffic. 

If the Enterprise Voice, Video, and Messaging Endpoint does not use encryption for network traffic, this is a finding.

Fix Text

Configure the Enterprise Voice, Video, and Messaging Endpoint to use encryption for network traffic.