STIGQter STIGQter: STIG Summary: Voice Video Services Policy Security Technical Implementation Guide Version: 3 Release: 17 Benchmark Date: 25 Oct 2019:

A user guide identifying the proper use of Unified Capabilities (UC) soft client applications must be provided to UC soft client users.

DISA Rule

SV-17079r3_rule

Vulnerability Number

V-16091

Group Title

Provide UC soft client user guide

Rule Version

VVoIP 1330

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Develop and distribute a user guide to users of UC soft client applications minimally providing the following information:
- Review the policies and restrictions agreed to when the user agreement was signed upon receiving the communications application.
- Provide a caution notice discussing the non-assured nature of UC soft client applications for C2 user awareness that for assured service a UC soft client should not be the primary method of communications.
- Provide instruction for the proper and safe use of webcams or built-in cameras when used in a classified environment to prevent viewing classified work or classified material over non-secure networks.
- Provide instruction for the proper and safe use of speakerphones or built-in microphones when used in a classified environment to prevent hearing classified discussions over non-secure networks.
- Provide instruction regarding the proper and safe use of presentation, document, and desktop sharing.

Check Contents

Interview the ISSO to validate compliance with the following requirement:

Verify a user guide is developed and distributed to users of UC soft client applications minimally providing the following information:
- Review the policies and restrictions agreed to when the user agreement was signed upon receiving the communications application.
- Provide a caution notice discussing the non-assured nature of UC soft client applications for C2 user awareness that for assured service a UC soft client should not be the primary method of communications.
- Provide instruction for the proper and safe use of webcams or built-in cameras when used in a classified environment to prevent viewing classified work or classified material over non-secure networks.
- Provide instruction for the proper and safe use of speakerphones or built-in microphones when used in a classified environment to prevent hearing classified discussions over non-secure networks.
- Provide instruction regarding the proper and safe use of presentation, document, and desktop sharing.

Inspect the user guide for the proper use of UC soft client and validate users received this guide by interviewing a random sampling of users. If the user guide is deficient in content or the guide is not provided to users, this is a finding.

Vulnerability Number

V-16091

Documentable

False

Rule Version

VVoIP 1330

Severity Override Guidance

Interview the ISSO to validate compliance with the following requirement:

Verify a user guide is developed and distributed to users of UC soft client applications minimally providing the following information:
- Review the policies and restrictions agreed to when the user agreement was signed upon receiving the communications application.
- Provide a caution notice discussing the non-assured nature of UC soft client applications for C2 user awareness that for assured service a UC soft client should not be the primary method of communications.
- Provide instruction for the proper and safe use of webcams or built-in cameras when used in a classified environment to prevent viewing classified work or classified material over non-secure networks.
- Provide instruction for the proper and safe use of speakerphones or built-in microphones when used in a classified environment to prevent hearing classified discussions over non-secure networks.
- Provide instruction regarding the proper and safe use of presentation, document, and desktop sharing.

Inspect the user guide for the proper use of UC soft client and validate users received this guide by interviewing a random sampling of users. If the user guide is deficient in content or the guide is not provided to users, this is a finding.

Check Content Reference

M

Responsibility

Information Assurance Manager

Target Key

594

Comments