SV-18715r2_rule
V-17589
RTS-VTC 1000
RTS-VTC 1000.00
CAT III
10
Procure and implement VTC endpoints and system components configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. Encourage vendors to develop VTC systems and devices that provide robust IA features that support compliance with DoD policies for all devices.
Review the VTC system architecture and ensure the VTC endpoints and system components are configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. Ensure all VTC endpoints and system components comply with the following NIST 800-53 (Rev. 4) IA controls:
- Account Management (AC-2)
- Individual ID & Password (IA-5)
- Lockout on logon failure (AC-7)
- Warning Banner (AC-8)
- Roles (privileged access) (AC-1)
- Least Privilege (AC-6, SA-17)
- Security audit (AU-2)
- Audit Content (AU-3)
- Audit Trail Protection (AU-12)
If the VTC endpoints and system components are not configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, this is a finding.
V-17589
False
RTS-VTC 1000.00
Review the VTC system architecture and ensure the VTC endpoints and system components are configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. Ensure all VTC endpoints and system components comply with the following NIST 800-53 (Rev. 4) IA controls:
- Account Management (AC-2)
- Individual ID & Password (IA-5)
- Lockout on logon failure (AC-7)
- Warning Banner (AC-8)
- Roles (privileged access) (AC-1)
- Least Privilege (AC-6, SA-17)
- Security audit (AU-2)
- Audit Content (AU-3)
- Audit Trail Protection (AU-12)
If the VTC endpoints and system components are not configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, this is a finding.
M
Designated Approving Authority
1418