SV-18860r1_rule
V-17686
RTS-VTC 1260.00 [IP][ISDN]
RTS-VTC 1260.00
CAT II
10
[IP][ISDN]; Perform the following tasks:
Define and enforce policy and procedure that addresses user activation and verification of encryption use when encryption is required based on the sensitivity of the information discussed or presented. The following must be included:
- The user must check that all participants are using encryption and have enabled the encryption on their devices if manual activation necessary.
- When the conference has begun, the user must ensure that the VTU is displaying the “conference is encrypted” indication.
[IP][ISDN]; Interview the IAO to validate compliance with the following requirement:
Ensure a policy and procedure is in place and enforced that addresses user activation and verification of encryption use when encryption is required based on the sensitivity of the information discussed or presented. The following must be included:
- The user must check that all participants are using encryption and have enabled the encryption on their devices if manual activation necessary.
- When the conference has begun, the user must ensure that the VTU is displaying the “conference is encrypted” indication.
Note: This requirement must be reflected in user training, agreements and guides.
Verify that there is a policy and procedure in place that enforces and guides users on how and what to check when participants are required to use encryption.
V-17686
False
RTS-VTC 1260.00
[IP][ISDN]; Interview the IAO to validate compliance with the following requirement:
Ensure a policy and procedure is in place and enforced that addresses user activation and verification of encryption use when encryption is required based on the sensitivity of the information discussed or presented. The following must be included:
- The user must check that all participants are using encryption and have enabled the encryption on their devices if manual activation necessary.
- When the conference has begun, the user must ensure that the VTU is displaying the “conference is encrypted” indication.
Note: This requirement must be reflected in user training, agreements and guides.
Verify that there is a policy and procedure in place that enforces and guides users on how and what to check when participants are required to use encryption.
I
The inadvertent disclosure of sensitive or classified information to a caller of a VTU that may not have an appropriate need-to-know or proper security clearance.
Other
1418