Professional Documents
Culture Documents
Coom
mpplliiaannccee C
Coom
mppoonneenntt
D
DEEFFIIN
NIITTIIO
ON
N
Name
Description
Security for Voice Over Internet Protocol (VOIP) refers to securing IP networks
when transmitting voice across them.
Rationale
Benefits
A
ASSSSO
OC
CIIA
ATTEED
DA
ARRC
CH
HIITTEEC
CTTU
URREE LLEEVVEELLSS
List the Domain Name
Security
Technical Controls
C
CO
OM
MPPLLIIA
AN
NC
CEE C
CO
OM
MPPO
ON
NEEN
NTT TTYYPPEE
Guideline
Component Sub-type
C
CO
OM
MPPLLIIA
AN
NC
CEE D
DEETTA
AIILL
Softphones
Desksets
When agencies use VOIP desksets, they must separate voice and
data on logically different networks (VLANs). This includes
separate address blocks used for voice and data traffic.
o
Remote IP Phones
Mobile units integrated with the VOIP system must use products
implementing WiFi Protected Access (WPA) or 802.11i Robust
Security Network (RSN) encryption.
Public Networks
Standard Organization
Name
Website
Contact Information
Government Body
Name
National Institute of
Standards and Technology
(NIST), Computer
Security Resource Center
(CSRC)
Contact Information
inquiries@nist.gov
Website
www.csrc.nist.gov/publications/
fips/index.html
KKEEYYW
WO
ORRD
DSS
Softphone, Telephony, IPT, H.323, PSTN, SIP, PBX, POTS, ALGs, WPA,
RSN, VoIP, encrypt, deskset, phone
C
CO
OM
MPPO
ON
NEEN
NTT C
CLLA
ASSSSIIFFIIC
CA
ATTIIO
ON
N
Provide the Classification
Emerging
Current
Twilight
Sunset
Migration Strategy
Document the Migration
Strategy
C
CU
URRRREEN
NTT SSTTA
ATTU
USS
Provide the Current Status)
In Development
Under Review
Approved
Rejected
A
AU
UD
DIITT TTRRA
AIILL
Creation Date
05/10/2005