The Session Border Controller (SBC) must be configured to only process signaling packets whose integrity is validated.
An XCCDF Rule
Description
<VulnDiscussion>The validation of signaling packet integrity is required to ensure the packet has not been altered in transit. Packets can be altered during uncontrollable network events, such as bit errors and packet truncation that would cause the packet to contain erroneous information. Packets containing detectable errors must not be processed. Packets can also be modified by a man-in-the-middle attack. The current Unified Capabilities Requirements (UCR) document specifies the hashing algorithm to be used during transmission.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-259930r948776_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
Ensure the DISN NIPRNet IPVS SBC is configured to only process signaling packets whose integrity is validated. The current UCR document specifies the hashing algorithm to be used during transmission.
NOTE: The VVoIP system may allow SIP and SRTP traffic encrypted and encapsulated on port 443 from cloud service providers.