3.13.14 — Secure Your VoIP
What It Says
Section titled “What It Says”Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
What It Actually Means
Section titled “What It Actually Means”VoIP carries voice conversations over your network — conversations that might include CUI discussions. If you use VoIP (Teams, Zoom, Cisco Unified Communications, etc.), it needs the same security controls as data:
- Network segmentation — VoIP on a separate VLAN from data traffic
- Encryption — voice traffic encrypted (SRTP for media, TLS for signaling)
- Monitoring — call logs retained, traffic monitored
- Access control — only authorized users can make calls
If you don’t use VoIP: Document it in your SSP. If all your phones are traditional PSTN landlines with no network connection, this requirement may be N/A.
If you use Teams/Zoom: The cloud provider handles much of the encryption and security. Document the CSP’s controls and your configuration in the SSP. Ensure your local network carrying VoIP traffic is appropriately segmented.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Are VoIP technologies identified and controlled? | VoIP systems documented with security controls applied |
| 2 | Are VoIP communications monitored? | Call logs retained, traffic monitored for anomalies |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: System and communications protection policy; system security plan; VoIP system configuration; network diagrams showing VoIP segmentation; call log retention settings
People they’ll talk to: System or network administrators; personnel with information security responsibilities; telecommunications staff
Live demos they’ll ask for: VoIP security configuration; encryption verification; network segmentation for voice traffic
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Do you use VoIP? What platform?”
- “Is VoIP traffic on a separate VLAN from data?”
- “Is voice traffic encrypted? Show me the configuration.”
- “Are call logs retained? For how long?”
- “If you use Teams/Zoom, what security settings are configured?”
- “If no VoIP, is that documented in your SSP?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”VoIP on the same VLAN as data. On-premise VoIP systems sharing network segment with CUI data. Separate VLANs for voice and data.
Unencrypted voice traffic. SIP without TLS, RTP without SRTP. Enable encrypted protocols.
No call logging. No record of who called whom. Enable and retain call logs.
N/A not documented. No VoIP but you forgot to document it in the SSP. The assessor needs to see the explicit N/A.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.13.1 — Guard the Boundaries | VoIP VLAN is an internal boundary to protect |
| 3.13.8 — Encrypt in Transit | Voice traffic is data in transit that must be encrypted |
Implementation (coming soon)
Section titled “Implementation (coming soon)”Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.
CMMC Practice ID: SC.L2-3.13.14 | SPRS Weight: 1 point | POA&M Eligible: Yes