Skip to content

3.13.14 — Secure Your VoIP

Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.

VoIP carries voice conversations over your network — conversations that might include CUI discussions. If you use VoIP (Teams, Zoom, Cisco Unified Communications, etc.), it needs the same security controls as data:

  • Network segmentation — VoIP on a separate VLAN from data traffic
  • Encryption — voice traffic encrypted (SRTP for media, TLS for signaling)
  • Monitoring — call logs retained, traffic monitored
  • Access control — only authorized users can make calls

If you don’t use VoIP: Document it in your SSP. If all your phones are traditional PSTN landlines with no network connection, this requirement may be N/A.

If you use Teams/Zoom: The cloud provider handles much of the encryption and security. Document the CSP’s controls and your configuration in the SSP. Ensure your local network carrying VoIP traffic is appropriately segmented.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are VoIP technologies identified and controlled?VoIP systems documented with security controls applied
2Are VoIP communications monitored?Call logs retained, traffic monitored for anomalies

Documents they’ll review: System and communications protection policy; system security plan; VoIP system configuration; network diagrams showing VoIP segmentation; call log retention settings

People they’ll talk to: System or network administrators; personnel with information security responsibilities; telecommunications staff

Live demos they’ll ask for: VoIP security configuration; encryption verification; network segmentation for voice traffic


These are the actual questions. Have answers ready.

  • “Do you use VoIP? What platform?”
  • “Is VoIP traffic on a separate VLAN from data?”
  • “Is voice traffic encrypted? Show me the configuration.”
  • “Are call logs retained? For how long?”
  • “If you use Teams/Zoom, what security settings are configured?”
  • “If no VoIP, is that documented in your SSP?”

VoIP on the same VLAN as data. On-premise VoIP systems sharing network segment with CUI data. Separate VLANs for voice and data.

Unencrypted voice traffic. SIP without TLS, RTP without SRTP. Enable encrypted protocols.

No call logging. No record of who called whom. Enable and retain call logs.

N/A not documented. No VoIP but you forgot to document it in the SSP. The assessor needs to see the explicit N/A.



RequirementWhy it matters here
3.13.1 — Guard the BoundariesVoIP VLAN is an internal boundary to protect
3.13.8 — Encrypt in TransitVoice traffic is data in transit that must be encrypted

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: SC.L2-3.13.14 | SPRS Weight: 1 point | POA&M Eligible: Yes