3.13.20: Secure and Monitor VoIP to Protect Your Conversations—and Your Data


Overview of NIST 800-171 Control 3.13.20

NIST 800-171 control 3.13.20 addresses the risks associated with Voice over Internet Protocol technologies, including IP phones, softphones, conferencing platforms, and integrated collaboration tools. These technologies can transmit sensitive conversations and data and must be protected from interception, misuse, and unauthorized access.

For organizations pursuing CMMC Level 2, this control emphasizes secure configuration and ongoing monitoring to ensure VoIP does not become an unprotected communication channel.

Control Requirements

Control 3.13.20 requires organizations to both secure VoIP technologies and monitor their use. This includes protecting signaling and media traffic, restricting access to authorized users and devices, and detecting anomalous or unauthorized activity.

Why VoIP Security Matters

VoIP systems can be exploited for eavesdropping, impersonation, call fraud, or lateral movement within a network. Weak configurations, shared network segments, or lack of monitoring increase the likelihood of undetected misuse.

Implementation Practices

  • Access control: Restrict VoIP usage and administration to authorized identities and managed devices.
  • Encryption: Protect signaling and media traffic using supported encryption mechanisms.
  • Segmentation: Isolate VoIP systems from sensitive networks using logical or physical segmentation.
  • Secure configuration: Enforce hardened baselines and disable unnecessary services.
  • User awareness: Train personnel to recognize voice-based social engineering risks.

Monitoring Expectations

Monitoring should focus on authentication events, administrative changes, session anomalies, and indicators of misuse. Reviews should be documented, and exceptions should be investigated and resolved.

Audit-Ready VoIP Security Table

Control Objective Implementation Requirement Review Cadence Evidence
Restrict VoIP access Limit usage to authorized users and devices Continuous enforcement; periodic review Access logs, role assignments, review records
Encrypt communications Enable encryption for signaling and media Continuous; validate after changes Configuration standards, settings exports
Segment VoIP traffic Isolate VoIP systems using network controls Continuous; rules reviewed periodically Network diagrams, firewall rules
Monitor VoIP activity Collect and review VoIP logs and alerts Alerts continuous; reviews scheduled Log samples, alert tickets, review notes

FAQ

What does NIST 800-171 control 3.13.20 require for VoIP?

It requires organizations to secure VoIP technologies and monitor their use to detect unauthorized or suspicious activity.

What VoIP activity should be monitored?

Authentication events, session activity, administrative changes, and anomalous usage patterns should be monitored.

What evidence supports compliance with 3.13.20?

Evidence includes configuration standards, encryption settings, segmentation documentation, monitoring logs, and incident records.

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.