NIST Special Publication 800-171 Revision 2
Date Published: January 28th, 2021
Withdrawn on May 14, 2024. Superseded by SP 800-171 Rev. 3
Author(s): Ron Ross (NIST), Victoria Pillitteri (NIST), Kelley Dempsey (NIST), Mark Riddle (NARA), Gary Guissanie (IDA)
Note: A Class Deviation is in effect as of May 2, 2024 (DEVIATION 2024O0013). The deviation clause requires contractors, who are subject to 252.204-7012, to comply with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 Revision 2, instead of the version of NIST SP 800-171 in effect at the time the solicitation is issued or as authorized by the contracting officer. Click Here
3.13.15: Protect the authenticity of communications sessions.Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
Control Family: System and Communications Protection
Control Type: Derived
SPRS Value: 5
SPRS Supplemental Guidance: N/A
CMMC Level(s):
SC.L2-3.13.15
Top Ten Failed Requirement:
No
Referenced in:
DFARS 252.204-7012
Derived From: NIST SP 800-53r4
SC-23
NIST Supplemental Guidance:
[SP 800-77]
[SP 800-95]
[SP 800-113]
Discussion:
Authenticity protection includes protecting against man-in-the-middle attacks, session hijacking, and the insertion of false information into communications sessions. This requirement addresses communications protection at the session versus packet level (e.g., sessions in service-oriented architectures providing web-based services) and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted.
[SP 800-77], [SP 800-95], and [SP 800-113] provide guidance on secure communications sessions.
[SP 800-58] provides guidance on Voice Over IP Systems.
Upon assessment, assessors must determine if-
Determine if the authenticity of communications sessions is protected.
Assessors are instructed to-
Examine: [SELECT FROM: System and communications protection policy; procedures addressing session authenticity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities].
Test: [SELECT FROM: Mechanisms supporting or implementing session authenticity].
FURTHER DISCUSSION
The intent of this requirement is to ensure a trust relationship is established between both ends of a communication session. Each end can be assured that the other end is who it is supposed to be. This is often implemented using a mutual authentication handshake when the session is established, especially between devices. Session authenticity is usually provided by a security protocol enforced for a communication session. Choosing and enforcing a protocol will provide authenticity throughout a communications session.
Example
You are a system administrator responsible for ensuring that the two-factor user authentication mechanism for the servers is configured correctly. You purchase and maintain the digital certificate and replace it with a new one before the old one expires. You ensure the TLS configuration settings on the web servers, VPN solution, and other components that use TLS are correct, using secure settings that address risks against attacks on the encrypted sessions [a].
Potential Assessment Considerations
Is a communications protocol used that ensures the sending and receiving parties do not change during a communications session [a]?
Are controls in place to validate the identities and information transmitted to protect against man-in-the-middle attacks, session hijacking, and insertion of false information into communications sessions [a]?
Frameworks & Controls
3.13: System and Communications Protection
3.13.3: Separate user functionality from system management functionality.
3.13.4: Prevent unauthorized and unintended information transfer via shared system resources
3.13.11: Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
3.13.14: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.