NIST SP 800-52 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
3.13 3.13.15 System and Communications Protection
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2.pdf
This Special Publication provides guidance to the selection and configuration of TLS protocol implementations while making effective use of Approved cryptographic schemes and algorithms.
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home?element=SC-10
NIST resource that defines requirements for proper termination of network connections for predefined sessions time or period of inactivity.
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home?element=SC-19
This special publication from NIST provides guidance on Voice Over Internet Protocol (VoIP).
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home?element=SC-2
This special publication from NIST provides guidance on application partitioning.
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home?element=SC-23
This special publication from NIST provides an overview of session authenticity.
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home?element=SC-28
NIST resource that define requirements for proper protection of information at rest (e.g, encryption, off-line storage, physical protection)
https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_0/home?element=SC-7
The information system: a. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; b. Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and c. Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
NIST SP 800-53: SC-8 Transmission Confidentiality and Integrity
3.13 3.13.16
https://nvd.nist.gov/800-53/Rev4/control/SC-8
NIST resource that define requirements for proper protection of confidentiality and integrity of transmitted information.
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-58.pdf
This publication describes VOIP, its security challenges, and potential countermeasures for related vulnerabilities.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-77r1.pdf
This NIST Special Publication offers recommendations for designing, configuring, and managing IPSec VPN solutions.