SDN Controller Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1 ✎ 4
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-100101 Medium The SDN controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Content changes 4
- V-80763 Medium checkfix The SDN controller must be configured to produce audit records containing information to establish where the events occurred.
- V-80765 Medium checkfix The SDN controller must be configured to produce audit records containing information to establish the source of the events.
- V-80779 Medium description The SDN controller must be configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
- V-80797 Medium description SDN controller must be configured to forward traffic based on security requirements.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-NET-000015-SDN-000010
- Vuln IDs
-
- V-80755
- Rule IDs
-
- SV-95465r1_rule
Checks: C-80491r1_chk
Review the SDN configuration and verify that RBAC rules have been implemented to control access to system resources within the SDN framework. If the SDN controller is not configured to enforce approved authorizations for access to system resources, this is a finding.
Fix: F-87609r1_fix
Configure the SDN controller to utilize RBAC rules to enforce approved authorizations for access to system resources.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-SDN-000015
- Vuln IDs
-
- V-80757
- Rule IDs
-
- SV-95467r1_rule
Checks: C-80493r1_chk
Review the SDN controller configuration to determine if it creates and distributes forwarding table flow entries based on organization-defined information flow control policies. The implementation could be driven by a service application via the northbound API that contains the flow control policy and forwarding rules. If the SDN controller is not configured to enforce approved authorizations for controlling the flow of traffic within the network based on organization-defined information flow control policies, this is a finding.
Fix: F-87611r1_fix
Configure the SDN controller to create and distribute forwarding table flow entries based on organization-defined information flow control policies. The implementation could be driven by a service application via the northbound API that contains the flow control policy and forwarding rules.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-SDN-000120
- Vuln IDs
-
- V-80759
- Rule IDs
-
- SV-95469r1_rule
Checks: C-80495r1_chk
Review the SDN controller configuration to determine if the audit records will note the type of event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish what type of events occurred, this is a finding.
Fix: F-87613r1_fix
Configure the SDN controller to include the type of event in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-SDN-000125
- Vuln IDs
-
- V-80761
- Rule IDs
-
- SV-95471r1_rule
Checks: C-80497r1_chk
Review the SDN controller configuration to determine if the audit records will note the date and time of the event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish when (i.e., date and time) the events occurred, this is a finding.
Fix: F-87615r2_fix
Configure the SDN controller to include the date and time in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-SDN-000130
- Vuln IDs
-
- V-80763
- Rule IDs
-
- SV-95473r1_rule
Checks: C-80499r2_chk
Review the SDN controller configuration to determine if the audit records will note where (e.g., service, interface, node, link, etc.) the event that is being logged occurred. If the SDN controller is not configured to produce audit records containing information to establish where (e.g., service, interface, node, link, etc.) the events occurred, this is a finding.
Fix: F-87617r2_fix
Configure the SDN controller to include where (e.g., service, interface, node, link, etc.) the event occurred in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-SDN-000135
- Vuln IDs
-
- V-80765
- Rule IDs
-
- SV-95475r1_rule
Checks: C-80501r2_chk
Review the SDN controller configuration to determine if the audit records will note the source (e.g., flow, API, IP address, etc.) the event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish the source (e.g., flow, API, IP address, etc.) of the events, this is a finding.
Fix: F-87619r2_fix
Configure the SDN controller to include the source (e.g., flow, API, IP address, etc.) of the event in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-SDN-000140
- Vuln IDs
-
- V-80767
- Rule IDs
-
- SV-95477r1_rule
Checks: C-80503r1_chk
Review the SDN controller configuration to determine if the audit records will note the outcome (i.e. packet allowed, packet dropped, link down, etc.) the event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish the outcome (i.e. packet allowed, packet dropped, link down, etc.) of the events, this is a finding.
Fix: F-87621r1_fix
Configure the SDN controller to include the outcome (i.e. packet allowed, packet dropped, link down, etc.) of the event in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-SDN-000145
- Vuln IDs
-
- V-80769
- Rule IDs
-
- SV-95479r1_rule
Checks: C-80505r1_chk
Review the SDN controller configuration to determine if the audit records will contain the identity of any individual or process associated with an event that is being logged. If the SDN controller is not configured to produce audit records containing the identity of any individual or process associated with an event being logged, this is a finding.
Fix: F-87623r1_fix
Configure the SDN controller to the identity of any individual or process associated with an event in the log records.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-SDN-000200
- Vuln IDs
-
- V-80771
- Rule IDs
-
- SV-95481r1_rule
Checks: C-80507r1_chk
Review the SDN controller configuration to determine if services or functions not required for SDN controller operation are enabled. If unnecessary services and functions are enabled on the SDN controller, this is a finding.
Fix: F-87625r1_fix
Remove unneeded services and functions from the SDN configuration. Removal is recommended because the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-SDN-000285
- Vuln IDs
-
- V-80773
- Rule IDs
-
- SV-95483r1_rule
Checks: C-80509r2_chk
Review the SDN controller configuration to verify that it is configured to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding DoS attack. The implementation could be driven by a service application via the northbound API that contains the policy. If the SDN controller is not configured to enforce a policy to manage bandwidth and limit the effect of a packet-flooding DoS attack, this is a finding.
Fix: F-87627r1_fix
Configure the SDN controller to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding Denial of Service (DoS) attack. This can be implemented via northbound API from a service application containing the policy.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-SDN-000365
- Vuln IDs
-
- V-80775
- Rule IDs
-
- SV-95485r1_rule
Checks: C-80511r1_chk
Review the SDN controller configuration to determine if it is configured to peer with one or more controllers in an active/active or active/passive failover mode. If the SDN controller is not configured to be deployed as a cluster in active/active or active/passive mode, this is a finding.
Fix: F-87629r1_fix
Configure the SDN controller to peer with one or more controllers in an active/active or active/passive failover mode.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-SDN-000720
- Vuln IDs
-
- V-80777
- Rule IDs
-
- SV-95487r1_rule
Checks: C-80513r1_chk
Review the SDN controller configuration to determine if it is configured to rate-limit control-plane messages. If the SDN controller is not configured to rate-limit control-plane messages, this is a finding.
Fix: F-87631r1_fix
Configure the SDN controller to rate-limit control-plane messages.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-SDN-000730
- Vuln IDs
-
- V-80779
- Rule IDs
-
- SV-95489r1_rule
Checks: C-80515r1_chk
Review the SDN configuration to determine if it enforces perimeter security by deploying strict flow entries to the SDN-enabled edge routers to only allow incoming traffic that is authorized. If the SDN controller is not configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations, this is a finding.
Fix: F-87633r1_fix
Configure the SDN controller to enforce perimeter security by deploying strict flow entries to the SDN-enabled edge routers to only allow incoming traffic that is authorized.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-NET-000512-SDN-001020
- Vuln IDs
-
- V-80781
- Rule IDs
-
- SV-95491r1_rule
Checks: C-80517r1_chk
Review the SDN configuration, verify that it is configured to authenticate received southbound API control-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. If the SDN controller is not configured to authenticate received southbound API control-plane messages using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-87635r1_fix
Configure the SDN controller to authenticate southbound API control-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the CMAC and the HMAC. AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-NET-000512-SDN-001025
- Vuln IDs
-
- V-80783
- Rule IDs
-
- SV-95493r1_rule
Checks: C-80519r1_chk
Review the SDN configuration verify that it is configured to authenticate received northbound API messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. If the SDN controller is not configured to authenticate northbound API messages received from business applications and management systems using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-87637r1_fix
Configure the SDN controller to authenticate received northbound API messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the CMAC and the HMAC. AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000512-SDN-001030
- Vuln IDs
-
- V-80785
- Rule IDs
-
- SV-95495r1_rule
Checks: C-80521r1_chk
Determine if the southbound API control-plane traffic traverses an out-of-band path. If not, review the SDN controller configuration to verify that southbound API management-plane traffic is encrypted using a using a FIPS-validated cryptographic module. If the southbound API control-plane traffic does not traverse an out-of-band path or is not encrypted using a using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-87639r1_fix
Deploy an out-of-band network to provision paths between SDN controller and SDN-enabled devices as well as all hypervisor hosts that compose the SDN infrastructure to provide transport for southbound API control-plane traffic. An alternative is to configure the SDN controller to encrypt all southbound API control-plane traffic using a using a FIPS-validated cryptographic module. Implement a cryptographic module which has a validation certification and is listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000512-SDN-001035
- Vuln IDs
-
- V-80787
- Rule IDs
-
- SV-95497r1_rule
Checks: C-80523r1_chk
Determine if the northbound API traffic traverses an out-of-band path. If not, review the SDN controller configuration to verify that northbound API traffic is encrypted using a using a FIPS-validated cryptographic module. If northbound API traffic does not traverse an out-of-band path and is not encrypted using a using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-87641r1_fix
Deploy an out-of-band network to provision paths between the SDN controller and the SDN management/orchestration systems for providing transport for northbound API traffic. An alternative is to configure the SDN controller to encrypt all northbound API traffic using a FIPS-validated cryptographic module. Implement a cryptographic module which has a validation certification and is listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-NET-000512-SDN-001040
- Vuln IDs
-
- V-80789
- Rule IDs
-
- SV-95499r1_rule
Checks: C-80525r1_chk
Review the SDN configuration, verify that it is configured to authenticate received southbound API management-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. If the SDN controller is not configured to authenticate received southbound API management-plane messages using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-87643r1_fix
Configure the SDN controller to authenticate southbound API management-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the CMAC and the HMAC. AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000512-SDN-001045
- Vuln IDs
-
- V-80791
- Rule IDs
-
- SV-95501r1_rule
Checks: C-80527r2_chk
Determine if the southbound API management-plane traffic traverses an out-of-band path. If not, review the SDN controller configuration to verify that southbound API management-plane traffic is encrypted using a using a FIPS-validated cryptographic module. If the southbound API management-plane traffic does not traverse an out-of-band path and is not encrypted using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-87645r1_fix
Deploy an out-of-band network to provision paths between SDN controller and SDN-enabled devices as well as all hypervisor hosts that compose the SDN infrastructure to provide transport for southbound API management-plane traffic. An alternative is to configure the SDN controller to encrypt all southbound API management-plane traffic using a FIPS-validated cryptographic module. Implement a cryptographic module which has a validation certification and is listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001050
- Vuln IDs
-
- V-80793
- Rule IDs
-
- SV-95503r1_rule
Checks: C-80529r1_chk
Review the SDN controller configuration to determine if it is configured to peer with one or more controllers. Also verify that the controller resides on a different physical host than any of its peers. If the SDN controller is not configured to be deployed as a cluster and on separate physical hosts, this is a finding.
Fix: F-87647r1_fix
Deploy the SDN controller as a cluster using on a separate physical hosts to eliminate single point of failure. Configure the SDN controller to peer with one or more controllers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001055
- Vuln IDs
-
- V-80795
- Rule IDs
-
- SV-95505r1_rule
Checks: C-80531r1_chk
Review the SDN controller configuration to determine if it is configured to enable reactive flow setup. If the SDN Controller is not configured to notify the forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries, this is a finding.
Fix: F-87649r1_fix
Configure the SDN controller to enable reactive flow setup so that the controller will notify a forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001060
- Vuln IDs
-
- V-80797
- Rule IDs
-
- SV-95507r1_rule
Checks: C-80533r1_chk
Review the SDN controller configuration to determine if it is configured to forward traffic based on security requirements that have been provided from a security service or policy engine via the northbound API. If the SDN Controller is not configured to forward traffic based on security requirements, this is a finding.
Fix: F-87651r1_fix
Configure the SDN controller to forward traffic based on security requirements.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001065
- Vuln IDs
-
- V-80799
- Rule IDs
-
- SV-95509r1_rule
Checks: C-80535r1_chk
Review the SDN controller configuration to determine if it is configured to deploy dedicated instances of virtual networks and separate forwarding tables to the provisioned network elements belonging to each tenant. If the SDN Controller is not configured to enable multi-tenant virtual networks to be fully isolated from one another, this is a finding.
Fix: F-87653r1_fix
Configure the SDN controller to deploy dedicated instances of virtual networks and separate forwarding tables to the provisioned network elements belonging to each tenant.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-NET-000512-SDN-001070
- Vuln IDs
-
- V-80801
- Rule IDs
-
- SV-95511r1_rule
Checks: C-80537r1_chk
Review the SDN controller configuration to determine whether tenant functionality is separated from system management functionality using separated instances within the controller framework as well as Role-based access control (RBAC). If the SDN controller is not configured to separate tenant functionality from system management functionality, this is a finding.
Fix: F-87655r1_fix
Configure the SDN controller to have tenant functionality separated from system management functionality using separated instances within the controller framework as well as Role-based access control (RBAC).
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-NET-000512-SDN-001075
- Vuln IDs
-
- V-80803
- Rule IDs
-
- SV-95513r1_rule
Checks: C-80539r1_chk
Review the SDN controller configuration to determine whether objects and code implementing security functionality are isolated from non-security functionality objects and code. Role-based access control (RBAC) must also be configured to restrict access to all security functionality. If security-related objects and code are not kept separate and are not configured with RBAC access restriction, this is a finding.
Fix: F-87657r1_fix
Configure the SDN controller to isolate objects and code implementing RBAC to restrict access to security functionality from non-security functionality objects and code.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000512-SDN-001080
- Vuln IDs
-
- V-80805
- Rule IDs
-
- SV-95515r1_rule
Checks: C-80541r1_chk
Review the SDN controller configuration to determine that error messages do not contain information beyond what is needed for troubleshooting controller and network problems. If the controller is not configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries, this is a finding.
Fix: F-87659r1_fix
Configure the SDN controller to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- RMF Control
- SI-5
- Severity
- M
- CCI
- CCI-002694
- Version
- SRG-NET-000512-SDN-001085
- Vuln IDs
-
- V-80807
- Rule IDs
-
- SV-95517r1_rule
Checks: C-80543r1_chk
Review the SDN controller configuration to determine if it is configured to notify the ISSO and ISSM of failed security verification tests. If the SDN controller is not configured to notify the ISSO and ISSM of failed security verification tests, this is a finding. Note: The organization defines the system transitional states when the SDN controller will verify correct operation of the security functions.
Fix: F-87661r1_fix
Configure the SDN controller to notify the ISSO and ISSM of failed security verification tests. Note: DoD activities should also notify the Regional Cyber Center (RCC). Note: The organization defines the system transitional states when the SDN controller will verify correct operation of the security functions.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-NET-000512-SDN-001090
- Vuln IDs
-
- V-80809
- Rule IDs
-
- SV-95519r1_rule
Checks: C-80545r2_chk
Review documentation of non-administrative users who have been given access permissions to install, modify, or replace software modules within the SDN controller framework. Review the SDN controller configuration to determine that only authorized users have the permissions to install, modify, or replace software modules. If the SDN controller is not configured to revoke unauthorized attempts to install, modify, or replace software modules, this is a finding.
Fix: F-87663r2_fix
Document the approval for non-administrative users who require the ability to install, modify, or replace software modules within the SDN controller framework. Configure the SDN controller to revoke the installation of software modules by any unapproved permissions or access levels.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-NET-000512-SDN-001095
- Vuln IDs
-
- V-80811
- Rule IDs
-
- SV-95521r1_rule
Checks: C-80547r1_chk
Review the SDN controller configuration to determine if it is configured to restrict access to the configuration. If the SDN controller is not configured to enforce access restrictions associated with changes to the configuration, this is a finding.
Fix: F-87665r1_fix
Configure the SDN controller to restrict access to the configuration.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-NET-000512-SDN-001100
- Vuln IDs
-
- V-80813
- Rule IDs
-
- SV-95523r1_rule
Checks: C-80549r1_chk
Review the SDN controller configuration to determine if it is configured to audit enforcement actions used to restrict access associated with changes to any application. If the SDN controller is not configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework, this is a finding.
Fix: F-87667r1_fix
Configure the SDN controller to audit enforcement actions used to restrict access associated with changes to any application.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-002000
- Vuln IDs
-
- V-100101
- Rule IDs
-
- SV-109205r1_rule
Checks: C-98953r1_chk
Determine if the SDN controller is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-105787r1_fix
Configure the SDN controller to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.