SDN Controller Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +34 −31
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 34
- V-206715 Medium The SDN controller must be configured to enforce approved authorizations for access to system resources in accordance with applicable access control policies.
- V-206716 Medium The SDN controller must be configured to enforce approved authorizations for controlling the flow of traffic within the network based on organization-defined information flow control policies.
- V-206717 Medium The SDN controller must be configured to produce audit records containing information to establish what type of events occurred.
- V-206718 Medium The SDN controller must be configured to produce audit records containing information to establish when the events occurred.
- V-206719 Medium The SDN controller must be configured to produce audit records containing information to establish where the events occurred.
- V-206720 Medium The SDN controller must be configured to produce audit records containing information to establish the source of the events.
- V-206721 Medium The SDN controller must be configured to produce audit records containing information to establish the outcome of the events.
- V-206722 Medium The SDN controller must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.
- V-206723 Medium The SDN controller must be configured to disable non-essential capabilities.
- V-206724 Medium The SDN controller must be configured to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding Denial of Service (DoS) attack.
- V-206725 Medium The SDN controllers must be configured as a cluster in active/active or active/passive mode to preserve any information necessary to determine cause of a system failure and to maintain network operations with least disruption to workload processes and flows.
- V-206726 Medium The SDN controller must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by rate-limiting control-plane communications.
- V-206727 Medium The SDN controller must be configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
- V-206728 High The SDN controller must be configured to authenticate southbound Application Program Interface (API) control-plane messages received from SDN-enabled network elements using a FIPS-approved message authentication code algorithm.
- V-206729 High The SDN controller must be configured to authenticate northbound Application Program Interface (API) messages received from business applications and management systems using a FIPS-approved message authentication code algorithm.
- V-206730 High The SDN controller must be configured to encrypt all southbound Application Program Interface (API) control-plane messages using a FIPS-validated cryptographic module.
- V-206731 High The SDN controller must be configured to encrypt all northbound Application Program Interface (API) messages using a FIPS-validated cryptographic module.
- V-206732 High The SDN controller must be configured to authenticate received southbound Application Program Interface (API) management-plane messages using a FIPS-approved message authentication code algorithm.
- V-206733 High The SDN controller must be configured to encrypt all southbound Application Program Interface (API) management-plane messages using a FIPS-validated cryptographic module.
- V-206734 Medium The SDN controller must be configured to be deployed as a cluster and on separate physical hosts.
- V-206735 Medium The SDN Controller must be configured to notify the forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries.
- V-206736 Medium SDN controller must be configured to forward traffic based on security requirements.
- V-206737 Medium The SDN controller must be configured to enable multi-tenant virtual networks to be fully isolated from one another.
- V-206738 Medium The SDN controller must be configured to separate tenant functionality from system management functionality.
- V-206739 Medium The SDN controller must be configured to isolate security functions from non-security functions.
- V-206740 Medium The SDN controller must be configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- V-206741 Medium The SDN controller must be configured to notify the ISSO and ISSM of failed verification tests for organization-defined security functions.
- V-206742 Medium The SDN controller must be configured to prohibit user installation of software without explicit privileged status.
- V-206743 Medium The SDN controller must be configured to enforce access restrictions associated with changes to the configuration.
- V-206744 Medium The SDN controller must be configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework.
- V-216509 Medium The SDN controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-264312 Medium The SDN controller must be configured to employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.
- V-264313 Medium The SDN controller must be configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- V-264314 Medium The SDN controller must be configured to establish organization-defined alternate communications paths for system operations organizational command and control.
Removed rules 31
- V-100101 Medium The SDN controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-80755 Medium The SDN controller must be configured to enforce approved authorizations for access to system resources in accordance with applicable access control policies.
- V-80757 Medium The SDN controller must be configured to enforce approved authorizations for controlling the flow of traffic within the network based on organization-defined information flow control policies.
- V-80759 Medium The SDN controller must be configured to produce audit records containing information to establish what type of events occurred.
- V-80761 Medium The SDN controller must be configured to produce audit records containing information to establish when the events occurred.
- V-80763 Medium The SDN controller must be configured to produce audit records containing information to establish where the events occurred.
- V-80765 Medium The SDN controller must be configured to produce audit records containing information to establish the source of the events.
- V-80767 Medium The SDN controller must be configured to produce audit records containing information to establish the outcome of the events.
- V-80769 Medium The SDN controller must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.
- V-80771 Medium The SDN controller must be configured to disable non-essential capabilities.
- V-80773 Medium The SDN controller must be configured to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding Denial of Service (DoS) attack.
- V-80775 Medium The SDN controllers must be configured as a cluster in active/active or active/passive mode to preserve any information necessary to determine cause of a system failure and to maintain network operations with least disruption to workload processes and flows.
- V-80777 Medium The SDN controller must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by rate-limiting control-plane communications.
- V-80779 Medium The SDN controller must be configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
- V-80781 High The SDN controller must be configured to authenticate southbound Application Program Interface (API) control-plane messages received from SDN-enabled network elements using a FIPS-approved message authentication code algorithm.
- V-80783 High The SDN controller must be configured to authenticate northbound Application Program Interface (API) messages received from business applications and management systems using a FIPS-approved message authentication code algorithm.
- V-80785 High The SDN controller must be configured to encrypt all southbound Application Program Interface (API) control-plane messages using a FIPS-validated cryptographic module.
- V-80787 High The SDN controller must be configured to encrypt all northbound Application Program Interface (API) messages using a FIPS-validated cryptographic module.
- V-80789 High The SDN controller must be configured to authenticate received southbound Application Program Interface (API) management-plane messages using a FIPS-approved message authentication code algorithm.
- V-80791 High The SDN controller must be configured to encrypt all southbound Application Program Interface (API) management-plane messages using a FIPS-validated cryptographic module.
- V-80793 Medium The SDN controller must be configured to be deployed as a cluster and on separate physical hosts.
- V-80795 Medium The SDN Controller must be configured to notify the forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries.
- V-80797 Medium SDN controller must be configured to forward traffic based on security requirements.
- V-80799 Medium The SDN controller must be configured to enable multi-tenant virtual networks to be fully isolated from one another.
- V-80801 Medium The SDN controller must be configured to separate tenant functionality from system management functionality.
- V-80803 Medium The SDN controller must be configured to isolate security functions from non-security functions.
- V-80805 Medium The SDN controller must be configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- V-80807 Medium The SDN controller must be configured to notify the ISSO and ISSM of failed verification tests for organization-defined security functions.
- V-80809 Medium The SDN controller must be configured to prohibit user installation of software without explicit privileged status.
- V-80811 Medium The SDN controller must be configured to enforce access restrictions associated with changes to the configuration.
- V-80813 Medium The SDN controller must be configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-NET-000015-SDN-000010
- Vuln IDs
-
- V-206715
- V-80755
- Rule IDs
-
- SV-206715r382729_rule
- SV-95465
Checks: C-6972r363083_chk
Review the SDN configuration and verify that RBAC rules have been implemented to control access to system resources within the SDN framework. If the SDN controller is not configured to enforce approved authorizations for access to system resources, this is a finding.
Fix: F-6972r363084_fix
Configure the SDN controller to utilize RBAC rules to enforce approved authorizations for access to system resources.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-SDN-000015
- Vuln IDs
-
- V-206716
- V-80757
- Rule IDs
-
- SV-206716r382732_rule
- SV-95467
Checks: C-6973r363086_chk
Review the SDN controller configuration to determine if it creates and distributes forwarding table flow entries based on organization-defined information flow control policies. The implementation could be driven by a service application via the northbound API that contains the flow control policy and forwarding rules. If the SDN controller is not configured to enforce approved authorizations for controlling the flow of traffic within the network based on organization-defined information flow control policies, this is a finding.
Fix: F-6973r363087_fix
Configure the SDN controller to create and distribute forwarding table flow entries based on organization-defined information flow control policies. The implementation could be driven by a service application via the northbound API that contains the flow control policy and forwarding rules.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-SDN-000120
- Vuln IDs
-
- V-206717
- V-80759
- Rule IDs
-
- SV-206717r382855_rule
- SV-95469
Checks: C-6974r363089_chk
Review the SDN controller configuration to determine if the audit records will note the type of event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish what type of events occurred, this is a finding.
Fix: F-6974r363090_fix
Configure the SDN controller to include the type of event in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-SDN-000125
- Vuln IDs
-
- V-206718
- V-80761
- Rule IDs
-
- SV-206718r382858_rule
- SV-95471
Checks: C-6975r363092_chk
Review the SDN controller configuration to determine if the audit records will note the date and time of the event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish when (i.e., date and time) the events occurred, this is a finding.
Fix: F-6975r363093_fix
Configure the SDN controller to include the date and time in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-SDN-000130
- Vuln IDs
-
- V-206719
- V-80763
- Rule IDs
-
- SV-206719r382861_rule
- SV-95473
Checks: C-6976r363095_chk
Review the SDN controller configuration to determine if the audit records will note where (e.g., service, interface, node, link, etc.) the event that is being logged occurred. If the SDN controller is not configured to produce audit records containing information to establish where (e.g., service, interface, node, link, etc.) the events occurred, this is a finding.
Fix: F-6976r363096_fix
Configure the SDN controller to include where (e.g., service, interface, node, link, etc.) the event occurred in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-SDN-000135
- Vuln IDs
-
- V-206720
- V-80765
- Rule IDs
-
- SV-206720r382864_rule
- SV-95475
Checks: C-6977r363098_chk
Review the SDN controller configuration to determine if the audit records will note the source (e.g., flow, API, IP address, etc.) the event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish the source (e.g., flow, API, IP address, etc.) of the events, this is a finding.
Fix: F-6977r363099_fix
Configure the SDN controller to include the source (e.g., flow, API, IP address, etc.) of the event in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-SDN-000140
- Vuln IDs
-
- V-206721
- V-80767
- Rule IDs
-
- SV-206721r382867_rule
- SV-95477
Checks: C-6978r363101_chk
Review the SDN controller configuration to determine if the audit records will note the outcome (i.e. packet allowed, packet dropped, link down, etc.) the event that is being logged. If the SDN controller is not configured to produce audit records containing information to establish the outcome (i.e. packet allowed, packet dropped, link down, etc.) of the events, this is a finding.
Fix: F-6978r363102_fix
Configure the SDN controller to include the outcome (i.e. packet allowed, packet dropped, link down, etc.) of the event in the log records.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-SDN-000145
- Vuln IDs
-
- V-206722
- V-80769
- Rule IDs
-
- SV-206722r382870_rule
- SV-95479
Checks: C-6979r363104_chk
Review the SDN controller configuration to determine if the audit records will contain the identity of any individual or process associated with an event that is being logged. If the SDN controller is not configured to produce audit records containing the identity of any individual or process associated with an event being logged, this is a finding.
Fix: F-6979r363105_fix
Configure the SDN controller to the identity of any individual or process associated with an event in the log records.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-SDN-000200
- Vuln IDs
-
- V-206723
- V-80771
- Rule IDs
-
- SV-206723r382903_rule
- SV-95481
Checks: C-6980r363107_chk
Review the SDN controller configuration to determine if services or functions not required for SDN controller operation are enabled. If unnecessary services and functions are enabled on the SDN controller, this is a finding.
Fix: F-6980r363108_fix
Remove unneeded services and functions from the SDN configuration. Removal is recommended because the service or function may be inadvertently enabled otherwise. However, if removal is not possible, disable the service or function.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000193-SDN-000285
- Vuln IDs
-
- V-206724
- V-80773
- Rule IDs
-
- SV-206724r385534_rule
- SV-95483
Checks: C-6981r363110_chk
Review the SDN controller configuration to verify that it is configured to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding DoS attack. The implementation could be driven by a service application via the northbound API that contains the policy. If the SDN controller is not configured to enforce a policy to manage bandwidth and limit the effect of a packet-flooding DoS attack, this is a finding.
Fix: F-6981r363111_fix
Configure the SDN controller to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding Denial of Service (DoS) attack. This can be implemented via northbound API from a service application containing the policy.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-SDN-000365
- Vuln IDs
-
- V-206725
- V-80775
- Rule IDs
-
- SV-206725r539658_rule
- SV-95485
Checks: C-6982r363113_chk
Review the SDN controller configuration to determine if it is configured to peer with one or more controllers in an active/active or active/passive failover mode. If the SDN controller is not configured to be deployed as a cluster in active/active or active/passive mode, this is a finding.
Fix: F-6982r363114_fix
Configure the SDN controller to peer with one or more controllers in an active/active or active/passive failover mode.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-SDN-000720
- Vuln IDs
-
- V-206726
- V-80777
- Rule IDs
-
- SV-206726r856676_rule
- SV-95487
Checks: C-6983r363116_chk
Review the SDN controller configuration to determine if it is configured to rate-limit control-plane messages. If the SDN controller is not configured to rate-limit control-plane messages, this is a finding.
Fix: F-6983r363117_fix
Configure the SDN controller to rate-limit control-plane messages.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- SRG-NET-000364-SDN-000730
- Vuln IDs
-
- V-206727
- V-80779
- Rule IDs
-
- SV-206727r856677_rule
- SV-95489
Checks: C-6984r363119_chk
Review the SDN configuration to determine if it enforces perimeter security by deploying strict flow entries to the SDN-enabled edge routers to only allow incoming traffic that is authorized. If the SDN controller is not configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations, this is a finding.
Fix: F-6984r363120_fix
Configure the SDN controller to enforce perimeter security by deploying strict flow entries to the SDN-enabled edge routers to only allow incoming traffic that is authorized.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-NET-000512-SDN-001020
- Vuln IDs
-
- V-206728
- V-80781
- Rule IDs
-
- SV-206728r385561_rule
- SV-95491
Checks: C-6985r363122_chk
Review the SDN configuration, verify that it is configured to authenticate received southbound API control-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. If the SDN controller is not configured to authenticate received southbound API control-plane messages using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-6985r363123_fix
Configure the SDN controller to authenticate southbound API control-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the CMAC and the HMAC. AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-NET-000512-SDN-001025
- Vuln IDs
-
- V-206729
- V-80783
- Rule IDs
-
- SV-206729r385561_rule
- SV-95493
Checks: C-6986r363125_chk
Review the SDN configuration verify that it is configured to authenticate received northbound API messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. If the SDN controller is not configured to authenticate northbound API messages received from business applications and management systems using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-6986r363126_fix
Configure the SDN controller to authenticate received northbound API messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the CMAC and the HMAC. AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000512-SDN-001030
- Vuln IDs
-
- V-206730
- V-80785
- Rule IDs
-
- SV-206730r385561_rule
- SV-95495
Checks: C-6987r363128_chk
Determine if the southbound API control-plane traffic traverses an out-of-band path. If not, review the SDN controller configuration to verify that southbound API management-plane traffic is encrypted using a using a FIPS-validated cryptographic module. If the southbound API control-plane traffic does not traverse an out-of-band path or is not encrypted using a using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-6987r363129_fix
Deploy an out-of-band network to provision paths between SDN controller and SDN-enabled devices as well as all hypervisor hosts that compose the SDN infrastructure to provide transport for southbound API control-plane traffic. An alternative is to configure the SDN controller to encrypt all southbound API control-plane traffic using a using a FIPS-validated cryptographic module. Implement a cryptographic module which has a validation certification and is listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000512-SDN-001035
- Vuln IDs
-
- V-206731
- V-80787
- Rule IDs
-
- SV-206731r385561_rule
- SV-95497
Checks: C-6988r363131_chk
Determine if the northbound API traffic traverses an out-of-band path. If not, review the SDN controller configuration to verify that northbound API traffic is encrypted using a using a FIPS-validated cryptographic module. If northbound API traffic does not traverse an out-of-band path and is not encrypted using a using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-6988r363132_fix
Deploy an out-of-band network to provision paths between the SDN controller and the SDN management/orchestration systems for providing transport for northbound API traffic. An alternative is to configure the SDN controller to encrypt all northbound API traffic using a FIPS-validated cryptographic module. Implement a cryptographic module which has a validation certification and is listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-NET-000512-SDN-001040
- Vuln IDs
-
- V-206732
- V-80789
- Rule IDs
-
- SV-206732r385561_rule
- SV-95499
Checks: C-6989r363134_chk
Review the SDN configuration, verify that it is configured to authenticate received southbound API management-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the cipher-based message authentication code (CMAC) and the keyed-hash message authentication code (HMAC). AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256. If the SDN controller is not configured to authenticate received southbound API management-plane messages using a FIPS-approved message authentication code algorithm, this is a finding.
Fix: F-6989r363135_fix
Configure the SDN controller to authenticate southbound API management-plane messages using a FIPS-approved message authentication code algorithm. FIPS-approved algorithms for authentication are the CMAC and the HMAC. AES and 3DES are NIST-approved CMAC algorithms. The following are NIST-approved HMAC algorithms: SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000512-SDN-001045
- Vuln IDs
-
- V-206733
- V-80791
- Rule IDs
-
- SV-206733r385561_rule
- SV-95501
Checks: C-6990r363137_chk
Determine if the southbound API management-plane traffic traverses an out-of-band path. If not, review the SDN controller configuration to verify that southbound API management-plane traffic is encrypted using a using a FIPS-validated cryptographic module. If the southbound API management-plane traffic does not traverse an out-of-band path and is not encrypted using a FIPS-validated cryptographic module, this is a finding. Note: FIPS-validated cryptographic modules are listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
Fix: F-6990r363138_fix
Deploy an out-of-band network to provision paths between SDN controller and SDN-enabled devices as well as all hypervisor hosts that compose the SDN infrastructure to provide transport for southbound API management-plane traffic. An alternative is to configure the SDN controller to encrypt all southbound API management-plane traffic using a FIPS-validated cryptographic module. Implement a cryptographic module which has a validation certification and is listed on the NIST Cryptographic Module Validation Program's (CMVP) validation list.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001050
- Vuln IDs
-
- V-206734
- V-80793
- Rule IDs
-
- SV-206734r385561_rule
- SV-95503
Checks: C-6991r363140_chk
Review the SDN controller configuration to determine if it is configured to peer with one or more controllers. Also verify that the controller resides on a different physical host than any of its peers. If the SDN controller is not configured to be deployed as a cluster and on separate physical hosts, this is a finding.
Fix: F-6991r363141_fix
Deploy the SDN controller as a cluster using on a separate physical hosts to eliminate single point of failure. Configure the SDN controller to peer with one or more controllers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001055
- Vuln IDs
-
- V-206735
- V-80795
- Rule IDs
-
- SV-206735r385561_rule
- SV-95505
Checks: C-6992r363143_chk
Review the SDN controller configuration to determine if it is configured to enable reactive flow setup. If the SDN Controller is not configured to notify the forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries, this is a finding.
Fix: F-6992r363144_fix
Configure the SDN controller to enable reactive flow setup so that the controller will notify a forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001060
- Vuln IDs
-
- V-206736
- V-80797
- Rule IDs
-
- SV-206736r385561_rule
- SV-95507
Checks: C-6993r363146_chk
Review the SDN controller configuration to determine if it is configured to forward traffic based on security requirements that have been provided from a security service or policy engine via the northbound API. If the SDN Controller is not configured to forward traffic based on security requirements, this is a finding.
Fix: F-6993r363147_fix
Configure the SDN controller to forward traffic based on security requirements.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-001065
- Vuln IDs
-
- V-206737
- V-80799
- Rule IDs
-
- SV-206737r385561_rule
- SV-95509
Checks: C-6994r363149_chk
Review the SDN controller configuration to determine if it is configured to deploy dedicated instances of virtual networks and separate forwarding tables to the provisioned network elements belonging to each tenant. If the SDN Controller is not configured to enable multi-tenant virtual networks to be fully isolated from one another, this is a finding.
Fix: F-6994r363150_fix
Configure the SDN controller to deploy dedicated instances of virtual networks and separate forwarding tables to the provisioned network elements belonging to each tenant.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-NET-000512-SDN-001070
- Vuln IDs
-
- V-206738
- V-80801
- Rule IDs
-
- SV-206738r385561_rule
- SV-95511
Checks: C-6995r363152_chk
Review the SDN controller configuration to determine whether tenant functionality is separated from system management functionality using separated instances within the controller framework as well as Role-based access control (RBAC). If the SDN controller is not configured to separate tenant functionality from system management functionality, this is a finding.
Fix: F-6995r363153_fix
Configure the SDN controller to have tenant functionality separated from system management functionality using separated instances within the controller framework as well as Role-based access control (RBAC).
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-NET-000512-SDN-001075
- Vuln IDs
-
- V-206739
- V-80803
- Rule IDs
-
- SV-206739r385561_rule
- SV-95513
Checks: C-6996r363155_chk
Review the SDN controller configuration to determine whether objects and code implementing security functionality are isolated from non-security functionality objects and code. Role-based access control (RBAC) must also be configured to restrict access to all security functionality. If security-related objects and code are not kept separate and are not configured with RBAC access restriction, this is a finding.
Fix: F-6996r363156_fix
Configure the SDN controller to isolate objects and code implementing RBAC to restrict access to security functionality from non-security functionality objects and code.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000512-SDN-001080
- Vuln IDs
-
- V-206740
- V-80805
- Rule IDs
-
- SV-206740r385561_rule
- SV-95515
Checks: C-6997r363158_chk
Review the SDN controller configuration to determine that error messages do not contain information beyond what is needed for troubleshooting controller and network problems. If the controller is not configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries, this is a finding.
Fix: F-6997r363159_fix
Configure the SDN controller to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- RMF Control
- SI-5
- Severity
- M
- CCI
- CCI-002694
- Version
- SRG-NET-000512-SDN-001085
- Vuln IDs
-
- V-206741
- V-80807
- Rule IDs
-
- SV-206741r856678_rule
- SV-95517
Checks: C-6998r363161_chk
Review the SDN controller configuration to determine if it is configured to notify the ISSO and ISSM of failed security verification tests. If the SDN controller is not configured to notify the ISSO and ISSM of failed security verification tests, this is a finding. Note: The organization defines the system transitional states when the SDN controller will verify correct operation of the security functions.
Fix: F-6998r363162_fix
Configure the SDN controller to notify the ISSO and ISSM of failed security verification tests. Note: DoD activities should also notify the Regional Cyber Center (RCC). Note: The organization defines the system transitional states when the SDN controller will verify correct operation of the security functions.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- SRG-NET-000512-SDN-001090
- Vuln IDs
-
- V-206742
- V-80809
- Rule IDs
-
- SV-206742r984177_rule
- SV-95519
Checks: C-6999r984175_chk
Review documentation of nonadministrative users who have been given access permissions to install, modify, or replace software modules within the SDN controller framework. Review the SDN controller configuration to determine that only authorized users have the permissions to install, modify, or replace software modules. If the SDN controller is not configured to revoke unauthorized attempts to install, modify, or replace software modules, this is a finding.
Fix: F-6999r984176_fix
Document the approval for nonadministrative users who require the ability to install, modify, or replace software modules within the SDN controller framework. Configure the SDN controller to revoke the installation of software modules by any unapproved permissions or access levels.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-NET-000512-SDN-001095
- Vuln IDs
-
- V-206743
- V-80811
- Rule IDs
-
- SV-206743r856680_rule
- SV-95521
Checks: C-7000r363167_chk
Review the SDN controller configuration to determine if it is configured to restrict access to the configuration. If the SDN controller is not configured to enforce access restrictions associated with changes to the configuration, this is a finding.
Fix: F-7000r363168_fix
Configure the SDN controller to restrict access to the configuration.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-NET-000512-SDN-001100
- Vuln IDs
-
- V-206744
- V-80813
- Rule IDs
-
- SV-206744r984178_rule
- SV-95523
Checks: C-7001r363170_chk
Review the SDN controller configuration to determine if it is configured to audit enforcement actions used to restrict access associated with changes to any application. If the SDN controller is not configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework, this is a finding.
Fix: F-7001r363171_fix
Configure the SDN controller to audit enforcement actions used to restrict access associated with changes to any application.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-SDN-002000
- Vuln IDs
-
- V-216509
- V-100101
- Rule IDs
-
- SV-216509r385561_rule
- SV-109205
Checks: C-17744r363173_chk
Determine if the SDN controller is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it is not configured in accordance with the designated security configuration settings, this is a finding.
Fix: F-17741r363174_fix
Configure the SDN controller to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- Severity
- M
- CCI
- CCI-004866
- Version
- SRG-NET-000705-SDN-000110
- Vuln IDs
-
- V-264312
- Rule IDs
-
- SV-264312r984181_rule
Checks: C-68225r984179_chk
Verify the SDN controller is configured to employ organization-defined controls by type of DoS to achieve the DoS objective. If the SDN controller is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix: F-68133r984180_fix
Configure the SDN controller to employ organization-defined controls by type of DoS to achieve the DoS objective.
- RMF Control
- Severity
- M
- CCI
- CCI-004891
- Version
- SRG-NET-000715-SDN-000120
- Vuln IDs
-
- V-264313
- Rule IDs
-
- SV-264313r984184_rule
Checks: C-68226r984182_chk
Verify the SDN controller is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the SDN controller is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix: F-68134r984183_fix
Configure the SDN controller to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- SRG-NET-000760-SDN-000160
- Vuln IDs
-
- V-264314
- Rule IDs
-
- SV-264314r984187_rule
Checks: C-68227r984185_chk
Verify the SDN controller is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the SDN controller is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Fix: F-68135r984186_fix
Configure the SDN controller to establish organization-defined alternate communications paths for system operations organizational command and control.