Storage Area Network STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 22
Comparison against the immediately-prior release (V2R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 22
- V-6605 Medium description The default zone visibility setting is not set to “none”.
- V-6608 High description Hard zoning is not used to protect the SAN.
- V-6609 Low description SAN devices are not added to the site System Security Authorization Agreement (SSAA).
- V-6610 Medium description The SANs are not compliant with overall network security architecture, appropriate enclave, and data center security requirements in the Network Infrastructure STIG and the Enclave STIG
- V-6613 Medium description All security related patches are not installed.
- V-6619 Medium description Prior to installing SAN components (servers, switches, and management stations) onto the DOD network infrastructure, components are not configured to meet the applicable STIG requirements.
- V-6623 High description Vendor supported, DOD approved, anti-virus software is not installed and configured on all SAN servers in accordance with the applicable operating system STIG on SAN servers and management devices and kept up-to-date with the most recent virus definition tables.
- V-6633 Medium descriptioncheckfix The SAN must be configured to use bidirectional authentication.
- V-6634 Low descriptioncheckfix The fabric switches must use DoD-approved PKI rather than proprietary or self-signed device certificates.
- V-6636 Medium description SAN management is not accomplished using the out-of-band or direct connection method.
- V-6637 Low description Communications from the management console to the SAN fabric are not protected strong two-factor authentication.
- V-6638 Low description The manufacturer’s default PKI keys have not been changed prior to attaching the switch to the SAN Fabric.
- V-6639 Low description The SAN is not configured to use FIPS 140-1/2 validated encryption algorithm to protect management-to-fabric communications.
- V-6645 High description All SAN management consoles and ports are not password protected.
- V-6646 High description The manufacturer’s default passwords have not been changed for all SAN management software.
- V-6647 High description The SAN fabric zoning lists are not based on a policy of Deny-by-Default with blocks on all services and protocols not required on the given port or by the site.
- V-6648 Low description Attempts to access ports, protocols, or services that are denied are not logged..
- V-6652 Medium description Simple Network Management Protocol (SNMP) is used and it is not configured in accordance with the guidance contained in the Network Infrastructure STIG.
- V-6656 High description Unauthorized IP addresses are allowed Simple Network Management Protocol (SNMP) access to the SAN devices.
- V-6657 Medium description The IP addresses of the hosts permitted SNMP access to the SAN management devices do not belong to the internal network.
- V-6660 Low description End-user platforms are directly attached to the Fibre Channel network or access storage devices directly.
- V-6661 Medium description Fabric switch configurations and management station configuration are not archived and/or copies of the operating system and other critical software for all SAN components are not stored in a fire rated container or are not collocated with the operational software.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN03.003.00
- Vuln IDs
-
- V-6605
- Rule IDs
-
- SV-6724r1_rule
Checks: C-2429r1_chk
Reviewer with the assistance of the IAO/NSO, verify that the default zone visibility setting is set to “none”.. If this setting is not available mark this check as N/A.
Fix: F-6189r1_fix
Locate all clients that have not been explicitly placed into a zone. Create a plan to explicitly place these clients into the correct zone(s) and after doing so the plan will include the modification of the default zone visibility setting to “none”. Obtain CM approval of the plan and then, following the plan, reconfigure the SAN to allow for the default zone visibility setting to be set to “none”.
- RMF Control
- Severity
- H
- CCI
- Version
- SAN03.002.00
- Vuln IDs
-
- V-6608
- Rule IDs
-
- SV-6727r1_rule
Checks: C-2436r1_chk
The reviewer, with the assistance of the IAO/NSO, will verify that hard zoning is used to protect the SAN. If soft zoning is used, this is a finding. If soft zoning must be used (with DAA approval), this is still a CAT II finding and a migration plan must be in place. However, note that the HBA’s memory is non-persistent, thus when zoning changes are made, a policy must be in place (show via the log that it is enforced) to force a state change update in the affected HBAs immediately after making zoning changes.
Fix: F-6195r1_fix
If zoning has not been implemented, develop a zone topography. From the topography, create a plan to implement hard zoning, obtain CM approval of the plan and then, following the plan, reconfigure the SAN to support hard zoning. If zoning has been implemented, develop a plan to migrate to hard zoning, obtain CM approval of the plan and then, following the plan, reconfigure the SAN to support hard zoning.
- RMF Control
- Severity
- L
- CCI
- Version
- SAN04.001.00
- Vuln IDs
-
- V-6609
- Rule IDs
-
- SV-6729r1_rule
Checks: C-2439r1_chk
The reviewer will interview the IAO/NSO to validate that SAN devices are added to the site System Security Authorization Agreement (SSAA).
Fix: F-6198r1_fix
Update the SSAA following the SSAA review and acceptance procedures to include the SAN.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.002.00
- Vuln IDs
-
- V-6610
- Rule IDs
-
- SV-6730r1_rule
Checks: C-2444r1_chk
The reviewer will interview the IAO/NSO to validate that SANs are compliant with overall network security architecture, appropriate enclave, and data center security requirements in the Network Infrastructure STIG and the Enclave STIG. NOTE: The intent of this check is to ensure that the other checklists were applied. If they are applied then, regardless of what the findings are, this is not a finding. The objective of this policy is met if the other checklists were applied and documented.
Fix: F-6199r1_fix
Perform a self assessment with the Network Infrastructure checklist and the Enclave checklist or schedule a formal review with FSO.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.003.00
- Vuln IDs
-
- V-6613
- Rule IDs
-
- SV-6733r1_rule
Checks: C-2454r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that all security related patches are installed.
Fix: F-6202r1_fix
After verifying that the patches do not adversely impact the production SAN, create a plan for installing the patches on the SAN, obtain CM approval of the plan, and implement the plan installing the patches.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.004.00
- Vuln IDs
-
- V-6619
- Rule IDs
-
- SV-6739r1_rule
Checks: C-2463r1_chk
The reviewer will interview the IAO/NSO and view VMS to verify that prior to installing SAN components (servers, switches, and management stations) onto the DOD network infrastructure, components are configured to meet the applicable STIG requirements.
Fix: F-6207r1_fix
Perform a self assessment using the applicable checklists or scripts on any component device that has not been reviewed or request a formal review from FSO.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.005.00
- Vuln IDs
-
- V-6622
- Rule IDs
-
- SV-6742r1_rule
Checks: C-2469r1_chk
The reviewer will interview the IAO/NSO and view the VMS to verify that servers and other hosts are compliant with applicable Operating System (OS) STIG requirements.
Fix: F-6211r1_fix
Perform a self assessment using the applicable OS checklists or scripts on any server or host in the SAN that has not been reviewer or request a formal review from FSO.
- RMF Control
- Severity
- H
- CCI
- Version
- SAN04.006.00
- Vuln IDs
-
- V-6623
- Rule IDs
-
- SV-6743r1_rule
Checks: C-2472r1_chk
The reviewer will verify that vendor supported, DOD approved, anti-virus software is installed and configured on all SAN servers in accordance with the applicable operating system STIG on SAN servers and management devices and kept up-to-date with the most recent virus definition tables. If an OS review has reciently been completed verify that the anti-virus check was not a finding. Otherwise perform a manual check as described in the applicable OS checklist.
Fix: F-6212r1_fix
Install and correctly configure a DOD approved anti-virus.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.007.00
- Vuln IDs
-
- V-6628
- Rule IDs
-
- SV-6748r1_rule
Checks: C-2481r1_chk
The reviewer will interview the IAO/NSO and view the drawings supplied to verify that a current drawing of the site’s SAN topology that includes all external and internal links, zones, and all interconnected equipment.
Fix: F-6217r1_fix
Create drawing of the site’s SAN topology that includes all external and internal links, zones, and all interconnected equipment.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.008.00
- Vuln IDs
-
- V-6631
- Rule IDs
-
- SV-6751r1_rule
Checks: C-2485r1_chk
The reviewer will interview the IAO/NSO and view the network level devices to verify whether they are located in a secure room with limited access.
Fix: F-6219r1_fix
Develop a plan to move the network level devices to a location/room where the can be physically secured in a manner appropriate to the classification level of the data the handle. Obtain CM approval of the plan and then implement the plan moving the devices.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.009.00
- Vuln IDs
-
- V-6632
- Rule IDs
-
- SV-6752r1_rule
Checks: C-2486r1_chk
The reviewer, with the assistance of the IAO/NSO, will verify that individual user accounts with passwords are set up and maintained for the SAN fabric switch.
Fix: F-6220r1_fix
Develop a plan to reconfigure the SAN fabric switch to require user accounts and passwords. This plan also needs to include the creation and distribution of user accounts and passwords for each administrator who requires access to the SAN fabric switch. Obtain CM approval of the plan and then implement the plan.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.010.00
- Vuln IDs
-
- V-6633
- Rule IDs
-
- SV-6753r2_rule
Checks: C-2487r2_chk
Verify that all fabric switches are configured to bidirectional authentication.
Fix: F-6221r2_fix
Configure the SAN fabric switches to use bidirectional authentication between switches.
- RMF Control
- Severity
- L
- CCI
- Version
- SAN04.011.00
- Vuln IDs
-
- V-6634
- Rule IDs
-
- SV-6768r2_rule
Checks: C-2526r2_chk
The reviewer will, with the assistance of the IAO/NSO, verify fabric switches are protected by DOD PKI. View the installed device certificates. Verify a DoD -approved certificate is loaded. If any of the certificates have the name or identifier of a non-DoD- approved source in the Issuer field, this is a finding.
Fix: F-6229r2_fix
Generate a new key-pair from a DoD-approved certificate issuer. Sites must consult the PKI/PKI pages on the http://iase.disa.mil/ website for procedures for NIPRNet and SIPRNet.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.012.00
- Vuln IDs
-
- V-6635
- Rule IDs
-
- SV-6769r1_rule
Checks: C-2529r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that all network management ports on the SAN fabric switches are disabled except those needed to support the operational commitments of the sites.
Fix: F-6230r1_fix
Develop a plan to locate and disable all network management ports that are not required to support the operational commitments of the sites. Obtain CM approval of the plan and then execute the plan.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.013.00
- Vuln IDs
-
- V-6636
- Rule IDs
-
- SV-6773r1_rule
Checks: C-2537r1_chk
The reviewer will interview the IAO and view the SAN network drawings provided.
Fix: F-6233r1_fix
Develop a plan to migrate the SAN management to an out-of-band network or a direct connect method. Obtain CM approval for the plan and implement the plan.
- RMF Control
- Severity
- L
- CCI
- Version
- SAN04.014.00
- Vuln IDs
-
- V-6637
- Rule IDs
-
- SV-6778r1_rule
Checks: C-2544r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that communications from the management console to the SAN fabric are protected using DOD PKI. If another method of two-factor authentication is used, then inspect approval documentation. If two-factor authentication is not used, this is a finding. If two-factor authentication method is not DoD PKI and no approval documentation exists, this is a finding.
Fix: F-6235r1_fix
Develop a plan to migrate to the use of DoD PKI authentication between the SAN management console and the SAN fabric. Obtain CM approval of the plan and implement the plan.
- RMF Control
- Severity
- L
- CCI
- Version
- SAN04.015.00
- Vuln IDs
-
- V-6638
- Rule IDs
-
- SV-6780r1_rule
Checks: C-2548r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that the manufacturer’s default PKI keys have been changed prior to attaching the switch to the SAN Fabric.
Fix: F-6237r1_fix
Depending on the functionality allowed by the device, develop a plan remove, disable or change the manufacturer’s default PKI certificate so that it cannot be used for identification and authorization. Obtain CM approval for the plan and implement the plan.
- RMF Control
- Severity
- L
- CCI
- Version
- SAN04.016.00
- Vuln IDs
-
- V-6639
- Rule IDs
-
- SV-6783r1_rule
Checks: C-2555r1_chk
The reviewer will, with the assistance of the storage administrator, verify that the SAN is configured to use FIPS 140-1/2 validated encryption algorithm to protect management-to-fabric communications.
Fix: F-6240r1_fix
Develop a plan to implement FIPS-140-1/2 validated encryption to protect management-to-fabric communications. Obtain CM approval of the plan and execute the plan.
- RMF Control
- Severity
- H
- CCI
- Version
- SAN04.017.00
- Vuln IDs
-
- V-6645
- Rule IDs
-
- SV-6791r1_rule
Checks: C-2571r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that all SAN management consoles and ports are password protected.
Fix: F-6248r1_fix
Develop a plan for implementing password protection on the SAN’s management consoles and ports. Obtain CM approval of the plan and execute the plan.
- RMF Control
- Severity
- H
- CCI
- Version
- SAN04.018.00
- Vuln IDs
-
- V-6646
- Rule IDs
-
- SV-6792r1_rule
Checks: C-2572r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that the manufacturer’s default passwords have been changed for all SAN management software.
Fix: F-6249r1_fix
Develop a plan to change manufacturer’s default passwords for all SAN management software. Obtain CM approval of the plan and implement the plan.
- RMF Control
- Severity
- H
- CCI
- Version
- SAN04.019.00
- Vuln IDs
-
- V-6647
- Rule IDs
-
- SV-6793r1_rule
Checks: C-2573r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that SAN fabric zoning lists are based on a policy of Deny-by-Default with blocks on all services and protocols not required on the given port or by the site.
Fix: F-6250r1_fix
Develop a plan to identify all services and protocols needed by each port in the SAN, modify the routing lists to enforce a Deny-by-Default policy and allow only the identified services and protocols on each port that requires them. Obtain CM approval for the plan and implement the plan.
- RMF Control
- Severity
- L
- CCI
- Version
- SAN04.020.00
- Vuln IDs
-
- V-6648
- Rule IDs
-
- SV-6794r1_rule
Checks: C-2574r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that all attempts to any port, protocol, or service that is denied are logged.
Fix: F-6251r1_fix
Develop a plan to implement the logging of failed or rejected ports, protocols or services requests. The plan should include a projection of the storage requirements of the logged events. Obtain CM approval of the plan and execute it.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.021.00
- Vuln IDs
-
- V-6652
- Rule IDs
-
- SV-6798r1_rule
Checks: C-2576r1_chk
With the assistance of the IAO/NSO, verify that if Simple Network Management Protocol (SNMP) is used, it is configured in accordance with the guidance contained in the Network Infrastructure STIG. NOTE: The intent of this check is to ensure that the other checklists were applied. If they are applied then, regardless of what the findings are, this is not a finding. The objective of this policy is met if the other checklist was applied and documented.
Fix: F-6252r1_fix
Develop a plan to implement SNMP that is compliant with the Network Infrastructure STIG. Obtain CM approval and execute the plan. NOTE: The intent of this check is to ensure that the other applicable checklists were applied. If they are applied then, regardless of what the findings are, this is not a finding. The objective of this policy is met if the other checklists were applied and documented.
- RMF Control
- Severity
- H
- CCI
- Version
- SAN04.022.00
- Vuln IDs
-
- V-6656
- Rule IDs
-
- SV-6802r1_rule
Checks: C-2581r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that only authorized IP addresses are allowed Simple Network Management Protocol (SNMP) access to the SAN devices. This can be done with by checking the ACLs for the SAN device ports.
Fix: F-6253r1_fix
Develop a plan to restrict SNMP access to SAN devices to authorized IP addresses. Obtain CM approval for the plan and implement the plan.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.023.00
- Vuln IDs
-
- V-6657
- Rule IDs
-
- SV-6803r1_rule
Checks: C-2583r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that the IP addresses of the hosts permitted SNMP access to the SAN management devices belong to the internal network. The ACLs for the SAN ports should be checked.
Fix: F-6254r1_fix
Develop a plan to restrict SNMP access to SAN devices to only internal network IP addresses. Obtain CM approval of the plan and implement the plan.
- RMF Control
- Severity
- L
- CCI
- Version
- SAN04.024.00
- Vuln IDs
-
- V-6660
- Rule IDs
-
- SV-6807r1_rule
Checks: C-2586r1_chk
The reviewer will, with the assistance of the IAO/NSO, verify that end-user platforms are not directly attached to the Fibre Channel network and may not access storage devices directly. If the SAN is small with all of its components collocated, this can be done by a visual inspection but in most cases the reviewer will have to check the SAN network drawing.
Fix: F-6255r1_fix
Develop a plan to remove end-user platforms from the SAN. Obtain CM approval for the plan and implement the plan.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN05.001.00
- Vuln IDs
-
- V-6661
- Rule IDs
-
- SV-6809r1_rule
Checks: C-2589r1_chk
The reviewer will interview the IAO/NSO and view the stored information to verify that all fabric switch configurations and management station configuration are archived and copies of the operating system and other critical software for all SAN components are stored in a fire rated container or otherwise not collocated with the operational software.
Fix: F-6256r1_fix
Develop a plan that will ensure that all fabric switch configurations and management station configuration are archived and copies of the operating system and other critical software for all SAN components are stored in a fire rated container or otherwise not collocated with the operational software. Obtain CM approval for the plan and implement the plan.
- RMF Control
- Severity
- M
- CCI
- Version
- SAN04.025.00
- Vuln IDs
-
- V-7081
- Rule IDs
-
- SV-7465r1_rule
Checks: C-4374r1_chk
The reviewer with the assistance of the SA will verify that all SAN components are configured with fixed IP addresses.
Fix: F-6781r1_fix
Configure all SAN components to have fixed IP addresses.