UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SDN controller must be configured to notify the ISSO and ISSM of failed verification tests for organization-defined security functions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-80807 SRG-NET-000512-SDN-001085 SV-95517r1_rule Medium
Description
If personnel are not notified of failed security verification tests, they will not be able to take corrective action and the unsecure condition(s) will remain. Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Notifications provided by information systems include messages to local computer consoles, and/or hardware indications, such as lights. This requirement applies to applications performing security functions and the applications performing security function verification/testing.
STIG Date
SDN Controller Security Requirements Guide 2018-07-18

Details

Check Text ( C-80543r1_chk )
Review the SDN controller configuration to determine if it is configured to notify the ISSO and ISSM of failed security verification tests.

If the SDN controller is not configured to notify the ISSO and ISSM of failed security verification tests, this is a finding.

Note: The organization defines the system transitional states when the SDN controller will verify correct operation of the security functions.
Fix Text (F-87661r1_fix)
Configure the SDN controller to notify the ISSO and ISSM of failed security verification tests.

Note: DoD activities should also notify the Regional Cyber Center (RCC).

Note: The organization defines the system transitional states when the SDN controller will verify correct operation of the security functions.