UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Access to the SDN management and orchestration systems must be authenticated using a FIPS-approved message authentication code algorithm.


Overview

Finding ID Version Rule ID IA Controls Severity
V-73077 NET-SDN-003 SV-87729r1_rule Medium
Description
The SDN controller receives network service requests from orchestration and management systems to deploy and configure network elements via the northbound API. In turn, the Northbound API presents a network abstraction to these systems. If either the orchestration or management system were breached, a rogue user could make modifications to the business or security policy that could disrupt network operations, resulting in inefficient application and business processes as well as bypassing security controls. In addition, invalid network service requests could be processed that could exhaust compute, storage, and network resources, leaving no resources available for legitimate business requirements.
STIG Date
SDN Using NV Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-73211r1_chk )
Review all management and orchestration systems within the SDN framework and verify that access to these components requires DOD PKI certificate-based authentication.

If access to the SDN management and orchestration systems does not require DOD PKI certificate-based authentication, this is a finding.
Fix Text (F-79523r1_fix)
Configure all management and orchestration systems within the SDN framework to require DOD PKI certificate-based authentication for access.