UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Servers hosting SDN controllers must have an HIDS implemented to detect unauthorized changes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-73105 NET-SDN-018 SV-87757r1_rule Medium
Description
The SDN controller is the backbone of the SDN infrastructure. If the server hosting the SDN controller is breached or if unauthorized changes are made to the device, the SDN controller may not have the appropriate resources to function properly or may even be disabled. A host intrusion detection system (HIDS) can monitor and report system configuration changes and prevent malicious or anomalous activity.
STIG Date
SDN Using NV Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-73239r1_chk )
Review all servers hosting an SDN controller and verify that an HIDS has been installed and enabled.

If an HIDS has not been installed and enabled on all servers hosting an SDN controller, this is a finding.
Fix Text (F-79551r1_fix)
Install and enable an HIDS on all servers hosting an SDN controller.