UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Unauthorized IP addresses are allowed Simple Network Management Protocol (SNMP) access to the SAN devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6656 SAN04.022.00 SV-6802r1_rule DCBP-1 High
Description
SNMP, by virtue of what it is designed to do, can be a large security risk. Because SNMP can obtain device information and set device parameters, unauthorized users can cause damage. Restricting IP address that can access SNMP on the SAN devices will further limit the possibility of malicious access being made. The IAO/NSO will ensure that only authorized IP addresses are allowed Simple Network Management Protocol (SNMP) access to the SAN devices.
STIG Date
Storage Area Network STIG 2019-06-28

Details

Check Text ( C-2581r1_chk )
The reviewer will, with the assistance of the IAO/NSO, verify that only authorized IP addresses are allowed Simple Network Management Protocol (SNMP) access to the SAN devices. This can be done with by checking the ACLs for the SAN device ports.
Fix Text (F-6253r1_fix)
Develop a plan to restrict SNMP access to SAN devices to authorized IP addresses. Obtain CM approval for the plan and implement the plan.