STIGQter STIGQter: STIG Summary:

SDN Controller Security Requirements Guide

Version: 1

Release: 2 Benchmark Date: 24 Apr 2020

CheckedNameTitle
SV-95465r1_ruleThe SDN controller must be configured to enforce approved authorizations for access to system resources in accordance with applicable access control policies.
SV-95467r1_ruleThe SDN controller must be configured to enforce approved authorizations for controlling the flow of traffic within the network based on organization-defined information flow control policies.
SV-95469r1_ruleThe SDN controller must be configured to produce audit records containing information to establish what type of events occurred.
SV-95471r1_ruleThe SDN controller must be configured to produce audit records containing information to establish when the events occurred.
SV-95473r1_ruleThe SDN controller must be configured to produce audit records containing information to establish where the events occurred.
SV-95475r1_ruleThe SDN controller must be configured to produce audit records containing information to establish the source of the events.
SV-95477r1_ruleThe SDN controller must be configured to produce audit records containing information to establish the outcome of the events.
SV-95479r1_ruleThe SDN controller must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.
SV-95481r1_ruleThe SDN controller must be configured to disable non-essential capabilities.
SV-95483r1_ruleThe SDN controller must be configured to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding Denial of Service (DoS) attack.
SV-95485r1_ruleThe SDN controllers must be configured as a cluster in active/active or active/passive mode to preserve any information necessary to determine cause of a system failure and to maintain network operations with least disruption to workload processes and flows.
SV-95487r1_ruleThe SDN controller must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by rate-limiting control-plane communications.
SV-95489r1_ruleThe SDN controller must be configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
SV-95491r1_ruleThe SDN controller must be configured to authenticate southbound Application Program Interface (API) control-plane messages received from SDN-enabled network elements using a FIPS-approved message authentication code algorithm.
SV-95493r1_ruleThe SDN controller must be configured to authenticate northbound Application Program Interface (API) messages received from business applications and management systems using a FIPS-approved message authentication code algorithm.
SV-95495r1_ruleThe SDN controller must be configured to encrypt all southbound Application Program Interface (API) control-plane messages using a FIPS-validated cryptographic module.
SV-95497r1_ruleThe SDN controller must be configured to encrypt all northbound Application Program Interface (API) messages using a FIPS-validated cryptographic module.
SV-95499r1_ruleThe SDN controller must be configured to authenticate received southbound Application Program Interface (API) management-plane messages using a FIPS-approved message authentication code algorithm.
SV-95501r1_ruleThe SDN controller must be configured to encrypt all southbound Application Program Interface (API) management-plane messages using a FIPS-validated cryptographic module.
SV-95503r1_ruleThe SDN controller must be configured to be deployed as a cluster and on separate physical hosts.
SV-95505r1_ruleThe SDN Controller must be configured to notify the forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries.
SV-95507r1_ruleSDN controller must be configured to forward traffic based on security requirements.
SV-95509r1_ruleThe SDN controller must be configured to enable multi-tenant virtual networks to be fully isolated from one another.
SV-95511r1_ruleThe SDN controller must be configured to separate tenant functionality from system management functionality.
SV-95513r1_ruleThe SDN controller must be configured to isolate security functions from non-security functions.
SV-95515r1_ruleThe SDN controller must be configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
SV-95517r1_ruleThe SDN controller must be configured to notify the ISSO and ISSM of failed verification tests for organization-defined security functions.
SV-95519r1_ruleThe SDN controller must be configured to prohibit user installation of software without explicit privileged status.
SV-95521r1_ruleThe SDN controller must be configured to enforce access restrictions associated with changes to the configuration.
SV-95523r1_ruleThe SDN controller must be configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework.
SV-109205r1_ruleThe SDN controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.