SDN Controller Security Requirements Guide

Overview

VersionDateFinding Count (34)Downloads
22024-05-28CAT I (High): 6CAT II (Medium): 28CAT III (Low): 0
STIG Description
This Security Requirements Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-206728
LOWMEDIUMHIGH
The SDN controller must be configured to authenticate southbound Application Program Interface (API) control-plane messages received from SDN-enabled network elements using a FIPS-approved message authentication code algorithm.Southbound APIs such as OpenFlow provide the forwarding tables to network devices, such as switches and routers, both physical and virtual (hypervisor...
V-206729
LOWMEDIUMHIGH
The SDN controller must be configured to authenticate northbound Application Program Interface (API) messages received from business applications and management systems using a FIPS-approved message authentication code algorithm.The SDN controller determines how traffic should flow through physical and virtual network devices based on application profiles, network infrastructu...
V-206730
LOWMEDIUMHIGH
The SDN controller must be configured to encrypt all southbound Application Program Interface (API) control-plane messages using a FIPS-validated cryptographic module.Southbound APIs such as OpenFlow provide the forwarding tables to network devices, such as switches and routers, both physical and virtual (hypervisor...
V-206731
LOWMEDIUMHIGH
The SDN controller must be configured to encrypt all northbound Application Program Interface (API) messages using a FIPS-validated cryptographic module.The SDN controller receives network service requests from orchestration and management systems to deploy and configure network elements via the northb...
V-206732
LOWMEDIUMHIGH
The SDN controller must be configured to authenticate received southbound Application Program Interface (API) management-plane messages using a FIPS-approved message authentication code algorithm.The SDN controller can receive management-plane traffic from the SDN-enabled devices that it monitors and manages. The messages could be responses fro...
V-206733
LOWMEDIUMHIGH
The SDN controller must be configured to encrypt all southbound Application Program Interface (API) management-plane messages using a FIPS-validated cryptographic module.An SDN controller can manage and configure SDN-enabled devices using protocols such as SNMP and NETCONF. If an SDN-aware router or switch received err...
V-206715
LOWMEDIUMHIGH
The SDN controller must be configured to enforce approved authorizations for access to system resources in accordance with applicable access control policies.To mitigate the risk of unauthorized access to system resources within the SDN framework, authorization procedures and controls must be implemented to...
V-206716
LOWMEDIUMHIGH
The SDN controller must be configured to enforce approved authorizations for controlling the flow of traffic within the network based on organization-defined information flow control policies.Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or data center. Additionally, unrestricted traffic may transit a...
V-206717
LOWMEDIUMHIGH
The SDN controller must be configured to produce audit records containing information to establish what type of events occurred.Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or...
V-206718
LOWMEDIUMHIGH
The SDN controller must be configured to produce audit records containing information to establish when the events occurred.Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In ...
V-206719
LOWMEDIUMHIGH
The SDN controller must be configured to produce audit records containing information to establish where the events occurred.Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In...
V-206720
LOWMEDIUMHIGH
The SDN controller must be configured to produce audit records containing information to establish the source of the events.Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. ...
V-206721
LOWMEDIUMHIGH
The SDN controller must be configured to produce audit records containing information to establish the outcome of the events.Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if ch...
V-206722
LOWMEDIUMHIGH
The SDN controller must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, sec...
V-206723
LOWMEDIUMHIGH
The SDN controller must be configured to disable non-essential capabilities.It is detrimental for network elements to provide, or enable by default, functionality exceeding requirements or mission objectives. These unnecessary...
V-206724
LOWMEDIUMHIGH
The SDN controller must be configured to enforce a policy to manage bandwidth and to limit the effects of a packet-flooding Denial of Service (DoS) attack.A network element experiencing a DoS attack will not be able to handle production traffic load. The high utilization and CPU caused by a DoS attack wi...
V-206725
LOWMEDIUMHIGH
The SDN controllers must be configured as a cluster in active/active or active/passive mode to preserve any information necessary to determine cause of a system failure and to maintain network operations with least disruption to workload processes and flows.Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure to a known secure state help...
V-206726
LOWMEDIUMHIGH
The SDN controller must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by rate-limiting control-plane communications.The SDN Controller is critical to all network operations because it is the component used to build all forwarding paths for the data plane via control...
V-206727
LOWMEDIUMHIGH
The SDN controller must be configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or data center. Additionally, unrestricted traffic may transit a...
V-206734
LOWMEDIUMHIGH
The SDN controller must be configured to be deployed as a cluster and on separate physical hosts.SDN relies heavily on control messages between a controller and the forwarding devices for network convergence. The controller uses node and link stat...
V-206735
LOWMEDIUMHIGH
The SDN Controller must be configured to notify the forwarding device to either drop the packet or make an entry in the flow table for a received packet that does not match any flow table entries.Reactive flow setup occurs when the SDN-aware switch receives a packet that does not match the flow table entries and hence the switch has to send the...
V-206736
LOWMEDIUMHIGH
SDN controller must be configured to forward traffic based on security requirements.For security reasons, an organization may choose to have traffic that is inbound to a server go through a specific firewall. In order not to consume t...
V-206737
LOWMEDIUMHIGH
The SDN controller must be configured to enable multi-tenant virtual networks to be fully isolated from one another.Network-as-a-Service (NaaS) is often implemented in a multi-tenant paradigm, where customers share network infrastructure and services while they are ...
V-206738
LOWMEDIUMHIGH
The SDN controller must be configured to separate tenant functionality from system management functionality.Network-as-a-Service (NaaS) is frequently offered in a multi-tenant paradigm, where customers share network infrastructure. SDN provides an approach t...
V-206739
LOWMEDIUMHIGH
The SDN controller must be configured to isolate security functions from non-security functions.An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Se...
V-206740
LOWMEDIUMHIGH
The SDN controller must be configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.Providing too much information in error messages on the screen or printout risks compromising the data and security of the SDN controller. The structu...
V-206741
LOWMEDIUMHIGH
The SDN controller must be configured to notify the ISSO and ISSM of failed verification tests for organization-defined security functions.If personnel are not notified of failed security verification tests, they will not be able to take corrective action and the unsecure condition(s) wil...
V-206742
LOWMEDIUMHIGH
The SDN controller must be configured to prohibit user installation of software without explicit privileged status.Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be inst...
V-206743
LOWMEDIUMHIGH
The SDN controller must be configured to enforce access restrictions associated with changes to the configuration.Failure to provide logical access restrictions associated with changes to application configuration may have significant effects on the overall securi...
V-206744
LOWMEDIUMHIGH
The SDN controller must be configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework.Without auditing the enforcement of access restrictions against changes to any application within the SDN framework, it will be difficult to identify ...
V-216509
LOWMEDIUMHIGH
The SDN controller must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.Configuring the network device to implement organization-wide security implementation guides and security checklists ensures compliance with federal s...
V-264312
LOWMEDIUMHIGH
The SDN controller must be configured to employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organization...
V-264313
LOWMEDIUMHIGH
The SDN controller must be configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.Separating critical system components and functions from other noncritical system components and functions through separate subnetworks may be necessa...
V-264314
LOWMEDIUMHIGH
The SDN controller must be configured to establish organization-defined alternate communications paths for system operations organizational command and control.An incident, whether adversarial- or nonadversarial-based, can disrupt established communications paths used for system operations and organizational ...