Servers hosting SDN controllers must have an HIDS implemented to detect unauthorized changes.

From SDN Using NV Security Technical Implementation Guide

Part of NET-SDN-018

Associated with: CCI-001255

SV-87757r1_rule Servers hosting SDN controllers must have an HIDS implemented to detect unauthorized changes.

Vulnerability discussion

The SDN controller is the backbone of the SDN infrastructure. If the server hosting the SDN controller is breached or if unauthorized changes are made to the device, the SDN controller may not have the appropriate resources to function properly or may even be disabled. A host intrusion detection system (HIDS) can monitor and report system configuration changes and prevent malicious or anomalous activity.

Check content

Review all servers hosting an SDN controller and verify that an HIDS has been installed and enabled. If an HIDS has not been installed and enabled on all servers hosting an SDN controller, this is a finding.

Fix text

Install and enable an HIDS on all servers hosting an SDN controller.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer