III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000236
<GroupDescription></GroupDescription>Group -
The SDN controllers must be configured as a cluster in active/active or active/passive mode to preserve any information necessary to determine cause of a system failure and to maintain network operations with least disruption to workload processes and flows.
<VulnDiscussion>Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure to ...Rule Medium Severity -
SRG-NET-000362
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by rate-limiting control-plane communications.
<VulnDiscussion>The SDN Controller is critical to all network operations because it is the component used to build all forwarding paths for t...Rule Medium Severity -
SRG-NET-000364
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
<VulnDiscussion>Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or data center. Additionally, unrestric...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to authenticate southbound Application Program Interface (API) control-plane messages received from SDN-enabled network elements using a FIPS-approved message authentication code algorithm.
<VulnDiscussion>Southbound APIs such as OpenFlow provide the forwarding tables to network devices, such as switches and routers, both physica...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to authenticate northbound Application Program Interface (API) messages received from business applications and management systems using a FIPS-approved message authentication code algorithm.
<VulnDiscussion>The SDN controller determines how traffic should flow through physical and virtual network devices based on application profi...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to encrypt all southbound Application Program Interface (API) control-plane messages using a FIPS-validated cryptographic module.
<VulnDiscussion>Southbound APIs such as OpenFlow provide the forwarding tables to network devices, such as switches and routers, both physica...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to encrypt all northbound Application Program Interface (API) messages using a FIPS-validated cryptographic module.
<VulnDiscussion>The SDN controller receives network service requests from orchestration and management systems to deploy and configure networ...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to authenticate received southbound Application Program Interface (API) management-plane messages using a FIPS-approved message authentication code algorithm.
<VulnDiscussion>The SDN controller can receive management-plane traffic from the SDN-enabled devices that it monitors and manages. The messag...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to encrypt all southbound Application Program Interface (API) management-plane messages using a FIPS-validated cryptographic module.
<VulnDiscussion>An SDN controller can manage and configure SDN-enabled devices using protocols such as SNMP and NETCONF. If an SDN-aware rout...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The SDN controller must be configured to be deployed as a cluster and on separate physical hosts.
<VulnDiscussion>SDN relies heavily on control messages between a controller and the forwarding devices for network convergence. The controlle...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.