STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SDN Controller Security Requirements Guide

V-206719

CAT II (Medium)

The SDN controller must be configured to produce audit records containing information to establish where the events occurred.

Rule ID

SV-206719r382861_rule

STIG

SDN Controller Security Requirements Guide

Version

V2R2

CCIs

CCI-000132

Discussion

Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment, and provide forensic analysis, it is essential for security personnel to know where (e.g., interface, node, source IP, etc.) events occurred. Associating information about where the event occurred within the network provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured network element.

Check Content

Review the SDN controller configuration to determine if the audit records will note where (e.g., service, interface, node, link, etc.) the event that is being logged occurred. 

If the SDN controller is not configured to produce audit records containing information to establish where (e.g., service, interface, node, link, etc.) the events occurred, this is a finding.

Fix Text

Configure the SDN controller to include where (e.g., service, interface, node, link, etc.) the event occurred in the log records.