STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SDN Using NV Security Technical Implementation Guide

V-73105

CAT II (Medium)

Servers hosting SDN controllers must have an HIDS implemented to detect unauthorized changes.

Rule ID

SV-87757r1_rule

STIG

SDN Using NV Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001255

Discussion

The SDN controller is the backbone of the SDN infrastructure. If the server hosting the SDN controller is breached or if unauthorized changes are made to the device, the SDN controller may not have the appropriate resources to function properly or may even be disabled. A host intrusion detection system (HIDS) can monitor and report system configuration changes and prevent malicious or anomalous activity.

Check Content

Review all servers hosting an SDN controller and verify that an HIDS has been installed and enabled.

If an HIDS has not been installed and enabled on all servers hosting an SDN controller, this is a finding.

Fix Text

Install and enable an HIDS on all servers hosting an SDN controller.