STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SDN Controller Security Requirements Guide

V-206720

CAT II (Medium)

The SDN controller must be configured to produce audit records containing information to establish the source of the events.

Rule ID

SV-206720r382864_rule

STIG

SDN Controller Security Requirements Guide

Version

V2R2

CCIs

CCI-000133

Discussion

Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment and provide forensic analysis, security personnel need to know the source (i.e. service, function, node name, IP address, etc.) of the event.

Check Content

Review the SDN controller configuration to determine if the audit records will note the source (e.g., flow, API, IP address, etc.) the event that is being logged. 

If the SDN controller is not configured to produce audit records containing information to establish the source (e.g., flow, API, IP address, etc.) of the events, this is a finding.

Fix Text

Configure the SDN controller to include the source (e.g., flow, API, IP address, etc.) of the event in the log records.