STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 7 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SDN Using NV Security Technical Implementation Guide

V-73105

CAT II (Medium)

Servers hosting SDN controllers must have an HIDS implemented to detect unauthorized changes.

Rule ID

SV-87757r1_rule

STIG

SDN Using NV Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001255

Discussion

The SDN controller is the backbone of the SDN infrastructure. If the server hosting the SDN controller is breached or if unauthorized changes are made to the device, the SDN controller may not have the appropriate resources to function properly or may even be disabled. A host intrusion detection system (HIDS) can monitor and report system configuration changes and prevent malicious or anomalous activity.

Check Content

Review all servers hosting an SDN controller and verify that an HIDS has been installed and enabled.

If an HIDS has not been installed and enabled on all servers hosting an SDN controller, this is a finding.

Fix Text

Install and enable an HIDS on all servers hosting an SDN controller.