Check: SAN04.023.00
Storage Area Network STIG:
SAN04.023.00
(in versions v2 r4 through v2 r2)
Title
The IP addresses of the hosts permitted SNMP access to the SAN management devices do not belong to the internal network. (Cat II impact)
Discussion
SNMP, by virtue of what it is designed to do, can be a large security risk. Because SNMP can obtain device information and set device parameters, unauthorized users can cause damage. Therefore access to a SAN device from an IP address outside of the internal network will not be allowed. The IAO/NSO will ensure IP addresses of the hosts that are permitted SNMP access to the SAN management devices belong to the internal network.
Check Content
The reviewer will, with the assistance of the IAO/NSO, verify that the IP addresses of the hosts permitted SNMP access to the SAN management devices belong to the internal network. The ACLs for the SAN ports should be checked.
Fix Text
Develop a plan to restrict SNMP access to SAN devices to only internal network IP addresses. Obtain CM approval of the plan and implement the plan.
Additional Identifiers
Rule ID: SV-6803r1_rule
Vulnerability ID: V-6657
Group Title: Only Internal Network SNMP Access to SAN
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |