Unless there is an overriding technical or operational problem, workstation screen-lock functionality is associated with each workstation. When activated, the screen-lock function places an unclassified pattern onto the entire screen of the workstation, totally hiding what was previously visible on the screen. Such a capability is enabled either by explicit user action or a specified period of workstation inactivity (e.g., 15 minutes). Once the workstation screen-lock software is activated, access to the workstation requires knowledge of a unique authenticator. A screen lock function is not considered a substitute for logging out (unless a mechanism actually logs out the user when the user idle time is exceeded).
MAC / CONF | Impact | Subject Area |
---|---|---|
MACI MACII MACIII | Medium | Physical and Environmental |
Threat |
---|
Unattended workstations and servers are at risk to unauthorized access to sensitive and classified information if there is not a screen-lock function in place. |
Guidance |
---|
1. Unless there is an overriding technical or operational problem, workstation screen-lock functionality shall be associated with each workstation. 2. When activated, the screen-lock function shall place an unclassified pattern onto the entire screen of the workstation. This functionality shall totally hide what was previously visible on the screen. 3. Such a capability shall be enabled either by explicit user action or a specified period of workstation inactivity (e.g., 15 minutes) in accordance with agency standard operating procedures. 4. Once the workstation screen-lock software is activated, access to the workstation shall require knowledge of a unique authenticator. 5. A screen lock function shall not be considered a substitute for logging out (unless a mechanism actually logs out the user when the user idle time is exceeded). |