Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-47343 | ARWA-03-000185 | SV-60215r1_rule | Medium |
Description |
---|
If communication’s sessions remain open for extended periods of time even when unused, there is the potential for an adversary to highjack the session and use it to gain access to the device or networks to which it is attached. Terminating sessions after a certain period of inactivity is a method for mitigating the risk of this vulnerability. |
STIG | Date |
---|---|
AirWatch MDM STIG | 2015-11-30 |
Check Text ( C-50109r2_chk ) |
---|
Review the AirWatch MDM Server configuration to verify the system terminates network connections after an organization-defined time period of inactivity. If communications are not terminated at the end of a session or after an organization-defined time period of inactivity, this is a finding. To verify the session Timeout: (1) click "Menu" on top tool bar, (2) click "System Configuration" under "Configuration" heading, (3) click "Admin", (4) click "Console Security", click "Session Management", and (5) verify the fields under forced timeout and idle timeout are set to 15 minutes. |
Fix Text (F-51049r2_fix) |
---|
Configure the AirWatch MDM Server to terminate network connections at the end of the session or after the organization-defined time period of inactivity. To adjust the session Timeout: (1) click "Menu" on top tool bar, (2) click "System Configuration" under "Configuration" heading, (3) click "Admin", (4) click "Console Security", (5) click "Session Management", and (6) configure the fields under forced timeout and idle timeout to 15 minutes. (7) Click "Save". |