UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ALG providing network user authentication proxy services must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000053-ALG-000001 SRG-NET-000053-ALG-000001 SRG-NET-000053-ALG-000001_rule Medium
Description
Network element management includes the ability to control the number of users and user sessions that utilize a network element. Limiting the number of current sessions per user is helpful in limiting risks related to DoS attacks. This requirement addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. This policy only applies to application gateways/firewalls (e.g., identity management or authentication gateways) that provide user account services as part of the intermediary services.
STIG Date
Application Layer Gateway Security Requirements Guide 2014-06-27

Details

Check Text ( C-SRG-NET-000053-ALG-000001_chk )
If the ALG does not provide user authentication proxy services, this is not a finding.

Verify the ALG limits the number of concurrent sessions to an organization-defined number for all accounts and/or account types.

If the ALG does not limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types, this is a finding.
Fix Text (F-SRG-NET-000053-ALG-000001_fix)
Configure the ALG to limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.