UCF STIG Viewer Logo

The application server must terminate the network connection associated with a communications session at the end of the session or after a DoD-defined time period of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35335 SRG-APP-000190-AS-000134 SV-46622r1_rule Low
Description
If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session and use it to gain access to the device or networks to which it is attached. Terminating sessions after a certain period of inactivity is a method for mitigating the risk of this vulnerability. The application server must provide a mechanism for timing out or otherwise terminating inactive web sessions.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43703r1_chk )
Review the AS configuration to verify the system terminates network connections after an organization defined time period of inactivity. If communications are not terminated after an organization-defined time period of inactivity, this is a finding.
Fix Text (F-39881r1_fix)
Configure the AS to terminate network connections after the organization defined time period of inactivity.