UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application must have the ability to retain a session lock remaining in effect until the user re-authenticates using established identification and authentication procedures.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32162 SRG-APP-000005-DB-NA SV-42479r1_rule Medium
Description
A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary nature of the absence. The session lock is implemented at the point where session activity can be determined. This is typically determined and performed at the operating system-level, but in some instances it may be at the application-level. Regardless of where the session lock is determined and implemented, once invoked the session lock shall remain in place until the user re-authenticates. No other system or application activity aside from re-authentication shall unlock the system. Databases do not typically perform session locking activities. This requirement is NA for databases.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40675r1_chk )
This check is NA for databases.
Fix Text (F-36085r1_fix)
This fix is NA for databases.