UCF STIG Viewer Logo

The IDPS console port must be configured to timeout after 10 minutes or less of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000287-IDPS-000140 SRG-NET-000287-IDPS-000140 SRG-NET-000287-IDPS-000140_rule Medium
Description
Inactive user accounts pose a risk to systems and applications. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to the operating system. Operating systems need to track periods of user inactivity and disable accounts after an organizationally defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. Limiting inactivity timeout lowers the risk of an attacker hijacking an unattended session.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43279_chk )
Verify all enabled console ports are configured to timeout after an organizationally defined period of inactivity.

If the activity timeout setting of any active console port is set to exceed the organizationally defined value, this is a finding.
Fix Text (F-43279_fix)
Configure the activity timeout on all enabled console ports to an organizationally defined value.