Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000053-NDM-000036 | SRG-NET-000053-NDM-000036 | SRG-NET-000053-NDM-000036_rule | Low |
Description |
---|
This requirement addresses concurrent sessions for a given information system account and does not address concurrent sessions by a single user via multiple accounts. In many products, this value defaults to unlimited which leaves the device open to denial of service attacks. An organizationally defined value should be configured. Limiting the number of concurrent login sessions to the device per any given account mitigates the risk associated with a denial of service attack. |
STIG | Date |
---|---|
Network Device Management Security Requirements Guide | 2013-07-30 |
Check Text ( C-SRG-NET-000053-NDM-000036_chk ) |
---|
View the user account management screens. Verify the number of concurrent sessions setting is not set to unlimited. Verify the number of concurrent sessions is set to an organizationally defined value. If the number of concurrent sessions for accounts is set to unlimited, this is a finding. If the number of concurrent sessions is not set to an organizationally defined value, this is a finding. |
Fix Text (F-SRG-NET-000053-NDM-000036_fix) |
---|
Set the default concurrent sessions for user accounts to an organizationally defined value. |