UCF STIG Viewer Logo

The network element must support organizational requirements to disable the user identifiers after an organization-defined time period of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27332 SRG-NET-000287 SV-34637r1_rule Medium
Description
Inactive user accounts pose a risk to systems and applications. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to the operating system. Operating systems need to track periods of user inactivity and disable accounts after an organization-defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None