Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-239846 | VRAU-AP-000295 | SV-239846r879637_rule | Medium |
Description |
---|
If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session and use it to gain access to the device or networks to which it is attached. Terminating sessions after a logout event or after a certain period of inactivity is a method for mitigating the risk of this vulnerability. When a user management session becomes idle, or when a user logs out of the management interface, the application server must terminate the session. |
STIG | Date |
---|---|
VMware Automation 7.x Application Security Technical Implementation Guide | 2023-09-12 |
Check Text ( C-43079r664452_chk ) |
---|
Verify that the session timeout is set to an organization-defined time with the following steps: 1. Log on to the admin UI as the administrator. 2. Navigate to "Global Settings". 3. Review the session timeout value in minutes. If the session timeout setting is not set to 15 minutes or less, this is a finding. |
Fix Text (F-43038r664453_fix) |
---|
To edit the session timeout, use the following steps: 1. Log on to the admin UI as the administrator. 2. Navigate to "Global Settings". 3. Select "Edit Global Settings", edit the "Session Timeout:" setting, and then select "OK". |