Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-62049 | SRG-NET-000004-VVSM-00010 | SV-76539r1_rule | Medium |
Description |
---|
Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Voice video session managers must track periods of user inactivity and disable accounts after 35 days of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. DoD has determined that 35 days is the appropriate time period of inactivity for Inactive accounts. Therefore, systems with a per user paradigm of management would apply. |
STIG | Date |
---|---|
Voice Video Session Management Security Requirements Guide | 2017-12-28 |
Check Text ( C-62853r1_chk ) |
---|
Verify the Voice Video Session Manager automatically disables Voice Video endpoint user access after a 35 day period of account inactivity. This requirement refers to users rather than endpoints. If the Voice Video Session Manager does not automatically disable Voice Video endpoint user access after a 35 day period of account inactivity, this is a finding. |
Fix Text (F-67969r1_fix) |
---|
Configure the Voice Video Session Manager too automatically disable Voice Video endpoint user access after a 35 day period of account inactivity. |