Check: AXOS-00-000015
Axonius Federal Systems Ax-OS STIG:
AXOS-00-000015
(in versions v1 r2 through v1 r1)
Title
Ax-OS must automatically terminate a Secure Shell (SSH) user session after 15 minutes. (Cat II impact)
Discussion
An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwart the vulnerability of open and unused user sessions, the application server must be configured to close the sessions when a configured condition or trigger event is met. Session termination ends all processes associated with a user's logical session except those specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, periods of user inactivity, targeted responses to certain types of incidents, and time-of-day restrictions on information system use.
Check Content
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Idle session timeout If "Idle session timeout" is not enabled, this is a finding.
Fix Text
From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options: Compliance Actions >> Advanced Compliance Actions >> Idle session timeout Enable "Idle session timeout".
Additional Identifiers
Rule ID: SV-276003r1122659_rule
Vulnerability ID: V-276003
Group Title: SRG-APP-000003
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000057 |
Prevent further access to the system by initiating a device lock after organization-defined time period of inactivity; and/or requiring the user to initiate a device lock before leaving the system unattended. |
Controls
| Number | Title |
|---|---|
| AC-11 |
Device Lock |