Check: SRG-NET-000004-VVSM-00101
Title
The Enterprise Voice, Video, and Messaging Session Manager must automatically disable user accounts after a 35-day period of account inactivity. (Cat II impact)
Discussion
Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Enterprise Voice, Video, and Messaging Session Managers must track periods of user inactivity and disable accounts after 35 days of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. DOD has determined that 35 days is the appropriate time period of inactivity for Inactive accounts. Therefore, systems with a per user paradigm of management would apply.
Check Content
Verify the Enterprise Voice, Video, and Messaging Session Manager automatically disables Voice Video Endpoint user access after a 35-day period of account inactivity. This requirement refers to users rather than endpoints. If the Enterprise Voice, Video, and Messaging Session Manager does not automatically disable Voice Video Endpoint user access after a 35-day period of account inactivity, this is a finding.
Fix Text
Configure the Enterprise Voice, Video, and Messaging Session Manager to automatically disable Voice Video Endpoint user access after a 35-day period of account inactivity.
Additional Identifiers
Rule ID: SV-259987r956074_rule
Vulnerability ID: V-259987
Group Title: SRG-NET-000004
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000017 |
Disable accounts when the accounts have been inactive for the organization-defined time-period. |
Controls
Number | Title |
---|---|
AC-2(3) |
Disable Inactive Accounts |