F5 BIG-IP Access Policy Manager STIG Version Comparison
F5 BIG-IP Access Policy Manager Security Technical Implementation Guide
Comparison
There are 14 differences between versions v2 r1 (Oct. 23, 2020) (the "left" version) and v2 r3 (Jan. 29, 2024) (the "right" version).
Check F5BI-AP-000230 was added to the benchmark in the "right" version.
This check's original form is available here.
Text Differences
Title
The F5 BIG-IP appliance must be configured to set a "Maximum Session Timeout" value of 8 hours or less.
Check Content
If the BIG-IP APM module does not provide user authentication intermediary services, this is not applicable. From the BIG-IP GUI: 1. Access. 2. Profiles/Policies. 3. Access Profiles. 4. Click the Access profile name. 5. In the "Settings" section, verify the value for "Maximum Session Timeout" is set to 28800 seconds (8 hours) or less. If the F5 BIG-IP APM access policy is not configured for a "Maximum Session Timeout" value of 28,800 seconds (8 hours) or less, this is a finding.
Discussion
The Maximum Session Timeout setting configures a limit on the maximum amount of time a user's session is active without needing to reauthenticate. If the value is set to 0 (zero), the user's session is active until either the user terminates the session or the Inactivity Timeout value is reached (the default value is set to 604,800 seconds). When determining how long the maximum user session can last, it may be useful to review the access policy. For example, if the access policy requires that the user's antivirus signatures cannot be older than 8 hours, the Maximum Session Timeout should not exceed that time limit.
Fix
From the BIG-IP GUI: 1. Access. 2. Profiles/Policies. 3. Access Profiles. 4. Click the Access profile name. 5. In the "Settings" section, set the value for "Maximum Session Timeout" to 28800 seconds (8 hours) or less. Note: If the setting is grayed out, check the box to the right of the setting and then update it. 6. Click "Update". 7. Click "Apply Access Policy".