Check: OKTA-APP-000025
Okta Identity as a Service (IDaaS) STIG:
OKTA-APP-000025
(in version v1 r1)
Title
The Okta Admin Console must log out a session after a 15-minute period of inactivity. (Cat II impact)
Discussion
A session timeout lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporary nature of the absence. Rather than relying on the user to manually lock their application session prior to vacating the vicinity, applications must be able to identify when a user's application session has idled and take action to initiate the session lock. The session lock is implemented at the point where session activity can be determined and/or controlled. This is typically at the operating system level and results in a system lock. However, it may be at the application level where the application interface window is secured instead.
Check Content
From the Admin Console: 1. Select Applications >> Applications >> Okta Admin Console. 2. In the Sign On tab, under "Okta Admin Console session", verify the "Maximum app session idle time" is set to 15 minutes. If the "Maximum app session idle time" is not set to 15 minutes, this is a finding.
Fix Text
From the Admin Console: 1. Select Applications >> Applications >> Okta Admin Console. 2. In the Sign On tab, under "Okta Admin Console session", set the "Maximum app session idle time" to 15 minutes.
Additional Identifiers
Rule ID: SV-273187r1098828_rule
Vulnerability ID: V-273187
Group Title: SRG-APP-000003
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000057 |
Prevent further access to the system by initiating a device lock after organization-defined time period of inactivity; and/or requiring the user to initiate a device lock before leaving the system unattended. |
Controls
Number | Title |
---|---|
AC-11 |
Session Lock |