Check: SRG-NET-000004-VVSM-00101
Unified Communications Session Management SRG:
SRG-NET-000004-VVSM-00101
(in version v1 r0.1)
Title
The Unified Communications Session Manager must automatically disable user accounts after a 35-day period of account inactivity. (Cat II impact)
Discussion
Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Unified Communications Session Managers must track periods of user inactivity and disable accounts after 35 days of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. DOD has determined that 35 days is the appropriate time period of inactivity for Inactive accounts. Therefore, systems with a per user paradigm of management would apply.
Check Content
Verify the Unified Communications Session Manager automatically disables Voice Video Endpoint user access after a 35-day period of account inactivity. This requirement refers to users rather than endpoints. If the Unified Communications Session Manager does not automatically disable Voice Video Endpoint user access after a 35-day period of account inactivity, this is a finding.
Fix Text
Configure the Unified Communications Session Manager to automatically disable Voice Video Endpoint user access after a 35-day period of account inactivity.
Additional Identifiers
Rule ID: SRG-NET-000004-VVSM-00101_rule
Vulnerability ID: SRG-NET-000004-VVSM-00101
Group Title: SRG-NET-000004-VVSM-00101
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000017 |
Disable accounts when the accounts have been inactive for the organization-defined time-period. |
Controls
Number | Title |
---|---|
AC-2(3) |
Disable Inactive Accounts |