Terminate inactive user sessions
Summary
The system must terminate a session if there is a period of inactivity on the user side of 5 minutes or more.
Description
A system can leave a session indefinitely active if it does not have an automatic termination mechanism based on timeout and the user does not close it manually. Failure to control timeouts may allow an attacker to take advantage of unattended sessions and execute actions on behalf of the authenticated user without their authorization. This risk can notably increase its criticality if this is also the behavior of high-privileged administrator accounts, since it would affect the integrity, confidentiality and availability of the system, its users and the information it contains.
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References
- CAPEC™-227. Sustained client engagement
- CIS-4_3. Configure automatic session locking on enterprise assets
- CWE™-404. Improper resource shutdown or release
- CWE™-613. Insufficient session expiration
- HIPAA-164_312_a_2_iii. Automatic logoff (addressable)
- NIST 800-53-AC-2_2. Removal of temporary or emergency accounts
- NIST 800-53-AC-12. Session termination
- OWASP TOP 10-A7. Identification and authentication failures
- PA-DSS-3_1_11. Require the user to re-authenticate to re-activate the session (inactive)
- CMMC-AC_L2-3_1_11. Session termination
- CMMC-IA_L2-3_5_6. Identifier handling
- CMMC-SC_L2-3_13_9. Connections termination
- HITRUST CSF-01_t. Session time-out
- FedRAMP-AC-2_3. Account management - Disable inactive accounts
- FedRAMP-IA-4. Identifier management
- FedRAMP-SC-10. Network disconnect
- ISA/IEC 62443-UC-2_6. Remote session termination
- WASSEC-6_2_2_3. Authorization - Insufficient session expiration
- WASC-W_47. Insufficient session expiration
- ISSAF-T_19_1. Web application assessment - Global Countermeasures (client-side)
- OWASP Top 10 Privacy Risks-P8. Missing or insufficient session expiration
- OWASP SCP-4. Session management
- OWASP MASVS-V4_4. Authentication and session management requirements
- OWASP MASVS-V4_7. Authentication and session management requirements
- NIST 800-171-1_11. Terminate a user session after a defined condition
- NIST 800-171-5_6. Disable identifiers after a defined period of inactivity
- SWIFT CSCF-2_6. Operator session confidentiality and integrity
- PCI DSS-8_2_5. Access for terminated users is immediately revoked
- SIG Core-H_3_1_16. Access control
- SIG Core-I_1_11. Application security
- SIG Core-M_1_5. End user device security
- SIG Core-U_1_2_4. Server security
Vulnerabilities
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.