Allow session lockout
Summary​
The system must provide users the option to manually lock their session from any resource protected by authentication.
Description​
This control allows users to take preventive measures to secure their accounts or sensitive information, especially in situations where they anticipate leaving their workstation unattended or when there's a potential security risk.
Supported In​
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |
References​
- NIST 800-53-AC-2_2. Removal of temporary or emergency accounts
- NIST 800-53-AC-2_13. Disable accounts for high-risk individuals
- MITRE ATT&CK®-M1036. Account use policies
- CMMC-AC_L2-3_1_10. Session lock
- OWASP Top 10 Privacy Risks-P8. Missing or insufficient session expiration
- OWASP SCP-4. Session management
- FISMA-AC-2_2. Removal of temporary or emergency accounts
- FISMA-AC-2_13. Disable accounts for high-risk individuals
free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.