STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Axonius Federal Systems Ax-OS Security Technical Implementation Guide

V-276003

CAT II (Medium)

Ax-OS must automatically terminate a Secure Shell (SSH) user session after 15 minutes.

Rule ID

SV-276003r1122659_rule

STIG

Axonius Federal Systems Ax-OS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000057

Discussion

An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwart the vulnerability of open and unused user sessions, the application server must be configured to close the sessions when a configured condition or trigger event is met. Session termination ends all processes associated with a user's logical session except those specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, periods of user inactivity, targeted responses to certain types of incidents, and time-of-day restrictions on information system use.

Check Content

From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options:

Compliance Actions >> Advanced Compliance Actions >> Idle session timeout

If "Idle session timeout" is not enabled, this is a finding.

Fix Text

From the Axonius Toolbox (accessed via SSH) Main Actions Menu, select the following options:

Compliance Actions >> Advanced Compliance Actions >> Idle session timeout

Enable "Idle session timeout".