STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HYCU Protege Security Technical Implementation Guide

V-268301

CAT I (High)

The HYCU virtual appliance must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements.

Rule ID

SV-268301r1195282_rule

STIG

HYCU Protege Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001133

Discussion

Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminating an idle session will also free up resources committed by the managed network element.

Check Content

Log in to the HYCU VM console. For console connections, check for the value of the "TMOUT" option in "/home/hycu/.bashrc" with the following command:
grep TMOUT /home/hycu/.bashrc

If the "TMOUT" value is not set to "300" or less, this is a finding.

For SSH connections, check for the value of the "ClientAliveInterval" option in "/etc/ssh/sshd_config" with the following command:
grep ClientAliveInterval /etc/ssh/sshd_config

If the "ClientAliveInterval" value is not set to "300" or less, this is a finding.

For UI connections, run the following command to check configured HYCU session timeout:
cat /opt/grizzly/config.properties | grep api.session.expiration.minutes

If not configured at "5" or less, this is a finding.

Fix Text

Configure the operating system to enforce timeout settings.

Add the following line to "/home/hycu/.bashrc" (or modify the line to have the required value):
TMOUT=300

Add the following line to "/etc/ssh/sshd_config" (or modify the line to have the required value):
ClientAliveInterval 300

Edit the "/opt/grizzly/config.properties" file by running the command:
sudo vi /opt/grizzly/config.properties

Add the following line or modify the line to have the required value:
api.session.expiration.minutes=5

Save the file by typing:
:wq!