STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to AAA Services Security Requirements Guide

V-204638

CAT II (Medium)

AAA Services must be configured to automatically remove authorizations for temporary user accounts after 72 hours.

Rule ID

SV-204638r960771_rule

STIG

AAA Services Security Requirements Guide

Version

V2R2

CCIs

CCI-000016

Discussion

When temporary user accounts remain active after no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of all temporary user accounts must be set upon account creation. Disabling a temporary account provides a higher risk alternative; disabling allows an insider adversary to enable the privileged account and make it permanent. Temporary accounts, when used, mandate that AAA Services must be configured to automatically terminate these types of accounts after 72 hours. When AAA Services do not perform account management, the connected Active Directory must provide this setting.

Check Content

If AAA Services do not provide authorizations based on external directory services, this is not applicable.

Verify AAA Services are configured to automatically remove authorizations for temporary user accounts after 72 hours.

If the AAA Services configuration does not automatically remove authorizations for temporary user accounts after 72 hours, this is a finding.

Fix Text

Configure AAA Services to automatically remove authorizations for temporary user accounts after 72 hours.