STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Apache Server 2.4 UNIX Site Security Technical Implementation Guide

V-214296

CAT II (Medium)

The Apache web server must set an inactive timeout for sessions.

Rule ID

SV-214296r1043182_rule

STIG

Apache Server 2.4 UNIX Site Security Technical Implementation Guide

Version

V2R6

CCIs

CCI-002391

Discussion

Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after a set period of inactivity, the Apache web server can make certain that those sessions that are not closed through the user logging out of an application are eventually closed. Acceptable values are 5 minutes for high-value applications, 10 minutes for medium-value applications, and 20 minutes for low-value applications.

Check Content

In a command line, run "httpd -M | grep -i Reqtimeout_module". 
 
If the "Reqtimeout_module" is not enabled, this is a finding.

Fix Text

Determine the location of the "HTTPD_ROOT" directory and the "httpd.conf" file: 
 
# apachectl -V | egrep -i 'httpd_root|server_config_file' 
-D HTTPD_ROOT="/etc/httpd" 
-D SERVER_CONFIG_FILE="conf/httpd.conf" 
 
Load the "Reqtimeout_module". 
 
Set the "RequestReadTimeout" directive.