STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Axonius Federal Systems Ax-OS Security Technical Implementation Guide

Version

V1R2

Benchmark ID

AFS_Ax-OS_STIG

Total Checks

16

Tags

other
CAT I: 7CAT II: 9CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (16)

V-276001MEDIUMAx-OS must limit the number of concurrent sessions to 10 for all accounts and/or account types.V-276002MEDIUMAx-OS must automatically terminate a graphical user interface (GUI) user session after 15 minutes.V-276003MEDIUMAx-OS must automatically terminate a Secure Shell (SSH) user session after 15 minutes.V-276004HIGHAx-OS must implement DOD-approved encryption to protect the confidentiality of remote access sessions.V-276005MEDIUMAx-OS must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.V-276006MEDIUMAx-OS must display the Standard Mandatory DOD Notice and Consent Banner before granting access to Ax-OS.V-276007MEDIUMAx-OS must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the Toolbox.V-276008MEDIUMAx-OS password manager must be disabled.V-276009HIGHAx-OS must use multifactor authentication for network access to the customer account.V-276010HIGHAx-OS must use multifactor authentication for network access to the files account.V-276011HIGHAx-OS must use multifactor authentication for network access to nonprivileged accounts.V-276012HIGHAx-OS must have no local accounts for the user interface.V-276013HIGHAx-OS must protect the authenticity of communications sessions.V-276014HIGHAx-OS must off-load audit records onto a different system or media than the system being audited.V-276015MEDIUMAx-OS must implement privileged access authorization to all information systems and infrastructure components for selected organization-defined vulnerability scanning activities.V-276016MEDIUMAx-OS must compare the internal system clocks on an organization-defined frequency with an organization-defined authoritative time source.