F5BI-LT-000310 - The F5 BIG-IP Core implementation must be configured to set a 'Maximum Session Timeout' value of 24 hours or less for the virtual server.

Information

Without reauthentication, users may access resources or perform tasks for which authorization has been removed. The 'Maximum Session Timeout' setting configures a limit on the maximum amount of time a user's session is active without needing to reauthenticate. If the value is set to 0 (zero), the user's session is active until either the user terminates the session or the 'Inactivity Timeout' value is reached (the default value is set to 604,800 seconds). When determining how long the maximum user session can last, it may be useful to review the access policy.

The default value for 'Maximum Session Timeout' is set to 604,800 seconds or 7 days. DOD has deemed this to be excessive because it gives a lengthy period when a valid session is opened, allowing time for attackers to try various methods to gain access to the session. It is very likely that the session idle timeout will disconnect the session; however, this is a defense-in-depth configuration.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If user access control intermediary services are provided, configure the BIG-IP Core as follows:

Configure a policy in the BIG-IP APM module to set a 'Maximum Session Timeout' value of 24 hours or less

Apply the APM policy to the applicable virtual server(s) in the BIG-IP LTM module.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_11-x_Y23M11_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002038, Rule-ID|SV-259209r939146_rule, STIG-ID|F5BI-LT-000310, Vuln-ID|V-259209

Plugin: F5

Control ID: b153f8f56b160cb13f6baa7755b6ec4811cd4260f978e089ceaf448db279f02d