AOSX-15-000005 - The macOS system must be configured to lock the user session when a smart token is removed.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary nature of the absence.

The session lock is implemented at the point where session activity can be determined. Rather than be forced to wait for a period of time to expire before the user session can be locked, operating systems need to provide users with the ability to manually invoke a session lock so users may secure their session should they need to temporarily vacate the immediate physical vicinity.

Solution

This setting is enforced using the 'Smart Card Policy' configuration profile.

Note: Before applying the 'Smart Card Policy', the supplemental guidance provided with the STIG should be consulted to ensure continued access to the operating system.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-15_V1R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CAT|II, CCI|CCI-000058, Rule-ID|SV-225122r610901_rule, STIG-ID|AOSX-15-000005, STIG-Legacy|SV-111621, STIG-Legacy|V-102659, Vuln-ID|V-225122

Plugin: Unix

Control ID: a39a053ec9f3e3149e3a3deef22c445277bf260413234f2d0431bd74f743290b