JUSX-DM-000156 - The Juniper SRX Services Gateway must terminate a device management session after 10 minutes of inactivity, except to fulfill documented and validated mission requirements.

Information

Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session. Quickly terminating an idle session also frees up resources.

This requirement does not mean that the device terminates all sessions or network access; it only ends the inactive session.

User accounts, including the account of last resort must be assigned to a login class. Configure all login classes with an idle timeout value. Pre-defined classes do not support configurations, therefore should not be used for DoD implementations. The root account cannot be assigned to a login-class which is why it is critical that this account be secured in accordance with DoD policy.

Solution

Configure all login classes with an idle timeout value.

[edit]
set system login-class <class name> idle-timeout 10

All users must be set to a login-class; however, to ensure that the CLI is set to a default timeout value, enter the following in operational mode:

set cli idle-timeout 10

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y24M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-10, CAT|II, CCI|CCI-001133, Rule-ID|SV-223231r961068_rule, STIG-ID|JUSX-DM-000156, STIG-Legacy|SV-81027, STIG-Legacy|V-66537, Vuln-ID|V-223231

Plugin: Juniper

Control ID: fe2780a5c805f9628f2c7c111a2c4dc5ced06c9ba4c1c4bccd0fd12856d11e18