F5BI-AP-000230 - F5 BIG-IP must be configured to set a 'Maximum Session Timeout' value of 24 hours or less.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The Maximum Session Timeout setting configures a limit on the maximum amount of time a user's session is active without needing to reauthenticate. If the value is set to 0 (zero), the user's session is active until either the user terminates the session or the Inactivity Timeout value is reached (the default value is set to 604,800 seconds). When determining how long the maximum user session can last, it may be useful to review the access policy. For example, if the access policy requires that the user's antivirus signatures cannot be older than 24 hours, the Maximum Session Timeout should not exceed that time limit.

Solution

BIG-IP LTM controls the timeout values of sessions in the definition of an access profile.

Navigate to the BIG-IP System manager >> Access Policy >> Access Profiles.

Click 'Edit...' in the 'Access Policy' column for Access Profiles used for granting access.

In the 'Settings' section, set the value for 'Maximum Session Timeout' to 86,400 seconds or less (24 hours or less).

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_11-x_Y23M11_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002038, Rule-ID|SV-259330r939148_rule, STIG-ID|F5BI-AP-000230, Vuln-ID|V-259330

Plugin: F5

Control ID: ed91cc3a2339d206a539fd62835cbe0106acb2744083cf0c769876222cbe642e