F5BI-LT-000191 - The BIG-IP Core implementation must require users to reauthenticate when the user's role, the information authorizations, and/or the maximum session timeout is exceeded for the virtual server(s).

Information

Without reauthentication, users may access resources or perform tasks for which authorization has been removed.

In addition to the reauthentication requirements associated with session locks, organizations may require reauthentication of individuals and/or devices in other situations. Within the DOD, the minimum circumstances requiring reauthentication are privilege escalation, idle timeout, maximum session timeout, and/or role changes.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

If user access control intermediary services are provided, configure the BIG-IP Core as follows:

Configure a policy in the BIG-IP APM module to reauthenticate when the user's role, the information authorizations, and/or the maximum session timeout is exceeded for the virtual server(s).

Apply APM policy to the applicable virtual server(s) in the BIG-IP LTM module.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_Y24M01_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-11, CAT|II, CCI|CCI-002038, Rule-ID|SV-215779r939150_rule, STIG-ID|F5BI-LT-000191, STIG-Legacy|SV-74769, STIG-Legacy|V-60339, Vuln-ID|V-215779

Plugin: F5

Control ID: 65839c35a8aef4f36880f842fa3f0f36699d057aba5439e5fa0240b0c6e2ed12