AOSX-14-000050 - The macOS system must limit the number of concurrent SSH sessions to 10 for all accounts and/or account types.


Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is helpful in reducing the risks related to DoS attacks.

This requirement addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system.


To configure SSHD to limit the number of sessions, use the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/^[#]*MaxSessions.*/MaxSessions 10/' /etc/ssh/sshd_config

See Also

Item Details


References: 800-53|AC-10, CAT|II, CCI|CCI-000054, Rule-ID|SV-209545r610285_rule, STIG-ID|AOSX-14-000050, STIG-Legacy|SV-104717, STIG-Legacy|V-95407, Vuln-ID|V-209545

Plugin: Unix

Control ID: a85cf2fc32a3c4d0201952324dfbb500bd4473d434f57edfe6d0d7e13d528e29