SP13-00-000005 - SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporary nature of the absence. Rather than relying on the user to manually lock their application session prior to vacating the vicinity, applications need to be able to identify when a user's application session has idled and take action to initiate the session lock.

The session lock is implemented at the point where session activity can be determined and/or controlled. This is typically at the operating system level and results in a system lock, but it may be at the application level, where the application interface window is secured instead. The organization defines the period of inactivity that shall pass before a session lock is initiated, so this must be configurable.

Solution

Configure the SharePoint server to lock the session lock after 15 minutes of inactivity.

In SharePoint Central Administration, click Application Management.

On the Application Management page, in the Web Applications section, click Manage web applications.

Perform the following steps for each web application.
- Select web application.
- Select General Settings >> General Settings.
- Navigate to Web Page Security Validation.
- Set the 'Security validation is:' property to On.
- Set the 'Security validation expires:' property to After.
- Set the default time-out period to 15 minutes or less.
- Select OK to save settings.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_SharePoint_2013_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-12, CAT|II, CCI|CCI-000057, Rule-ID|SV-223238r612235_rule, STIG-ID|SP13-00-000005, STIG-Legacy|SV-74349, STIG-Legacy|V-59919, Vuln-ID|V-223238

Plugin: Windows

Control ID: bd82388f74f96f0a47322afc6e14b38018f701e535822b043fb17ccaeaba7a74