NIST-800-53-AC-2 5

Account Management | Inactivity Logout

Identity and Access Management

Account log out is set to 15 minutes of inactivity within the Identity and Access Management (IAM) console per account within the organization's virtual infrastructure.

Access Control Policies for 18F

The 18F Access Control Policy Section 3 Session Lock states - 18F information systems prevents further access to the system by initiating a session lock after a period of 20 minutes or less of inactivity or upon receiving a request from a user. 18F information systems retain the session lock until the user reestablishes access using established identification and authentication procedures.

Covered By:

User Account and Authentication (UAA) Server

Account log out is set to 15 minutes of inactivity.

results matching ""

    No results matching ""