STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 must automatically lock command line user sessions after 15 minutes of inactivity.

DISA Rule

SV-230353r627750_rule

Vulnerability Number

V-230353

Group Title

SRG-OS-000029-GPOS-00010

Rule Version

RHEL-08-020070

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the operating system to enforce session lock after a period of 15 minutes of inactivity by adding the following line to the "/etc/tmux.conf" global configuration file:

set -g lock-after-time 900

Check Contents

Verify the operating system initiates a session lock after 15 minutes of inactivity.

Check the value of the system inactivity timeout with the following command:

$ sudo grep -i lock-after-time /etc/tmux.conf

set -g lock-after-time 900

If "lock-after-time" is not set to "900" or less in the global tmux configuration file to enforce session lock after inactivity, this is a finding.

Vulnerability Number

V-230353

Documentable

False

Rule Version

RHEL-08-020070

Severity Override Guidance

Verify the operating system initiates a session lock after 15 minutes of inactivity.

Check the value of the system inactivity timeout with the following command:

$ sudo grep -i lock-after-time /etc/tmux.conf

set -g lock-after-time 900

If "lock-after-time" is not set to "900" or less in the global tmux configuration file to enforce session lock after inactivity, this is a finding.

Check Content Reference

M

Target Key

2921

Comments