DoD STIGs – V-32161


Title: Applications must ensure that users can directly initiate session lock mechanisms which prevent further access to the system.

Vulnerability ID: V-32161


IA Controls: None

Severity: medium

Description: A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary nature of the absence.

The session lock is implemented at the point where session activity can be determined. This is typically at the operating system-level, but may be at the application-level. Rather than be forced to wait for a period of time to expire before the user session can be locked, applications need to provide users with the ability to manually invoke a session lock so users may secure their application should the need arise for them to temporarily vacate the immediate physical vicinity.

Databases do not typically perform session locking activities. This requirement is NA for databases.

Check Text: This check is NA for databases.

Fix Text: This fix is NA for databases


Interpreting V-32161:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.