Overview:
Use session lock with pattern-hiding displays to prevent access/viewing of data after period of inactivity.
Action Items:
3.1.10[a]
Determine if: the period of inactivity after which the system initiates a session lock is defined.
3.1.10[b]
Determine if: access to the system and viewing of data is prevented by initiating a session lock after the defined period of inactivity.
3.1.10[c]
Determine if: previously visible information is concealed via a pattern-hiding display after the defined period of inactivity.
POTENTIAL ASSESSMENT METHODS AND OBJECTS
1
Examine: Access control policy; procedures addressing session lock; procedures addressing identification and authentication; system design documentation; system configuration settings and associated documentation; system security plan; other relevant documents or records].
2
Interview: System or network administrators; personnel with information security responsibilities; system developers].
3
Test: Mechanisms implementing access control policy for session lock].
Related Documents (document name and content will vary by organization):
1) Access control policy
2) procedures addressing session lock
3) procedures addressing identification and authentication
4) system design documentation
5) system configuration settings and associated documentation
6) system security plan
7) other relevant documents or records
Additional Guidance:
Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of the system but do not want to log out because of the temporary nature of their absences. Session locks are implemented where session activities can be determined. This is typically at the operating system level, but can also be at the application level. Session locks are not an acceptable substitute for logging out of the system, for example, if organizations require users to log out at the end of the workday.
Pattern-hiding displays can include static or dynamic images, for example, patterns used with screen savers, photographic images, solid colors, clock, battery life indicator, or a blank screen, with the additional caveat that none of the images convey controlled unclassified information.
Article ID: 115
Created: September 26, 2022
Last Updated: September 27, 2022
Author: Matthew Burdick
Online URL: http://www.compliancewiki.org/article/nist-800-171-session-lock-3-1-10-115.html