Skip to main content
NetStable
Level 2 AC.L2-3.1.11

Terminate (automatically) a user session after a defined condition

๐Ÿ“– What This Means

This control requires systems to automatically log users out after a period of inactivity or other defined condition (like a security event). Think of it like a bank's website that logs you out if you walk away from your computerโ€”it prevents unauthorized access if you forget to log out. For example, a defense contractor's internal system might terminate sessions after 15 minutes of inactivity, or immediately if a user tries to access restricted data without proper permissions. This is about reducing risk when people forget or fail to manually log out.

๐ŸŽฏ Why It Matters

Unterminated sessions are a major attack vector. In 2022, 35% of breaches involved stolen credentials (Verizon DBIR). Attackers exploit active sessions to move laterally in networksโ€”like the 2020 SolarWinds breach where hackers used lingering admin sessions. For DoD contractors, an open session on a CUI system could lead to data exfiltration, compliance violations ($20K+ fines per incident), or loss of contracts. CMMC mandates this to enforce 'zero trust' principlesโ€”never assuming a session is safe without verification.

โœ… How to Implement

  1. AWS: Set session timeouts in IAM policies (e.g., `aws iam update-account-password-policy --max-session-duration 3600`)
  2. Azure: Configure conditional access policies in Entra ID (Azure AD) under Security > Session controls
  3. GCP: Use Session Timeout in Identity-Aware Proxy (IAP) settings
  4. Enable CloudTrail/Azure Monitor to log session termination events
  5. Enforce timeout rules via Terraform (e.g., `google_iap_web_iam_policy` resource)
โฑ๏ธ
Estimated Effort
2-4 hours for basic implementation (mid-level IT skills), plus 1 hour testing. Policy documentation adds 1-2 hours.

๐Ÿ“‹ Evidence Examples

Session timeout policy

Format: PDF/DOCX
Frequency: Annual review
Contents: Approved timeout durations by system type, exception process
Collection: Export from document management system

GPO screenshot

Format: PNG
Frequency: After changes
Contents: Windows session timeout settings with timestamp
Collection: Windows Server Manager > Group Policy Management

Azure session logs

Format: CSV
Frequency: Monthly
Contents: Terminated sessions with timestamps and reasons
Collection: Azure Monitor > Export to CSV

Test results

Format: XLSX
Frequency: Quarterly
Contents: Date, tester name, system tested, timeout triggered (Y/N)
Collection: Manual testing log

๐Ÿ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For AC.L2-3.1.11 ("Terminate (automatically) a user session after a defined condition"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how access to CUI systems is controlled, including the specific IAM tools, policies, and processes used. Reference your Access Control Policy and identify the systems in scope. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"AC.L2-3.1.11 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to terminate (automatically) a user session after a defined condition. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"AC.L2-3.1.11 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to terminate (automatically) a user session after a defined condition. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"AC.L2-3.1.11 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • โ€ข Identify all access points to CUI systems (VPN, direct network, cloud portals)
  • โ€ข Document which IAM system manages access (Azure AD, AWS IAM, on-prem AD)
  • โ€ข Map user roles to system access levels
  • โ€ข Ensure this control covers all systems within your defined CUI boundary where terminate (automatically) a user session after a defined condition applies
  • โ€ข Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • ๐Ÿ“„ Access Control Policy
  • ๐Ÿ“„ IAM configuration documentation
  • ๐Ÿ“„ Access request and approval records
  • ๐Ÿ“„ Evidence artifacts specific to AC.L2-3.1.11
  • ๐Ÿ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify that access controls are implemented as described, test whether unauthorized users are blocked, and review access logs for evidence of enforcement.

๐Ÿ’ฌ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do all systems handling CUI have documented session timeout values?

โœ… YES โ†’ Proceed to Q2
โŒ NO โ†’ GAP: Create a policy defining timeouts (15 mins for workstations, 30 mins for servers). Deadline: 2 weeks.
Remediation:
Use NIST SP 800-171 template Appendix D

Question 2: Are timeouts enforced via technical controls (not just policy)?

โœ… YES โ†’ Proceed to Q3
โŒ NO โ†’ GAP: Configure GPO/Azure policies. Deadline: 1 week per system type.
Remediation:
Follow Microsoft's security baseline guides

Question 3: Are termination events logged and retained for 90+ days?

โœ… YES โ†’ Proceed to Q4
โŒ NO โ†’ GAP: Enable Windows Event ID 4779 logging or equivalent. Deadline: 3 days.
Remediation:
SIEM configuration guide required

Question 4: Is there quarterly testing to verify timeouts work?

โœ… YES โ†’ Compliant
โŒ NO โ†’ GAP: Schedule first test within 14 days. Document via template E-7.
Remediation:
Assign to security officer

โš ๏ธ Common Mistakes (What Auditors Flag)

1. Only setting timeouts for some systems

Why this happens: Overlooking legacy systems or BYOD
How to avoid: Inventory all CUI access points first

2. No logging of termination events

Why this happens: Focusing only on implementation, not verification
How to avoid: Validate logs during testing phase

3. Overly long timeouts (e.g., 8 hours)

Why this happens: User convenience prioritized over security
How to avoid: Align with NIST 800-171's 30-minute recommendation

4. Missing mobile device timeouts

Why this happens: Assuming MDM handles it automatically
How to avoid: Explicitly configure Intune/Jamf policies

๐Ÿ“š Parent Policy

This practice is governed by the Access Control Policy

View AC Policy โ†’

๐Ÿ“š Related Controls