Skip to main content
NetStable
Level 2 SC.L2-3.13.9

Terminate network connections associated with communications sessions at the end of the sessions

πŸ“– What This Means

This control requires that any network connection established for a communication session is properly terminated once the session ends. Think of it like hanging up a phone call when you're done talkingβ€”leaving the line open could allow unauthorized access or eavesdropping. In practical terms, this means ensuring that VPNs, remote desktop sessions, or other network connections are closed immediately after use. For example, if an employee logs into a remote server to complete a task, the connection should automatically disconnect when the task is done. This prevents lingering connections that could be exploited by attackers.

🎯 Why It Matters

Leaving network connections open after a session ends creates a security risk. Attackers can exploit these idle connections to gain unauthorized access to systems or steal sensitive data. For instance, in the 2021 Colonial Pipeline ransomware attack, attackers exploited an unused VPN connection to breach the network. The potential impact includes data breaches, financial loss, and reputational damage. From a DoD/CMMC perspective, this control is critical for protecting Controlled Unclassified Information (CUI) and ensuring secure communications in defense contractor environments.

βœ… How to Implement

  1. 1. Configure session timeout policies in your cloud platform (e.g., AWS, Azure, GCP).
  2. 2. Use Identity and Access Management (IAM) tools to enforce session termination.
  3. 3. Enable logging and monitoring for cloud sessions to detect lingering connections.
  4. 4. Implement automated scripts to terminate idle sessions after a set period.
  5. 5. Regularly review and update session management configurations.
⏱️
Estimated Effort
4-8 hours for basic configuration; 1-2 days for full implementation and testing. Skill level: Intermediate.

πŸ“‹ Evidence Examples

Session timeout policy document

Format: PDF
Frequency: Annually or when updated.
Contents: Policy details, including timeout duration and enforcement mechanisms.
Collection: Export from policy management system.

Firewall/VPN configuration screenshot

Format: PNG/JPG
Frequency: After configuration changes.
Contents: Session timeout settings.
Collection: Capture from admin console.

Session termination logs

Format: CSV
Frequency: Monthly.
Contents: Timestamp, session ID, termination reason.
Collection: Export from logging system.

Testing results

Format: PDF
Frequency: Quarterly.
Contents: Documentation of session termination tests.
Collection: Manual testing and reporting.

Training records

Format: Excel
Frequency: Annually.
Contents: List of employees trained on session termination policies.
Collection: Export from HR system.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For SC.L2-3.13.9 ("Terminate network connections associated with communications sessions at the end of the sessions"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your network security architecture, including segmentation, encryption standards, VPN configuration, session management, key management, and monitoring capabilities. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"SC.L2-3.13.9 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to terminate network connections associated with communications sessions at the end.... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"SC.L2-3.13.9 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to terminate network connections associated with communications sessions at the end.... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"SC.L2-3.13.9 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Document network architecture with CUI boundary clearly marked
  • β€’ Identify all encryption mechanisms (at rest and in transit)
  • β€’ Specify network monitoring and IDS/IPS deployment
  • β€’ Ensure this control covers all systems within your defined CUI boundary where terminate network connections associated with communications sessions at the end of the sessions applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ System and Communications Protection Policy
  • πŸ“„ Network architecture diagram
  • πŸ“„ Firewall rule documentation
  • πŸ“„ Encryption configuration documentation
  • πŸ“„ Evidence artifacts specific to SC.L2-3.13.9
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will review network diagrams for proper segmentation, test encryption settings, verify VPN split tunneling is disabled, and check FIPS 140-2 validation of cryptographic modules.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a documented session timeout policy?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Create a session timeout policy. Timeline: 1 week.
Remediation:
Use templates from NIST or CMMC guidelines.

Question 2: Are session timeout settings configured on all network devices?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Configure timeout settings. Timeline: 2 days.
Remediation:
Use device-specific configuration guides.

Question 3: Are logs maintained for session terminations?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Enable logging. Timeline: 3 days.
Remediation:
Configure logging tools like Splunk or ELK.

Question 4: Is training provided to employees on session termination?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Conduct training. Timeline: 1 week.
Remediation:
Use training modules from CMMC resources.

Question 5: Is session termination regularly tested?

βœ… YES β†’ Compliance confirmed.
❌ NO β†’ GAP: Schedule testing. Timeline: 2 weeks.
Remediation:
Document test results and update policies as needed.

⚠️ Common Mistakes (What Auditors Flag)

1. Missing session timeout policies.

Why this happens: Lack of awareness or prioritization.
How to avoid: Use CMMC templates to create policies.

2. Inconsistent timeout settings across devices.

Why this happens: Manual configuration errors.
How to avoid: Automate configurations using scripts.

3. Inadequate logging.

Why this happens: Logging tools not configured properly.
How to avoid: Enable comprehensive logging and monitoring.

4. Failure to train employees.

Why this happens: Training not prioritized.
How to avoid: Include session termination in regular security training.

5. No testing of session termination.

Why this happens: Testing overlooked during audits.
How to avoid: Schedule quarterly testing and document results.

πŸ“š Parent Policy

This practice is governed by the System and Communications Protection Policy

View SC Policy β†’

πŸ“š Related Controls