The operating system must provide a logoff capability for user-initiated communications sessions when requiring user access authentication.

STIG ID: SRG-OS-000280-GPOS-00110  |  SRG: SRG-OS-000280 |  Severity: medium |  CCI: CCI-002363 |  Vulnerability Id: V-203684 | 

Vulnerability Discussion

If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session.

Information resources to which users gain access via authentication include, for example, local workstations and remote services. For some types of interactive sessions, including, for example, remote logon, information systems typically send logoff messages as final messages prior to terminating sessions.

Check

Verify the operating system provides a logoff capability for user-initiated communications sessions when requiring user access authentication. If it does not, this is a finding.

Fix

Configure the operating system to provide a logoff capability for user-initiated communications sessions when requiring user access authentication.