AC-11 Session Lock
Description
Device locks are temporary actions taken when users stop work and move away from the immediate vicinity of information systems but do not want to log out because of the temporary nature of their absences. Device locks are implemented where session activities can be determined. This is typically at the operating system level but can also be at the application level. Device locks are not an acceptable substitute for logging out of information systems, for example, if organizations require users to log out at the end of workdays.
Applicability
The information resource owner, or designee, is responsible for ensuring that the measures described in this Control are implemented.
The intended audience for this Control includes, but is not limited to, all information resource owners and custodians.
Implementation
The information system:
- Custodians shall configure servers such that:
- Sessions are locked after 15 minutes of inactivity or upon receiving a request from the session user, and
- The session lock remain in effect until the user re-establishes access using established identification and authentication procedures.
- Custodians shall configure workstations and other endpoint devices such that:
- Sessions are locked after 15 minutes of inactivity or upon receiving a request from the session user, except for the following workstation types:
- Conference room workstation sessions are locked after 60 minutes of inactivity or upon receiving a request from the session user;
- Classroom workstation sessions are locked after 120 minutes of inactivity or upon receiving a request from the session user;
- Kiosk workstations and special event workstations sessions are exempt from session lockout;
- The session lock remain in effect until the user re-establishes access using established identification and authentication procedures.
- Sessions are locked after 15 minutes of inactivity or upon receiving a request from the session user, except for the following workstation types:
- Custodians shall configure session lock screens to completely conceal any information previously visible on the display. Retains the session lock until the user reestablishes access using established identification and authentication procedures.
Revision History
Last Updated: February 21, 2025
Previous Versions:
- June 29, 2023
- May 31, 2022
- March 25, 2021
- September 16, 2019