1. Home
  2. Security Hardening
  3. CIS Cisco IOS 16 L1 V1.1.1
  4. Set ‘exec-timeout’ to less than or equal to 10 min on ‘ip http’

Set ‘exec-timeout’ to less than or equal to 10 min on ‘ip http’

Details

If no input is detected during the interval, the EXEC facility resumes the current connection. If no connections exist, the EXEC facility returns the terminal to the idle state and disconnects the incoming session.

Rationale:

This prevents unauthorized users from misusing abandoned sessions. For example, if the network administrator leaves for the day and leaves a computer open with an enabled login session accessible. There is a trade-off here between security (shorter timeouts) and usability (longer timeouts). Review your local policies and operational needs to determine the best timeout value. In most cases, this should be no more than 10 minutes.

This prevents unauthorized users from misusing abandoned sessions. For example, if the network administrator leaves for the day and leaves a computer open with an enabled login session accessible. There is a trade-off here between security (shorter timeouts) and usability (longer timeouts). Review your local policies and operational needs to determine the best timeout value. In most cases, this should be no more than 10 minutes.

Solution

Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.

ip http timeout-policy idle 600 life {nnnn} requests {nn}

Default Value:

disabled

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Cisco.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles