The HYCU virtual appliance must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-268219 | HYCU-ND-000010 | SV-268219r1038638_rule | CCI-000054 | medium |
| Description | ||||
| Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator based on account type, role, or access type is helpful in limiting risks related to denial-of-service (DoS) attacks. This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. At a minimum, limits must be set for SSH, HTTPS, account of last resort, and root account sessions. | ||||
| STIG | Date | |||
| HYCU Protege Security Technical Implementation Guide | 2024-10-29 | |||
Details
Check Text (C-268219r1038638_chk)
In the HYCU Web UI, only one login can be used at a time.
If the user is still logged into the HYCU Web UI upon logging in to the Web UI again, in a different browser tab, with the same credentials, this is a finding.
Log in to the HYCU VM console. To check the number of allowed concurrent session connections, grep file "/etc/security/limits.conf" by executing the following command:
grep maxlogins /etc/security/limits.conf
Verify the following line exists:
hycu hard maxlogins 1
If the "maxlogins" value is not set to 1 or is missing, this is a finding.
Fix Text (F-72143r1038356_fix)
The Web UI will only always allow one user session at a time.
For CLI, configure the operating system to limit the max number of concurrent sessions to 1 by adding the following line to "/etc/security/limits.conf":
hycu hard maxlogins 1