last sync: 2023-Jun-02 17:44:47 UTC

Azure Policy definition

Define and enforce inactivity log policy

Name Define and enforce inactivity log policy
Azure Portal
Id 2af4640d-11a6-a64b-5ceb-a468f4341c0c
Version 1.1.0
details on versioning
Category Regulatory Compliance
Microsoft docs
Description CMA_C1017 - Define and enforce inactivity log policy
Mode All
Type BuiltIn
Preview FALSE
Deprecated FALSE
Effect Default
Manual
Allowed
Manual, Disabled
RBAC
Role(s)
none
Rule
Aliases
Rule
ResourceTypes
IF (1)
Microsoft.Resources/subscriptions
Compliance The following 5 compliance controls are associated with this Policy definition 'Define and enforce inactivity log policy' (2af4640d-11a6-a64b-5ceb-a468f4341c0c)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
FedRAMP_High_R4 AC-2(5) FedRAMP_High_R4_AC-2(5) FedRAMP High AC-2 (5) Access Control Inactivity Logout Shared n/a The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out]. Supplemental Guidance: Related control: SC-23. link 1
FedRAMP_Moderate_R4 AC-2(5) FedRAMP_Moderate_R4_AC-2(5) FedRAMP Moderate AC-2 (5) Access Control Inactivity Logout Shared n/a The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out]. Supplemental Guidance: Related control: SC-23. link 1
NIST_SP_800-53_R4 AC-2(5) NIST_SP_800-53_R4_AC-2(5) NIST SP 800-53 Rev. 4 AC-2 (5) Access Control Inactivity Logout Shared n/a The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out]. Supplemental Guidance: Related control: SC-23. link 1
NIST_SP_800-53_R5 AC-2(5) NIST_SP_800-53_R5_AC-2(5) NIST SP 800-53 Rev. 5 AC-2 (5) Access Control Inactivity Logout Shared n/a Require that users log out when [Assignment: organization-defined time period of expected inactivity or description of when to log out]. link 1
PCI_DSS_v4.0 8.2.8 PCI_DSS_v4.0_8.2.8 PCI DSS v4.0 8.2.8 Requirement 08: Identify Users and Authenticate Access to System Components User identification and related accounts for users and administrators are strictly managed throughout an account’s lifecycle Shared n/a If a user session has been idle for more than 15 minutes, the user is required to re-authenticate to re-activate the terminal or session. link 2
History
Date/Time (UTC ymd) (i) Change type Change detail
2022-09-27 16:35:32 change Minor (1.0.0 > 1.1.0)
2022-09-19 17:41:40 add 2af4640d-11a6-a64b-5ceb-a468f4341c0c
Initiatives
usage
Initiative DisplayName Initiative Id Initiative Category State Type
FedRAMP High d5264498-16f4-418a-b659-fa7ef418175f Regulatory Compliance GA BuiltIn
FedRAMP Moderate e95f5a9f-57ad-4d03-bb0b-b1d16db93693 Regulatory Compliance GA BuiltIn
NIST SP 800-53 Rev. 4 cf25b9c1-bd23-4eb6-bd2c-f4f3ac644a5f Regulatory Compliance GA BuiltIn
NIST SP 800-53 Rev. 5 179d1daa-458f-4e47-8086-2a68d0d6c38f Regulatory Compliance GA BuiltIn
PCI DSS v4 c676748e-3af9-4e22-bc28-50feed564afb Regulatory Compliance GA BuiltIn
JSON