AC-2(5): Inactivity Logout

Control Family:

Access Control

Threats Addressed:

Baselines:

  • High

Next Version:

Control Statement

The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out].