CMMC Level 2 Practice 3.1.11: Terminate (automatically) a user session after a defined condition

CMMC Level 2 Practice 3.1.11 requires you to automatically end a user’s session when a defined condition occurs, most commonly inactivity, explicit logout, or session lifetime limits, across systems that store, process, or transmit CUI. To operationalize it fast, define the termination conditions, implement enforced technical timeouts per system, and retain configuration and test evidence. 1

Key takeaways:

  • Define “session termination conditions” in writing (idle timeout, maximum session age, re-auth triggers) and scope them to your CUI environment. 2
  • Enforce the settings technically across endpoints, remote access, OS, apps, and admin consoles; policy-only language will not pass a CMMC assessment. 3
  • Keep assessor-ready evidence: system configuration exports, MDM/GPO baselines, screenshots, and a repeatable test procedure with results. 2

“Terminate (automatically) a user session after a defined condition” is a small requirement with a large blast radius. If you miss it, you leave authenticated sessions hanging open on workstations, in web apps, and in remote access tools, which increases the chance that an unattended device or hijacked session can access CUI without re-authentication. CMMC Level 2 assessments look for technical enforcement, not aspirational policy language. 3

Operationally, you should treat this as an access control engineering task with governance wraparound: pick termination conditions that match your work patterns, implement them consistently across the CUI boundary, and prove the settings work through repeatable tests. The most common “defined condition” is inactivity (idle timeout), but in practice you will also need a maximum session lifetime for web apps and remote access, plus re-authentication after privilege changes or lock/unlock events depending on platform capabilities. 2

This page gives you requirement-level implementation guidance you can hand to IT, security engineering, and application owners, plus an evidence bundle designed to survive both a CMMC assessment and customer due diligence. 3

Regulatory text

Requirement (framework-mapped): “CMMC Level 2 practice mapped to NIST SP 800-171 Rev. 2 requirement 3.1.11 (Terminate (automatically) a user session after a defined condition).” 4

Operator interpretation (plain English)

You must configure your systems so a logged-in user’s session ends automatically when a condition you define occurs. The condition must be explicit (documented), enforced by technical settings (not just training), and applied wherever users access CUI. 2

“Session termination” can mean different things by technology:

  • Workstations/servers: lock the session, log off the user, or require re-authentication after inactivity.
  • Web applications: expire session tokens/cookies and require login again.
  • Remote access (VPN/VDI/SSH/RDP gateways): disconnect sessions after inactivity or after a maximum connection time, and require re-authentication. Your assessor will care that whatever you call “terminate” actually prevents continued access without re-authentication. 5

Who it applies to

Entity scope

  • Defense contractors and other federal contractors handling CUI that need CMMC Level 2 alignment. 6

Operational scope (what systems are in play)

Apply it to any environment in your CUI boundary, including:

  • End-user endpoints used to access CUI (managed laptops/desktops, hardened jump boxes).
  • Servers and admin consoles that host or manage CUI systems.
  • Identity and access paths into CUI (VPN, VDI, bastion hosts, SaaS applications approved for CUI).
  • Third-party hosted systems where your users authenticate and can access CUI; you still need to ensure the control is enforced, even if the setting lives with the third party. 2

What you actually need to do (step-by-step)

Step 1: Define your “termination conditions” and write them down

Create a short control statement that specifies:

  • Idle condition: what counts as inactivity for interactive sessions.
  • Absolute session lifetime condition: the maximum duration a session can remain authenticated even with activity (especially for web apps and remote access).
  • Re-authentication triggers: events that force a new login (for example, lock/unlock, privilege escalation, MFA step-up for sensitive actions) where supported.
  • Exceptions: only where mission needs demand it, with compensating controls and explicit approvals. 2

Deliverable: a one-page “control card” your teams can execute, with an owner, systems in scope, and what evidence you will retain. This prevents the most common audit failure: “we think it’s set somewhere.” 3

Step 2: Map every user session type in the CUI boundary

Build a simple inventory table:

  • System name (endpoint baseline, VPN, VDI, email, file sharing, ticketing, code repo, ERP, etc.)
  • Auth method (SSO, local, federated)
  • Session mechanism (OS login, web token, RDP session, SSH)
  • Where the timeout is configured (GPO/MDM, IdP, app admin console, reverse proxy, gateway)
  • Evidence source (config export path, screenshot location, policy object ID) 2

This inventory becomes your assessment roadmap and stops gaps across “shadow” access paths like admin consoles and bastion hosts.

Step 3: Implement technical enforcement per platform (start with the big rocks)

Prioritize where unattended access is most likely:

  1. Managed endpoints (Windows/macOS/Linux): enforce inactivity lock/logout and require re-authentication to regain access.
  2. Remote access: enforce idle disconnect and re-authentication on reconnect; align settings between VPN, VDI, and bastion hosts so users cannot bypass controls by switching tools.
  3. Web apps with CUI: enforce token expiration and idle timeout; set behavior for background refresh tokens so a tab left open does not remain usable indefinitely. 2

Practical implementation notes that tend to matter in assessments:

  • If you rely on an IdP session policy, confirm the downstream app does not keep a separate long-lived session.
  • If your endpoint “locks” but cached credentials allow immediate return without password/MFA, confirm whether that meets your interpretation of “terminate” for your environment and document it clearly.
  • If administrators use privileged sessions, apply stricter timeouts for admin consoles and jump boxes where feasible and document the difference as risk-based scoping. 3

Step 4: Test it like an assessor will

Create a repeatable test procedure:

  • Pick representative systems (endpoint, remote access, one internal app, one SaaS app).
  • Start a session, become idle, and record what happens.
  • Confirm the user must re-authenticate to regain access to CUI functions.
  • Save evidence (screenshots, logs, screen recording if allowed, and config snapshots). 2

Step 5: Operationalize the control (ownership + change management)

  • Assign a control owner (usually IAM, endpoint engineering, or security engineering).
  • Tie timeout settings to your standard build (GPO/MDM baselines, golden images, infrastructure-as-code).
  • Add a “control health check” to your compliance calendar: verify settings remain enforced after OS upgrades, IdP changes, and application releases. 3

Daydream note (earned mention): Daydream is useful here when you need a single control record that links the written “defined condition,” the system-by-system configuration evidence, and recurring health checks so you can demonstrate sustained operation during a CMMC assessment. 3

Required evidence and artifacts to retain

Keep evidence that proves (1) the conditions are defined, (2) the settings are implemented, and (3) the control operates.

Minimum evidence bundle (recommended):

  • Control card / standard: defined conditions, scope, owner, exceptions, and review cadence. 2
  • Configuration evidence per in-scope system:
    • Endpoint baseline exports (MDM profiles, GPO reports, CIS-style baseline docs if you have them).
    • VPN/VDI/bastion configuration screenshots or exports showing idle disconnect and session limits.
    • IdP session policy screenshots/exports.
    • Application session settings screenshots/config files (token TTL, idle timeout, refresh token settings). 2
  • Test evidence: dated test steps and results, with artifacts showing forced re-authentication.
  • Exception register: who approved, why, compensating controls, expiration date/event, and re-validation steps. 3

Retention location: store in your GRC repository with immutable timestamps or a controlled evidence folder structure tied to the system inventory.

Common exam/audit questions and hangups

Assessors and customer auditors tend to probe these points:

  • “What is the defined condition, exactly, and where is it documented?” 2
  • “Show me enforcement for endpoints and remote access, not only for one web application.” 3
  • “How do you prevent bypass, like switching to another access path with weaker settings?” 2
  • “How do you ensure session termination remains in place after updates and migrations?” 3
  • “What about privileged admin sessions and service accounts?” Expect to explain that service accounts are not interactive sessions, and show separate controls for them where relevant. 2

Frequent implementation mistakes (and how to avoid them)

  1. Policy-only compliance. A written standard without enforced system settings fails quickly in practice. Fix: show configuration exports and tests. 3

  2. Inconsistent timeouts across the CUI boundary. Users find the weakest link (one SaaS app or one bastion host). Fix: use the session inventory table and close gaps systematically. 2

  3. Relying on screen lock without re-authentication clarity. Some environments “lock” but do not meaningfully re-authenticate. Fix: document your mechanism and test that CUI access requires credentials again. 2

  4. No exception discipline. Teams grant permanent exceptions to executives or production admins. Fix: require written approval, compensating controls, and an end condition (sunset event). 3

  5. Ignoring third-party hosted applications. If a third party hosts a CUI-relevant app, you still need evidence the session policy exists and is enforced. Fix: include session timeout requirements in third-party contracts and obtain admin console screenshots or attestations where appropriate. 2

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this specific practice, so focus on assessment risk: failure commonly appears as an “implemented inconsistently” finding during readiness reviews because different platforms manage sessions differently and ownership is fragmented. The operational risk is straightforward: an unattended authenticated session can expose CUI to unauthorized access without defeating authentication controls. 5

Practical 30/60/90-day execution plan

You asked for speed. Use a phased plan with deliverables you can verify.

First 30 days: Define, scope, and lock down the biggest access paths

  • Publish the defined termination conditions and exception rules in a control card owned by a named team. 2
  • Build the system/session inventory for the CUI boundary.
  • Enforce endpoint inactivity lock/logout via MDM/GPO and confirm re-authentication behavior.
  • Enforce remote access session termination (VPN/VDI/bastion) and document where each setting lives. 3

Days 31–60: Expand coverage to apps and reduce bypass paths

  • Implement session policies for the highest-risk web apps that handle CUI (token expiry, idle timeout).
  • Align IdP session policy with app policies so timeouts are not negated by refresh tokens.
  • Stand up the evidence bundle structure in your GRC repository and run initial tests for each access type. 2

Days 61–90: Prove sustained operation

  • Run a formal control health check and remediate drift.
  • Finalize exception register entries with expiration and compensating controls.
  • Prepare an assessor walkthrough: inventory table, configs, and test results, organized by system. 3

Frequently Asked Questions

Does “terminate a session” mean log off, or is a screen lock enough?

The requirement is outcome-focused: the session must end or become unusable without re-authentication after your defined condition. If you treat screen lock as termination, document that choice and test that CUI access requires credentials again. 2

What “defined conditions” are acceptable?

Common conditions include inactivity (idle timeout) and maximum session lifetime, plus re-authentication triggers for sensitive actions where supported. Pick conditions that match your environment and document them clearly so an assessor can trace settings back to the definition. 2

How do we handle SaaS applications where we can’t control every session parameter?

Start with what the SaaS admin console supports (idle timeout, token lifetime, SSO session settings) and retain evidence of the configuration. If gaps remain, treat them as exceptions with compensating controls or reconsider whether the app belongs inside the CUI boundary. 3

Do service accounts fall under this requirement?

The practice targets user sessions. Service accounts are usually non-interactive, but assessors may still ask how you prevent long-lived authenticated access paths; address those through separate account and credential controls and keep the scope statement clear. 2

How do we prove this control is operating during an assessment?

Provide documented termination conditions, system configuration evidence that enforces them, and test results showing sessions end and require re-authentication. Organize evidence by system so the assessor can sample quickly. 5

What’s the fastest way to avoid “implemented inconsistently” findings?

Assign one control owner, build a session inventory across the CUI boundary, and standardize baselines (MDM/GPO for endpoints, IdP policies for SSO apps, and gateway policies for remote access). Then run periodic health checks to catch drift. 3

Footnotes

  1. NIST SP 800-171 Rev. 2; DoD CMMC Program Guidance

  2. NIST SP 800-171 Rev. 2

  3. DoD CMMC Program Guidance

  4. NIST SP 800-171 Rev. 2; DoD CMMC Program Guidance; 32 CFR Part 170

  5. DoD CMMC Program Guidance; NIST SP 800-171 Rev. 2

  6. 32 CFR Part 170; DoD CMMC Program Guidance

Frequently Asked Questions

Does “terminate a session” mean log off, or is a screen lock enough?

The requirement is outcome-focused: the session must end or become unusable without re-authentication after your defined condition. If you treat screen lock as termination, document that choice and test that CUI access requires credentials again. (Source: NIST SP 800-171 Rev. 2)

What “defined conditions” are acceptable?

Common conditions include inactivity (idle timeout) and maximum session lifetime, plus re-authentication triggers for sensitive actions where supported. Pick conditions that match your environment and document them clearly so an assessor can trace settings back to the definition. (Source: NIST SP 800-171 Rev. 2)

How do we handle SaaS applications where we can’t control every session parameter?

Start with what the SaaS admin console supports (idle timeout, token lifetime, SSO session settings) and retain evidence of the configuration. If gaps remain, treat them as exceptions with compensating controls or reconsider whether the app belongs inside the CUI boundary. (Source: DoD CMMC Program Guidance)

Do service accounts fall under this requirement?

The practice targets user sessions. Service accounts are usually non-interactive, but assessors may still ask how you prevent long-lived authenticated access paths; address those through separate account and credential controls and keep the scope statement clear. (Source: NIST SP 800-171 Rev. 2)

How do we prove this control is operating during an assessment?

Provide documented termination conditions, system configuration evidence that enforces them, and test results showing sessions end and require re-authentication. Organize evidence by system so the assessor can sample quickly. (Source: DoD CMMC Program Guidance; NIST SP 800-171 Rev. 2)

What’s the fastest way to avoid “implemented inconsistently” findings?

Assign one control owner, build a session inventory across the CUI boundary, and standardize baselines (MDM/GPO for endpoints, IdP policies for SSO apps, and gateway policies for remote access). Then run periodic health checks to catch drift. (Source: DoD CMMC Program Guidance)

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream