Account Management | Inactivity Logout
NIST SP 800-53 Rev. 5 AC-2(5) requires you to force a user logout after a defined period of inactivity, not just “lock the screen.” To operationalize it, set an organization-wide inactivity threshold, implement technical session timeouts across all in-scope systems, document exceptions, and retain test evidence that the logout works in production. 1
Key takeaways:
- “Organization-defined” means you must choose, approve, and document the inactivity period, then implement it consistently across the authorization boundary. 1
- Assessors will look for enforced session termination (logout), not a policy statement or an idle screen lock alone. 2
- Evidence needs to show configuration, scope coverage, and operational testing results, plus exception handling tied to risk. 3
Account Management | Inactivity Logout is a deceptively small requirement that becomes a recurring audit issue because it spans many systems: your SSO, SaaS apps, admin consoles, VPN/jump hosts, and any custom application that maintains sessions. The control language is short, but the operational expectation is not: you must define a time period of expected inactivity and require users to log out when it’s exceeded. 1
For FedRAMP-scoped environments, this is an “everywhere” control. If even one administrative interface or internal tool keeps sessions alive indefinitely, you have a boundary gap that’s easy for a 3PAO to demonstrate and hard to explain during authorization or continuous monitoring. Weak inactivity handling increases the chance that unattended devices, shared workstations, and hijacked browser sessions keep privileged access available longer than intended. 2
This page translates AC-2(5) into concrete build steps, configuration patterns, and the evidence set you should maintain so you can answer assessor questions quickly and consistently. 1
Regulatory text
Requirement (AC-2(5)): “Require that users log out when an organization-defined time period of expected inactivity is exceeded.” 1
What the operator must do
- Pick and document the inactivity period (the “organization-defined” value), including any differentiated values (for example, standard users vs. administrators) if you choose to vary it. 1
- Configure technical enforcement so a session ends after inactivity—meaning the user must re-authenticate to regain access. 4
- Apply it across the FedRAMP authorization boundary (all in-scope systems that support user sessions), including third-party components you rely on. 1
- Prove it works with repeatable tests and retain evidence for authorization packages and ongoing monitoring. 3
Plain-English interpretation (what “inactivity logout” really means)
- Inactivity: no user activity that should keep a session alive (keyboard/mouse activity, API calls on behalf of a user session, in-app requests, or other defined activity depending on the system). You must define how you measure it for each session type. 1
- Logout: session termination. The session token/cookie becomes invalid, and the user must sign in again. A screen saver or workstation lock may be helpful, but it does not automatically satisfy “log out” for web apps and consoles. 4
- Organization-defined time period: you choose the value and justify it. Auditors care less about the exact number than whether it’s risk-based, approved, consistently implemented, and evidenced. 1
Who it applies to
Entity scope (FedRAMP context)
- Cloud Service Providers (CSPs) operating a system seeking or maintaining FedRAMP authorization. 1
- Federal agencies that operate, configure, or inherit aspects of session management within their environment and the authorized boundary. 1
Operational scope (where this requirement shows up)
You should treat these as “must-check” surfaces inside the authorization boundary:
- SSO / IdP sessions (for example, identity provider console sessions and user portal sessions)
- Administrative consoles (cloud management portals, security tooling, CI/CD, monitoring consoles)
- Custom applications (web UI sessions, mobile app sessions, API-backed UI sessions)
- Privileged access tooling (jump boxes, bastions, remote admin interfaces)
- VDI / remote access portals where sessions can persist after idle time
If a system can hold an authenticated session open, it is a candidate for inactivity logout enforcement. 1
What you actually need to do (step-by-step)
Step 1: Set the rule and get it approved
Create a short standard that answers:
- What is the inactivity threshold for standard users?
- What is the inactivity threshold for privileged/admin users?
- What does “activity” mean for your main session types (browser, thick client, API-backed UI)?
- What is the exception process and approval authority?
Keep it tight: one page is enough if it’s unambiguous and enforceable. 1
Step 2: Inventory session-bearing systems in scope
Build a list (spreadsheet is fine) of:
- System name, owner, environment (prod/non-prod if relevant to your control statements)
- Authentication method (SSO, local auth)
- Session mechanism (cookie, token, console session)
- Current timeout settings (idle timeout, absolute session lifetime)
- How to test logout behavior
This inventory becomes your coverage map during assessor walkthroughs. 3
Step 3: Implement technical controls by pattern
Use consistent patterns to reduce drift:
Pattern A: Centralized SSO enforcement
- Configure IdP session idle timeout and maximum session lifetime.
- Ensure downstream apps respect IdP session policies (or enforce their own stricter timeouts).
- Verify re-authentication occurs after timeout, not silent token refresh without user presence.
Pattern B: Application-layer session timeout
- For custom apps, implement idle timers server-side (do not rely only on client-side JavaScript).
- Invalidate session tokens on timeout.
- Log a security event for session termination due to inactivity.
Pattern C: Administrative consoles and third-party tools
- Configure idle session timeout in each admin console.
- Where a third-party tool cannot enforce idle logout, document compensating controls (for example, network restrictions, step-up auth, or removal from boundary) and record a formal exception. 1
Step 4: Validate with repeatable test cases
Create test scripts that a control tester can rerun:
- Start session as a standard user, remain idle past the threshold, attempt action, confirm logout and re-auth prompt.
- Repeat for a privileged/admin role.
- Repeat for key interfaces (web UI, admin console, API-backed UI).
Capture screenshots or screen recordings plus the system configuration page showing the timeout. Retain logs if feasible. 3
Step 5: Operationalize: monitoring, drift control, and exceptions
- Add timeout settings to your configuration baseline and change management checks.
- Require security review when any team changes session/token handling code or SSO policies.
- Maintain an exceptions register with: system, why it can’t comply, compensating control, approver, review cadence, and exit criteria. 1
Where Daydream fits naturally: teams often fail this control because evidence is scattered (IdP screenshots in one place, app configs in another, exceptions in email). Daydream helps you centralize control narratives, map each in-scope system to the logout requirement, and track exceptions and retesting as part of continuous monitoring packages. 3
Required evidence and artifacts to retain
Keep evidence that covers policy, implementation, and operation:
Governance artifacts
- Session management / inactivity logout standard (approved version)
- Scope inventory of session-bearing systems and owners
- Exceptions register with approvals and compensating controls 1
Technical artifacts
- Configuration screenshots/exports for:
- IdP/SSO session idle timeout and max lifetime
- App/session settings for each in-scope system
- Admin console session timeout settings
- Code/config references for custom apps (config file snippets, relevant commit references) 4
Validation artifacts
- Test scripts and completed test results
- Evidence of periodic retesting (for example, after major releases or identity changes)
- Logs showing session termination events, where available 3
Common exam/audit questions and hangups (what assessors press on)
Expect questions like:
- “Show me where the inactivity period is defined and approved.” 1
- “Demonstrate logout behavior in the production environment for an admin account.” 3
- “Does your solution log out, or does it only lock the workstation/browser tab?” 4
- “List all systems in the boundary that maintain sessions and show their timeout settings.” 3
- “How do you prevent a silent refresh token from keeping sessions alive indefinitely?” 4
- “What exceptions exist, who approved them, and when will you remediate?” 1
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails | How to avoid |
|---|---|---|
| Relying on endpoint screen lock | The requirement is logout after inactivity, not just a locked screen for web sessions. | Enforce server-side session termination and verify re-auth is required. 1 |
| Implementing only in the IdP | Some apps maintain their own sessions or refresh tokens. | Test each high-risk app and admin console; enforce app-side timeouts if needed. 4 |
| “Defined” but not approved | Organization-defined values must be defensible and governed. | Put the value in a standard, route through approval, and retain the approval record. 1 |
| No boundary coverage map | Assessors can’t tell what’s in scope or missed. | Maintain a session-bearing systems inventory with owners and settings. 3 |
| Exceptions handled in email/Slack | Exceptions become untraceable and expire silently. | Use an exceptions register with review dates, compensating controls, and exit criteria. 1 |
Enforcement context and risk implications
No public enforcement cases were provided for this specific requirement in the supplied source catalog, so this page does not list cases. Operationally, the risk is straightforward: long-lived unattended sessions increase the chance of unauthorized access through shoulder-surfing, shared workstations, stolen devices, or compromised session tokens, and they create control test failures that delay authorization or increase continuous monitoring findings. 4
Practical 30/60/90-day execution plan
Because the requirement demands an “organization-defined time period,” pick your phases based on your release cycles and boundary complexity rather than calendar promises.
First 30 days (Immediate stabilization)
- Name an owner (typically IAM or Security Engineering) and publish the inactivity logout standard with defined thresholds and an exception process. 1
- Build the in-scope inventory of session-bearing systems, focusing first on privileged paths (admin consoles, IAM, CI/CD). 3
- Implement IdP/SSO session idle timeouts and validate at least one critical admin path end-to-end. 4
Days 31–60 (Coverage expansion and evidence hardening)
- Configure timeouts across remaining in-scope admin consoles and major business applications.
- For custom apps, add server-side idle termination and security logging for session timeout events. 4
- Create a repeatable test script pack and store results in your audit repository for assessors. 3
Days 61–90 (Sustainment)
- Add timeout settings to baseline configuration standards and change management gates. 3
- Formalize exception reviews and track remediation milestones in one system of record (Daydream can serve as that record when you need clean traceability). 3
- Schedule periodic retesting tied to major identity changes, app releases, and boundary updates. 1
Frequently Asked Questions
Does a workstation lock screen satisfy inactivity logout?
It may help reduce exposure on endpoints, but AC-2(5) calls for a user logout after inactivity. For web and console access, enforce session termination so the user must re-authenticate. 1
Can we set different inactivity timeouts for admins vs. standard users?
Yes, as long as your organization-defined values are documented, approved, and implemented consistently for each category. Retain the rationale and ensure your evidence shows both behaviors. 1
What’s the minimum timeout value we must use?
The control does not prescribe a specific duration; it requires an organization-defined time period. Choose a value based on risk and operational needs, then enforce and evidence it across the boundary. 1
How do we handle third-party tools in the boundary that don’t support inactivity logout?
Treat this as an exception: document the limitation, define compensating controls, obtain approval, and set a review/exit plan. If it’s material, consider removing it from the authorization boundary. 1
What evidence is most persuasive to a 3PAO?
Configuration proof plus a live or recorded test showing the session ends after inactivity and requires re-authentication. Pair that with an inventory that shows all in-scope systems and their timeout settings. 3
Does “logout” mean the user must re-enter MFA after timeout?
AC-2(5) is about logout after inactivity; it does not dictate the exact re-authentication factors. Align the post-timeout authentication step with your broader access control design and document how it works for standard and privileged roles. 4
Footnotes
Frequently Asked Questions
Does a workstation lock screen satisfy inactivity logout?
It may help reduce exposure on endpoints, but AC-2(5) calls for a user logout after inactivity. For web and console access, enforce session termination so the user must re-authenticate. (Source: NIST Special Publication 800-53 Revision 5)
Can we set different inactivity timeouts for admins vs. standard users?
Yes, as long as your organization-defined values are documented, approved, and implemented consistently for each category. Retain the rationale and ensure your evidence shows both behaviors. (Source: NIST Special Publication 800-53 Revision 5)
What’s the minimum timeout value we must use?
The control does not prescribe a specific duration; it requires an organization-defined time period. Choose a value based on risk and operational needs, then enforce and evidence it across the boundary. (Source: NIST Special Publication 800-53 Revision 5)
How do we handle third-party tools in the boundary that don’t support inactivity logout?
Treat this as an exception: document the limitation, define compensating controls, obtain approval, and set a review/exit plan. If it’s material, consider removing it from the authorization boundary. (Source: NIST Special Publication 800-53 Revision 5)
What evidence is most persuasive to a 3PAO?
Configuration proof plus a live or recorded test showing the session ends after inactivity and requires re-authentication. Pair that with an inventory that shows all in-scope systems and their timeout settings. (Source: FedRAMP documents and templates)
Does “logout” mean the user must re-enter MFA after timeout?
AC-2(5) is about logout after inactivity; it does not dictate the exact re-authentication factors. Align the post-timeout authentication step with your broader access control design and document how it works for standard and privileged roles. (Source: NIST SP 800-53 Rev. 5 PDF)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream