🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.9

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.9

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.9 – Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.

Understanding the Requirement

This control, from NIST SP 800-171 REV.2 / CMMC 2.0 Level 2, requires that network connections created for communications sessions must be closed when the session ends or automatically after a defined idle period. The goal is to reduce the risk that an attacker or an unattended system can reuse an open session. Practically, an organization must define inactivity thresholds and enforce them so sessions terminate at logout or after the set timeout, balancing usability (employee workflows and remote access needs) with security.

Technical Implementation

  • Document a clear session-timeout policy: define inactivity periods by connection type and risk level (e.g., VPN remote access: 60 minutes; TCP application sessions: 1,800 seconds/30 minutes; UDP/ICMP short-lived: 5 seconds; other protocols: 180 seconds). Publish this policy and include exception handling and approval processes.

  • Configure perimeter devices and VPN appliances: set idle timeout values on firewalls, VPN concentrators, and load balancers. For example, set VPN idle timeout to 60 minutes and TCP session timeout to 1,800 seconds in firewall state tables. Verify vendor defaults and adjust if they are more permissive than your policy.

  • Harden servers and endpoints: enforce session timeouts for RDP/SSH/administrative consoles (e.g., SSH TMOUT environment variable, RDP session limits), require OS screen lock after a short inactivity period (e.g., 5–15 minutes), and configure automatic logoff for privileged accounts.

  • Implement application-level session management: set web application and SSO session lifetimes, use secure session cookies with expiration, and clear sessions on logout. For APIs and services, enforce access token time-to-live (TTL) and require re-authentication for long-running tasks.

  • Log and monitor forced terminations: generate logs for session disconnects and idle timeouts, ship them to your SIEM or log server, and periodically review to detect unusual patterns (e.g., many late-night timeouts, repeated reconnections) that could indicate compromise or misconfiguration.

  • Test and train: perform periodic tests (change timeouts in a test environment, simulate idle sessions) and communicate changes to users. Coordinate changes with system/network administrators and security staff so that timeouts don’t disrupt business critical workflows.

Example in a Small or Medium Business

Acme Engineering, a 75-person SMB, maintains a mixed on-prem/cloud environment and needs to protect controlled technical data accessed remotely. The security lead writes a simple session timeout policy that sets VPN idle disconnects to 60 minutes, TCP session timeouts to 30 minutes in the firewall, and RDP/console sessions to 15 minutes of idle time before session lock. The network admin updates the VPN appliance and firewall settings, and the IT team enforces an OS screen lock policy via endpoint management so laptops lock after 10 minutes. The web-based project management tool’s session TTL is lowered to 20 minutes and SSO sessions are configured to require reauthentication for sensitive projects. Logs for session disconnects are forwarded to the central log server and reviewed weekly for anomalies. Employees receive a short notice explaining the changes and guidance on reconnecting when a session times out; an exception process is established for contractors doing long-running builds. After two weeks of monitoring, the team adjusts a few application timeouts to reduce unnecessary disruption while keeping the core policy enforced.

Summary

By defining acceptable inactivity periods in policy and implementing those timeouts across VPNs, firewalls, servers, endpoints, and applications, SMBs can ensure sessions are closed at logout or after a controlled idle period. Combine these technical controls with logging, monitoring, testing, user communication, and an exception process to maintain usability while reducing the risk that open or unattended sessions are abused.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes