UCF STIG Viewer Logo

The Cisco IOS XE router must use internal system clocks to generate time stamps for audit records.


Overview

Finding ID Version Rule ID IA Controls Severity
V-74003 CISR-ND-000036 SV-88677r2_rule Medium
Description
In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the network device must support the organization's capability to correlate the audit log data from multiple network devices to acquire a clear understanding of events. In order to correlate auditable events, time stamps are needed on all of the log records. If the internal clock is not used, the system may not be able to provide time stamps for log messages. Additionally, externally generated time stamps may not be accurate. Applications can use the capability of an operating system or purpose-built module for this purpose. (Note that the internal clock is required to be synchronized with authoritative time sources by other requirements.)
STIG Date
Cisco IOS XE Release 3 NDM Security Technical Implementation Guide 2018-12-20

Details

Check Text ( C-74087r3_chk )
Verify that the Cisco IOS XE router is configured to use internal system clocks to generate time stamps for audit records.

The configuration should look similar to the example below:

service timestamps log datetime

If internal systems clocks are not being used, this is a finding.
Fix Text (F-80543r3_fix)
Configure the Cisco IOS XE router to use internal clocks to generate time stamps for audit records.

The configuration should look similar to the example below:

service timestamps log datetime