UCF STIG Viewer Logo

An HIDS has not been implemented on the NTP server.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17849 NET0816 SV-19124r1_rule Low
Description
NTP provides an efficient and scalable method for managed network elements to actively synchronize to an accurate time source. Insuring that there are always NTP servers available to provide time is critical. It is imperative that all single points of failure for the NTP infrastructure are eliminated. Knowing the correct time is not only crucial for proper network functioning but also for security. Compromising an NTP server opens the door to more sophisticated attacks that include NTP poisoning, replay attacks, and denial of service. To provide security through separation and isolation, the NTP server should only be connected to the management network. This enables the NTP server to provide time to the managed devices using a secured as well as a preferred path. If the NTP server is not an appliance, it is critical that the system is secured by maintaining compliance with the appropriate OS STIG as well as implementing an HIDS.
STIG Date
Network Devices Security Technical Implementation Guide 2018-11-27

Details

Check Text ( None )
None
Fix Text (F-17786r1_fix)
Implement an HIDS on the NTP server