Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22293 | GEN000246 | SV-28719r1_rule | ECSC-1 | Medium |
Description |
---|
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchronization, the integrity of system logs and the security of the system could be compromised. |
STIG | Date |
---|---|
UNIX SRG | 2013-03-26 |
Check Text ( C-29014r1_chk ) |
---|
Check the root crontab for ntpdate entries. # crontab -l | grep ntpdate If the ntpdate command is not invoked with the -a parameter, this is a finding. Check the NTP daemon configuration. # grep ^server ntp.conf | grep -v '( key | autokey )' If server lines are present without key or autokey options, this is a finding. |
Fix Text (F-26024r1_fix) |
---|
If using ntpdate, add the -a option with a key to the cron job running ntpdate. If using the NTP daemon, add the key or autokey options, as appropriate, to each server line in ntp.conf for each NTP server not configured for authentication. |