UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system time synchronization method must use cryptographic algorithms to verify the authenticity and integrity of the time data.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22293 GEN000246 SV-28719r1_rule ECSC-1 Medium
Description
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchronization, the integrity of system logs and the security of the system could be compromised.
STIG Date
UNIX SRG 2013-03-26

Details

Check Text ( C-29014r1_chk )
Check the root crontab for ntpdate entries.
# crontab -l | grep ntpdate
If the ntpdate command is not invoked with the -a parameter, this is a finding.

Check the NTP daemon configuration.
# grep ^server ntp.conf | grep -v '( key | autokey )'
If server lines are present without key or autokey options, this is a finding.
Fix Text (F-26024r1_fix)
If using ntpdate, add the -a option with a key to the cron job running ntpdate.

If using the NTP daemon, add the key or autokey options, as appropriate, to each server line in ntp.conf for each NTP server not configured for authentication.