Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-256089 | RINP-DM-000052 | SV-256089r882775_rule | Medium |
Description |
---|
If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source. |
STIG | Date |
---|---|
Riverbed NetProfiler Security Technical Implementation Guide | 2023-01-11 |
Check Text ( C-59763r882773_chk ) |
---|
Go to Administration >> General Settings. Under "Time Configuration", verify the "Encryption" for the NTP servers is set to "SHA-1" and the Key and Index columns have a value that corresponds to each NTP server. If SHA-1 is not configured for the NTP servers, this is a finding. |
Fix Text (F-59706r882774_fix) |
---|
Go to Administration >> General Settings. Under "Time Configuration", change the "Encryption" for the NTP Servers to "SHA-1", and under the Key and Index columns, enter the value that corresponds to each NTP server. |