Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-23747 | NET0812 | SV-28651r4_rule | ECSC-1 | Low |
Description |
---|
Without synchronized time, accurately correlating information between devices becomes difficult, if not impossible. If logs cannot be successfully compared between each of the routers, switches, and firewalls, it will be very difficult to determine the exact events that resulted in a network breach incident. NTP provides an efficient and scalable method for network devices to synchronize to an accurate time source. |
STIG | Date |
---|---|
WLAN Bridge Security Technical Implementation Guide (STIG) | 2016-01-07 |
Check Text ( C-3581r5_chk ) |
---|
Review the configuration and verify two NTP servers have been defined. If the device is not configured to use two separate NTP servers, this is a finding. |
Fix Text (F-3044r2_fix) |
---|
Configure the device to use two separate NTP servers. |