10.6: 1. System clocks and time are synchronized using time-synchronization technology.
  • Examine system configuration settings to verify that time-synchronization technology is implemented and kept current.

Description

Purpose

Time synchronization technology is used to synchronize clocks on multiple systems. When clocks are not properly synchronized, it can be difficult, if not impossible, to compare log files from different systems and establish an exact sequence of events, which is crucial for forensic analysis following a breach.

For post-incident forensics teams, the accuracy and consistency of time across all systems and the time of each activity are critical in determining how the systems were compromised.

Examples

Network Time Protocol (NTP) is one example of time-synchronization technology.

10.6: 2. Systems are configured to the correct and consistent time as follows: (a) One or more designated time servers are in use, (b) Only the designated central time server(s) receives time from external sources, (c) Time received from external sources is based on International Atomic Time or Coordinated Universal Time (UTC), (d) The designated time server(s) accept time updates only from specific industry-accepted external sources, (e) Where there is more than one designated time server, the time servers peer with one another to keep accurate time, (f) Internal systems receive time information only from designated central time server(s).
  • Examine system configuration settings for acquiring, distributing, and storing the correct time to verify the settings are configured in accordance with all elements specified in this requirement.

Description

Purpose

Using reputable time servers is a critical component of the time synchronization process.

Accepting time updates from specific, industry- accepted external sources helps prevent a malicious individual from changing time settings on systems.

Good Practice

Another option to prevent unauthorized use of internal time servers is to encrypt updates with a symmetric key and create access control lists that specify the IP addresses of client machines that will be provided with the time updates.

10.6: 3. Time synchronization settings and data are protected as follows: (a) Access to time data is restricted to only personnel with a business need, (b) Any changes to time settings on critical systems are logged, monitored, and reviewed.
  • Examine system configurations and time- synchronization settings to verify that access to time data is restricted to only personnel with a business need.
  • Examine system configurations and time synchronization settings and logs and observe processes to verify that any changes to time settings on critical systems are logged, monitored, and reviewed.

Description

Purpose

Attackers will try to change time configurations to hide their activity. Therefore, restricting the ability to change or modify time synchronization configurations or the system time to administrators will lessen the probability of an attacker successfully changing time configurations.