The NTP server is not compliant with the OS STIG

From Network Devices Security Technical Implementation Guide

Part of The NTP server is not compliant with the OS STIG

Associated with IA controls: DCCS-1, DCCS-2

SV-19123r1_rule The NTP server is not compliant with the OS STIG

Vulnerability discussion

NTP provides an efficient and scalable method for managed network elements to actively synchronize to an accurate time source. Insuring that there are always NTP servers available to provide time is critical. It is imperative that all single points of failure for the NTP infrastructure are eliminated. Knowing the correct time is not only crucial for proper network functioning but also for security. Compromising an NTP server opens the door to more sophisticated attacks that include NTP poisoning, replay attacks, and denial of service. To provide security through separation and isolation, the NTP server should only be connected to the management network. This enables the NTP server to provide time to the managed devices using a secured as well as a preferred path. If the NTP server is not an appliance, it is critical that the system is secured by maintaining compliance with the appropriate OS STIG as well as implementing an HIDS.

Check content

Interview the IAO and administrator to determine if the server is compliant with respective OS STIG.

Fix text

If the NTP server is not an appliance, configure the platform hosting the NTP server in accordance with the appropriate OS STIG.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer