The network device must authenticate Network Time Protocol sources using authentication that is cryptographically based.

From Network Device Management Security Requirements Guide

Part of SRG-APP-000395-NDM-000347

Associated with: CCI-001967

SV-83339r2_rule The network device must authenticate Network Time Protocol sources using authentication that is cryptographically based.

Vulnerability discussion

If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source.

Check content

Review the network device configuration to determine if the network device authenticates NTP endpoints before establishing a local, remote, or network connection using authentication that is cryptographically based. If the network device does not authenticate Network Time Protocol sources using authentication that is cryptographically based, this is a finding.

Fix text

Configure the network device to authenticate Network Time Protocol sources using authentication that is cryptographically based.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer