8.4
IG2 IG3

Standardize Time Synchronization

Control Group: 8. Audit Log Management
Asset Type: Network
Security Function: Protect

Description

Standardize time synchronization. Configure at least two synchronized time sources across enterprise assets, where supported.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Unreliable Forensic Timeline from Clock Drift

Integrity

Inconsistent time synchronization across enterprise assets causes log timestamps to diverge by minutes or hours, making it impossible to accurately reconstruct attack timelines or correlate events across systems during incident investigations.

Log Correlation Failure Masking Coordinated Attacks

Confidentiality

SIEM correlation rules fail to detect multi-stage attacks because timestamps from different log sources are misaligned due to unsynchronized clocks, causing related attack events to appear unrelated across different time windows.

Evidence Inadmissibility Due to Unreliable Timestamps

Integrity

Legal proceedings or regulatory investigations reject log evidence because timestamps cannot be proven accurate, undermining the organization's ability to prosecute attackers or demonstrate compliance with regulatory requirements.

Vulnerabilities (When Safeguard Absent)

No Standardized NTP Configuration Across Enterprise Assets

Enterprise assets use different or no NTP servers, causing clock drift between systems that degrades the accuracy and reliability of time-stamped audit log entries used for correlation and forensic analysis.

Single NTP Source with No Redundancy

Assets are configured with only one time source, and if that source becomes unavailable or compromised, clocks drift without detection, degrading the integrity of all time-dependent security operations.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually