STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AU-8 (2) — Time Stamps

CCI-001893

Definition

The information system identifies a secondary authoritative time source that is located in a different geographic region than the primary authoritative time source.

Parent Control

AU-8 (2)Time StampsAudit and Accountability

Linked STIG Checks (34)

V-255612CAT IIThe A10 Networks ADC must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.A10 Networks ADC NDM Security Technical Implementation GuideV-217367CAT IIThe Arista Multilayer Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.Arista MLS DCS-7000 Series NDM Security Technical Implementation GuideV-255958CAT IIThe Arista network device must be configured to synchronize internal system clocks using redundant authenticated time sources.Arista MLS EOS 4.X NDM Security Technical Implementation GuideV-255512CAT IIIThe CA API Gateway must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.CA API Gateway NDM Security Technical Implementation GuideV-239924CAT IIThe Cisco ASA must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco ASA NDM Security Technical Implementation GuideV-220601CAT IIThe Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS Switch NDM Security Technical Implementation GuideV-215838CAT IIThe Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS XE Router NDM Security Technical Implementation GuideV-216535CAT IIThe Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS XR Router NDM Security Technical Implementation GuideV-242629CAT IIThe Cisco ISE must be configured to synchronize internal information system clocks using redundant authoritative time sources.Cisco ISE NDM Security Technical Implementation GuideV-217414CAT IIThe BIG-IP appliance must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.F5 BIG-IP Device Management Security Technical Implementation GuideV-255651CAT IICounterACT must be configured to synchronize internal information system clocks with the organizations primary and secondary NTP servers.ForeScout CounterACT NDM Security Technical Implementation GuideV-230944CAT IIForescout must be configured to synchronize internal information system clocks using redundant authoritative time sources.Forescout Network Device Management Security Technical Implementation GuideV-234183CAT IIThe FortiGate device must synchronize internal information system clocks using redundant authoritative time sources.Fortinet FortiGate Firewall NDM Security Technical Implementation GuideV-217465CAT IIThe HP FlexFabric Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.HP FlexFabric Switch NDM Security Technical Implementation GuideV-266953CAT IIAOS must be configured to synchronize internal information system clocks using redundant authoritative time sources.HPE Aruba Networking AOS NDM Security Technical Implementation GuideV-65153CAT IIThe DataPower Gateway must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.IBM DataPower Network Device Management Security Technical Implementation GuideV-255761CAT IIThe MQ Appliance network device must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.IBM MQ Appliance v9.0 NDM Security Technical Implementation GuideV-250999CAT IISentry must be configured to synchronize internal information system clocks using redundant authoritative time sources.Ivanti Sentry 9.x NDM Security Technical Implementation GuideV-253920CAT IIThe Juniper EX switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.Juniper EX Series Switches Network Device Management Security Technical Implementation GuideV-217334CAT IIThe Juniper router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Juniper Router NDM Security Technical Implementation GuideV-223205CAT IIThe Juniper SRX Services Gateway must be configured to synchronize internal information system clocks with the primary and secondary NTP servers for the network.Juniper SRX Services Gateway NDM Security Technical Implementation GuideV-246936CAT IIONTAP must be configured to synchronize internal information system clocks using redundant authoritative time sources.NetApp ONTAP DSC 9.x Security Technical Implementation GuideV-243152CAT IIThe network device must be configured to synchronize internal information system clocks using redundant authoritative time sources.Network WLAN AP-IG Management Security Technical Implementation GuideV-243170CAT IIThe network device must be configured to synchronize internal information system clocks using redundant authoritative time sources.Network WLAN AP-NIPR Management Security Technical Implementation GuideV-243188CAT IIThe network device must be configured to synchronize internal information system clocks using redundant authoritative time sources.Network WLAN Bridge Management Security Technical Implementation GuideV-243206CAT IIThe network device must be configured to synchronize internal information system clocks using redundant authoritative time sources.Network WLAN Controller Management Security Technical Implementation GuideV-228665CAT IIThe Palo Alto Networks security platform must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.Palo Alto Networks NDM Security Technical Implementation GuideV-92301CAT IIThe SEL-2740S must be configured to maintain internal system clocks with a backup authoritative time server.SEL-2740S NDM Security Technical Implementation GuideV-94673CAT IISymantec ProxySG must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.Symantec ProxySG NDM Security Technical Implementation GuideV-254867CAT IIThe Tanium Operating System (TanOS) must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.Tanium 7.x Operating System on TanOS Security Technical Implementation GuideV-242246CAT IIThe TippingPoint SMS must be configured to synchronize internal information system clocks using redundant authoritative time sources.Trend Micro TippingPoint NDM Security Technical Implementation GuideV-265338CAT IIThe NSX Manager must be configured to synchronize internal information system clocks using redundant authoritative time sources.VMware NSX 4.x Manager NDM Security Technical Implementation GuideV-69207CAT IIThe NSX Manager must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.VMware NSX Manager Security Technical Implementation GuideV-251782CAT IIThe NSX-T Manager must be configured to synchronize internal information system clocks using redundant authoritative time sources.VMware NSX-T Manager NDM Security Technical Implementation Guide