STIGhub
STIGs
RMF Controls
Compare
← SC-45 — System Time Synchronization
CCI-004922
Definition
Synchronize system clocks within and between systems or system components.
Parent Control
SC-45
System Time Synchronization
System and Communications Protection
Linked STIG Checks (50)
V-274175
CAT II
Amazon Linux 2023 must synchronize internal information system clocks to the authoritative time source at least every 24 hours.
Amazon Linux 2023 Security Technical Implementation Guide
V-268149
CAT II
NixOS must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
Anduril NixOS Security Technical Implementation Guide
V-268427
CAT II
The macOS system must enforce time synchronization.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268450
CAT II
The macOS system must enable the time synchronization daemon.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277035
CAT II
The macOS system must enforce time synchronization.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277058
CAT II
The macOS system must enable the time synchronization daemon.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-263556
CAT II
The application server must synchronize system clocks within and between systems or system components.
Application Server Security Requirements Guide
V-255958
CAT II
The Arista network device must be configured to synchronize internal system clocks using redundant authenticated time sources.
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
V-276016
CAT II
Ax-OS must compare the internal system clocks on an organization-defined frequency with an organization-defined authoritative time source.
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
V-270751
CAT III
Ubuntu 24.04 LTS must compare internal information system clocks at least every 24 hours with an authoritative time server.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-263584
CAT II
The Central Log Server must synchronize system clocks within and between systems or system components.
Central Log Server Security Requirements Guide
V-271971
CAT II
The Cisco ACI must be configured to synchronize system clocks within and between systems or system components.
Cisco ACI NDM Security Technical Implementation Guide
V-239924
CAT II
The Cisco ASA must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Cisco ASA NDM Security Technical Implementation Guide
V-215693
CAT II
The Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Cisco IOS Router NDM Security Technical Implementation Guide
V-220601
CAT II
The Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Cisco IOS Switch NDM Security Technical Implementation Guide
V-215838
CAT II
The Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Cisco IOS XE Router NDM Security Technical Implementation Guide
V-220549
CAT II
The Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Cisco IOS XE Switch NDM Security Technical Implementation Guide
V-216535
CAT II
The Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Cisco IOS XR Router NDM Security Technical Implementation Guide
V-242629
CAT II
The Cisco ISE must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Cisco ISE NDM Security Technical Implementation Guide
V-220498
CAT II
The Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Cisco NX OS Switch NDM Security Technical Implementation Guide
V-269535
CAT II
AlmaLinux OS 9 must securely compare internal information system clocks at least every 24 hours.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-263601
CAT II
The container platform must synchronize system clocks within and between systems or system components.
Container Platform Security Requirements Guide
V-263621
CAT II
The DBMS must synchronize system clocks within and between systems or system components.
Database Security Requirements Guide
V-270644
CAT II
The Dell OS10 Switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Dell OS10 Switch NDM Security Technical Implementation Guide
V-263645
CAT II
The DNS server implementation must synchronize system clocks within and between systems or system components.
Domain Name System (DNS) Security Requirements Guide
V-230952
CAT II
Forescout must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.
Forescout Network Device Management Security Technical Implementation Guide
V-263661
CAT II
The operating system must synchronize system clocks within and between systems or system components.
General Purpose Operating System Security Requirements Guide
V-283410
CAT II
The HPE Alletra Storage ArcusOS device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.
HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation Guide
V-252202
CAT II
The HPE Nimble must be configured to synchronize internal information system clocks using an authoritative time source.
HPE Nimble Storage Array NDM Security Technical Implementation Guide
V-268216
CAT II
The HYCU virtual appliance must be configured to synchronize internal information system clocks using redundant authoritative time sources.
HYCU Protege Security Technical Implementation Guide
V-223553
CAT II
IBM z/OS PARMLIB CLOCKxx must have the Accuracy PARM coded properly.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223776
CAT II
IBM z/OS PARMLIB CLOCKxx must have the Accuracy PARM properly coded.
IBM z/OS RACF Security Technical Implementation Guide
V-258610
CAT II
The ICS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Ivanti Connect Secure NDM Security Technical Implementation Guide
V-253920
CAT II
The Juniper EX switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
V-217334
CAT II
The Juniper router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.
Juniper Router NDM Security Technical Implementation Guide
V-223205
CAT II
The Juniper SRX Services Gateway must be configured to synchronize internal information system clocks with the primary and secondary NTP servers for the network.
Juniper SRX Services Gateway NDM Security Technical Implementation Guide
V-263686
CAT II
The Mainframe Product must synchronize system clocks within and between systems or system components.
Mainframe Product Security Requirements Guide
V-278029
CAT III
The Windows Server 2025 time service must synchronize with an appropriate DOD time source.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-264307
CAT II
The network device must be configured to synchronize system clocks within and between systems or system components.
Network Device Management Security Requirements Guide
V-279450
CAT II
Nutanix AOS must configure Network Time Protocol (NTP).
Nutanix Acropolis Application Server Security Technical Implementation Guide
V-279573
CAT III
Nutanix OS must configure redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-228665
CAT II
The Palo Alto Networks security platform must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
Palo Alto Networks NDM Security Technical Implementation Guide
V-273850
CAT II
The RUCKUS ICX device must be configured to synchronize system clocks within and between systems or system components.
RUCKUS ICX NDM Security Technical Implementation Guide
V-281336
CAT II
RHEL 10 must securely compare internal information system clocks at least every 24 hours.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-256085
CAT II
The Riverbed NetProfiler must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Riverbed NetProfiler Security Technical Implementation Guide
V-279269
CAT II
The Edge SWG must authenticate Network Time Protocol sources using authentication that is cryptographically based.
Symantec Edge SWG NDM Security Technical Implementation Guide
V-242246
CAT II
The TippingPoint SMS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
Trend Micro TippingPoint NDM Security Technical Implementation Guide
V-282772
CAT II
TOSS 5 must securely compare internal information system clocks at least every 24 hours.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-264326
CAT II
The VMM must synchronize system clocks within and between systems or system components.
Virtual Machine Manager Security Requirements Guide
V-264358
CAT II
The web server must synchronize system clocks within and between systems or system components.
Web Server Security Requirements Guide