STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-45 — System Time Synchronization

CCI-004922

Definition

Synchronize system clocks within and between systems or system components.

Parent Control

SC-45System Time SynchronizationSystem and Communications Protection

Linked STIG Checks (50)

V-274175CAT IIAmazon Linux 2023 must synchronize internal information system clocks to the authoritative time source at least every 24 hours.Amazon Linux 2023 Security Technical Implementation GuideV-268149CAT IINixOS must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).Anduril NixOS Security Technical Implementation GuideV-268427CAT IIThe macOS system must enforce time synchronization.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268450CAT IIThe macOS system must enable the time synchronization daemon.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277035CAT IIThe macOS system must enforce time synchronization.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277058CAT IIThe macOS system must enable the time synchronization daemon.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-263556CAT IIThe application server must synchronize system clocks within and between systems or system components.Application Server Security Requirements GuideV-255958CAT IIThe Arista network device must be configured to synchronize internal system clocks using redundant authenticated time sources.Arista MLS EOS 4.X NDM Security Technical Implementation GuideV-276016CAT IIAx-OS must compare the internal system clocks on an organization-defined frequency with an organization-defined authoritative time source.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-270751CAT IIIUbuntu 24.04 LTS must compare internal information system clocks at least every 24 hours with an authoritative time server.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-263584CAT IIThe Central Log Server must synchronize system clocks within and between systems or system components.Central Log Server Security Requirements GuideV-271971CAT IIThe Cisco ACI must be configured to synchronize system clocks within and between systems or system components.Cisco ACI NDM Security Technical Implementation GuideV-239924CAT IIThe Cisco ASA must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco ASA NDM Security Technical Implementation GuideV-215693CAT IIThe Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS Router NDM Security Technical Implementation GuideV-220601CAT IIThe Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS Switch NDM Security Technical Implementation GuideV-215838CAT IIThe Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS XE Router NDM Security Technical Implementation GuideV-220549CAT IIThe Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS XE Switch NDM Security Technical Implementation GuideV-216535CAT IIThe Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS XR Router NDM Security Technical Implementation GuideV-242629CAT IIThe Cisco ISE must be configured to synchronize internal information system clocks using redundant authoritative time sources.Cisco ISE NDM Security Technical Implementation GuideV-220498CAT IIThe Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco NX OS Switch NDM Security Technical Implementation GuideV-269535CAT IIAlmaLinux OS 9 must securely compare internal information system clocks at least every 24 hours.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-263601CAT IIThe container platform must synchronize system clocks within and between systems or system components.Container Platform Security Requirements GuideV-263621CAT IIThe DBMS must synchronize system clocks within and between systems or system components.Database Security Requirements GuideV-270644CAT IIThe Dell OS10 Switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.Dell OS10 Switch NDM Security Technical Implementation GuideV-263645CAT IIThe DNS server implementation must synchronize system clocks within and between systems or system components.Domain Name System (DNS) Security Requirements GuideV-230952CAT IIForescout must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.Forescout Network Device Management Security Technical Implementation GuideV-263661CAT IIThe operating system must synchronize system clocks within and between systems or system components.General Purpose Operating System Security Requirements GuideV-283410CAT IIThe HPE Alletra Storage ArcusOS device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation GuideV-252202CAT IIThe HPE Nimble must be configured to synchronize internal information system clocks using an authoritative time source.HPE Nimble Storage Array NDM Security Technical Implementation GuideV-268216CAT IIThe HYCU virtual appliance must be configured to synchronize internal information system clocks using redundant authoritative time sources.HYCU Protege Security Technical Implementation GuideV-223553CAT IIIBM z/OS PARMLIB CLOCKxx must have the Accuracy PARM coded properly.IBM z/OS ACF2 Security Technical Implementation GuideV-223776CAT IIIBM z/OS PARMLIB CLOCKxx must have the Accuracy PARM properly coded.IBM z/OS RACF Security Technical Implementation GuideV-258610CAT IIThe ICS must be configured to synchronize internal information system clocks using redundant authoritative time sources.Ivanti Connect Secure NDM Security Technical Implementation GuideV-253920CAT IIThe Juniper EX switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.Juniper EX Series Switches Network Device Management Security Technical Implementation GuideV-217334CAT IIThe Juniper router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Juniper Router NDM Security Technical Implementation GuideV-223205CAT IIThe Juniper SRX Services Gateway must be configured to synchronize internal information system clocks with the primary and secondary NTP servers for the network.Juniper SRX Services Gateway NDM Security Technical Implementation GuideV-263686CAT IIThe Mainframe Product must synchronize system clocks within and between systems or system components.Mainframe Product Security Requirements GuideV-278029CAT IIIThe Windows Server 2025 time service must synchronize with an appropriate DOD time source.Microsoft Windows Server 2025 Security Technical Implementation GuideV-264307CAT IIThe network device must be configured to synchronize system clocks within and between systems or system components.Network Device Management Security Requirements GuideV-279450CAT IINutanix AOS must configure Network Time Protocol (NTP).Nutanix Acropolis Application Server Security Technical Implementation GuideV-279573CAT IIINutanix OS must configure redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).Nutanix Acropolis GPOS Security Technical Implementation GuideV-228665CAT IIThe Palo Alto Networks security platform must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.Palo Alto Networks NDM Security Technical Implementation GuideV-273850CAT IIThe RUCKUS ICX device must be configured to synchronize system clocks within and between systems or system components.RUCKUS ICX NDM Security Technical Implementation GuideV-281336CAT IIRHEL 10 must securely compare internal information system clocks at least every 24 hours.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-256085CAT IIThe Riverbed NetProfiler must be configured to synchronize internal information system clocks using redundant authoritative time sources.Riverbed NetProfiler Security Technical Implementation GuideV-279269CAT IIThe Edge SWG must authenticate Network Time Protocol sources using authentication that is cryptographically based.Symantec Edge SWG NDM Security Technical Implementation GuideV-242246CAT IIThe TippingPoint SMS must be configured to synchronize internal information system clocks using redundant authoritative time sources.Trend Micro TippingPoint NDM Security Technical Implementation GuideV-282772CAT IITOSS 5 must securely compare internal information system clocks at least every 24 hours.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-264326CAT IIThe VMM must synchronize system clocks within and between systems or system components.Virtual Machine Manager Security Requirements GuideV-264358CAT IIThe web server must synchronize system clocks within and between systems or system components.Web Server Security Requirements Guide