STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation Guide

V-283410

CAT II (Medium)

The HPE Alletra Storage ArcusOS device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

Rule ID

SV-283410r1194924_rule

STIG

HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001967CCI-004922CCI-004923

Discussion

If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source. Satisfies: SRG-APP-000395-NDM-000347, SRG-APP-000920-NDM-000320, SRG-APP-000925-NDM-000330

Check Content

Verify the NTP server is configured to utilize a valid key using the following command:

cli% shownet -d 
Example output:

Detailed information about configured NTP servers
16.110.135.123 : 
10.157.44.5    : key 1

If "Detailed information about configured NTP servers" does not display an NTP server with a key, this is a finding.

Fix Text

Import the NTP key and add it to the NTP server with the following commands:

cli% setnet ntp -add <server ip address>

cli% importkeys ntp stdin
Please paste the keys for ntp. Once finished, please press Enter twice.
1 SHA256 myfirstsecretkey
cli%
cli%  setnet ntp -add -key <ID> <NTP_Server_IP>