STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-280958

CAT II (Medium)

RHEL 10 must have the "chrony" package installed.

Rule ID

SV-280958r1195348_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-004923

Discussion

Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Sources outside the configured acceptable allowance (drift) may be inaccurate.

Check Content

Verify RHEL 10 has the "chrony" package installed with the following command:

$ sudo dnf list --installed chrony
Installed Packages
chrony.x86_64                                           4.6.1-1.el10                                           @anaconda

If the "chrony" package is not installed, this is a finding.

Fix Text

Configure RHEL 10 to have the "chrony" package installed with the following command:

$ sudo dnf -y install chrony