Skip to main content

Synchronize system clocks

Summary

Critical systems must have synchronized clocks whose configuration is protected and comes from industry-accepted sources.

Description

Systems must properly record exceptional and security events in protected logs. This allows administrators to find bugs and makes it easier for forensics teams to determine how a system was compromised. However, if clocks are not properly synchronized, it can be very difficult to compare log files from different systems in order to establish the event sequence that led to the security incident.

Supported In

This requirement is verified in following services

PlanSupported
Machine🔴
Squad🟢

References

Vulnerabilities

free trial

Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.