Skip to main content
NetStable
Level 2 AU.L2-3.3.7

Provide a system capability that compares and synchronizes internal system clocks

📖 What This Means

This practice ensures that all systems within your network have synchronized clocks, meaning they all show the same accurate time. This is crucial because accurate timestamps on logs and events are necessary for investigating security incidents and ensuring accountability. Without synchronized clocks, it becomes difficult to correlate events across different systems, making it harder to detect and respond to threats. For example, if one system logs an event at 10:00 AM and another logs a related event at 10:05 AM, but their clocks are out of sync, it could appear as if the events occurred at completely different times. This practice helps prevent such confusion.

🎯 Why It Matters

Unsynchronized clocks can lead to inaccurate log data, making it difficult to trace security incidents back to their source. This can delay incident response and compromise forensic investigations. For instance, in the 2017 Equifax breach, inconsistent timestamps across logs complicated the investigation, delaying the identification of the attack vector. The DoD emphasizes this control because accurate time synchronization is essential for effective audit logging, which is a cornerstone of cybersecurity defense. Without it, organizations risk misaligning events, leading to incomplete or incorrect security analyses. This can result in prolonged system downtime, increased recovery costs, and damage to reputation.

How to Implement

  1. Identify all cloud instances and services that require time synchronization.
  2. Configure Network Time Protocol (NTP) settings in your cloud provider's management console (e.g., AWS Systems Manager, Azure Virtual Machines, GCP Compute Engine).
  3. Set up a centralized NTP server or use a trusted external NTP source (e.g., time.google.com).
  4. Ensure all virtual machines and containers are configured to sync with the NTP server.
  5. Monitor and validate synchronization using cloud-native monitoring tools (e.g., AWS CloudWatch, Azure Monitor).
  6. Document the configuration and include it in your security policies.
  7. Regularly test synchronization accuracy using tools like 'ntpq' or 'chronyc'.
⏱️
Estimated Effort
For cloud environments: 4-6 hours (Intermediate). For on-premise: 6-8 hours (Intermediate). Hybrid environments may require additional testing and documentation.

📋 Evidence Examples

NTP Configuration Documentation

Format: PDF/Word
Frequency: Updated annually or when changes occur.
Contents: Detailed NTP server settings, synchronization intervals, and trusted sources.
Collection: Export from system configuration files or management consoles.

Synchronization Test Results

Format: Excel/CSV
Frequency: Quarterly.
Contents: Timestamp comparisons between systems.
Collection: Run synchronization tests and log results.

Screenshot of NTP Settings

Format: PNG/JPG
Frequency: Updated when changes occur.
Contents: NTP configuration screen from a sample system.
Collection: Capture from system settings.

Monitoring Logs

Format: Log File
Frequency: Ongoing.
Contents: Logs showing successful synchronization.
Collection: Export from monitoring tools.

Policy Document

Format: PDF/Word
Frequency: Updated annually.
Contents: Policy outlining time synchronization requirements.
Collection: Draft and review with IT team.

📝 SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For AU.L2-3.3.7 ("Provide a system capability that compares and synchronizes internal system clocks"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your audit logging infrastructure, including which events are logged, the SIEM/log management platform, retention periods, log protection mechanisms, and review processes. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"AU.L2-3.3.7 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to provide a system capability that compares and synchronizes internal system clock.... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"AU.L2-3.3.7 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to provide a system capability that compares and synchronizes internal system clock.... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"AU.L2-3.3.7 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • Identify all systems generating audit logs within the CUI boundary
  • Document log flow from sources to centralized SIEM
  • Specify log storage locations and retention tiers
  • Ensure this control covers all systems within your defined CUI boundary where provide a system capability that compares and synchronizes internal system clocks applies
  • Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • 📄 Audit and Accountability Policy
  • 📄 SIEM architecture documentation
  • 📄 Log retention configuration
  • 📄 Evidence artifacts specific to AU.L2-3.3.7
  • 📄 POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify that required events are logged, check log completeness (all required fields present), test log protection mechanisms, and review evidence of regular log reviews.

💬 Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do all systems in your network have synchronized clocks?

✅ YES → Proceed to Q2.
❌ NO → GAP: Configure NTP settings on all systems. Timeline: 1 week.
Remediation:
Set up NTP servers and configure devices to sync.

Question 2: Is there a documented policy for time synchronization?

✅ YES → Proceed to Q3.
❌ NO → GAP: Draft and implement a policy. Timeline: 2 weeks.
Remediation:
Include NTP configuration and testing procedures.

Question 3: Are synchronization tests conducted regularly?

✅ YES → Proceed to Q4.
❌ NO → GAP: Schedule quarterly tests. Timeline: 1 month.
Remediation:
Use tools like 'ntpq' or 'chronyc' for testing.

Question 4: Are synchronization logs reviewed and maintained?

✅ YES → Proceed to Q5.
❌ NO → GAP: Implement log review procedures. Timeline: 2 weeks.
Remediation:
Export and archive logs from monitoring tools.

Question 5: Is synchronization accuracy monitored for drift?

✅ YES → Compliant.
❌ NO → GAP: Set up monitoring alerts. Timeline: 1 week.
Remediation:
Use tools like Nagios or cloud-native monitors.

⚠️ Common Mistakes (What Auditors Flag)

1. Using untrusted NTP sources.

Why this happens: Lack of awareness about secure NTP options.
How to avoid: Use trusted sources like time.google.com or internal servers.

2. Not documenting NTP configurations.

Why this happens: Overlooking policy requirements.
How to avoid: Include NTP settings in IT policies and update regularly.

3. Failing to test synchronization regularly.

Why this happens: Lack of scheduled procedures.
How to avoid: Set up quarterly tests and log results.

4. Ignoring synchronization drift.

Why this happens: Inadequate monitoring.
How to avoid: Use monitoring tools to detect and correct drift.

5. Not including all devices in synchronization.

Why this happens: Incomplete inventory.
How to avoid: Maintain an updated list of all devices and configure them.

📚 Parent Policy

This practice is governed by the Audit and Accountability Policy

View AU Policy →

📚 Related Controls