STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Network Device Management Security Requirements Guide

V-202112

CAT II (Medium)

The network device must authenticate Network Time Protocol sources using authentication that is cryptographically based.

Rule ID

SV-202112r961506_rule

STIG

Network Device Management Security Requirements Guide

Version

V5R4

CCIs

CCI-001967

Discussion

If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source.

Check Content

Review the network device configuration to determine if the network device authenticates NTP endpoints before establishing a local, remote, or network connection using authentication that is cryptographically based.

If the network device does not authenticate Network Time Protocol sources using authentication that is cryptographically based, this is a finding.

Fix Text

Configure the network device to authenticate Network Time Protocol sources using authentication that is cryptographically based.