UBTU-16-030100 - The Ubuntu operating system must compare internal information system clocks at least every 24 hours with a server which is synchronized to an authoritative time source, such as the United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS) - chrony service

Information

Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Sources outside the configured acceptable allowance (drift) may be inaccurate.

Synchronizing internal information system clocks provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network.

Organizations should consider endpoints that may not have regular access to the authoritative time server (e.g., mobile, teleworking, and tactical endpoints).

Solution

Note: If the system is not networked this item is Not Applicable.

To configure the system clock to compare the system clock at least every 24 hours to the authoritative time source, edit the '/etc/chrony/chrony.conf' file.

Add or correct the following lines, by replacing '[source]' in the following line with an authoritative DoD time source:

server [source] iburst maxpoll 17

If the 'chrony' service was running and the value of 'maxpoll' or 'server' was updated, then the service must be restarted using the following command:

# sudo systemctl restart chrony.service

If the 'chrony' service was not running then it must be started:

# sudo systemctl start chrony.service

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_16-04_LTS_V2R3_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-8(1)(a), CAT|II, CCI|CCI-001891, Rule-ID|SV-215116r610931_rule, STIG-ID|UBTU-16-030100, STIG-Legacy|SV-90493, STIG-Legacy|V-75813, Vuln-ID|V-215116

Plugin: Unix

Control ID: c4bbab660181f2dd6806b1e1d5753f63caf0790bab2c64eafc4aff706c76af80