6.1: Utilize Three Synchronized Time Sources

Threats Addressed:

Group:

Next Version:

Control Statement

Use at least three synchronized time sources from which all servers and network devices retrieve time information on a regular basis so that timestamps in logs are consistent.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]