6.1: Utilize Three Synchronized Time Sources
Threats Addressed:
Next Version:
- Critical Security Controls Version 8:
- 8.4: Standardize Time Synchronization
Control Statement
Use at least three synchronized time sources from which all servers and network devices retrieve time information on a regular basis so that timestamps in logs are consistent.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]