Clock synchronization
Plain English Translation
Clock synchronization ensures that all servers, endpoints, and network devices across an organization's IT infrastructure report the exact same time. By aligning internal clocks to an approved, highly accurate external time source via the Network Time Protocol (NTP), organizations ensure that system logs and audit trails are chronologically accurate. This exact alignment is critical for investigating security incidents, reconstructing attack timelines, and ensuring digital evidence holds up under forensic scrutiny.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Ensure default OS-level clock synchronization (e.g., Windows Time service, systemd-timesyncd) is enabled and pointing to reliable public NTP pools.
- Rely on managed cloud provider hypervisor time synchronization for basic instances.
Required Actions (scaleup)
- Deploy internal NTP servers that sync to external trusted sources, ensuring all internal hosts sync to the internal servers to reduce external dependencies.
- Implement monitoring and alerting for clock drift exceeding acceptable thresholds (e.g., > 100ms).
Required Actions (enterprise)
- Implement authenticated NTP (NTS) to cryptographically prevent time spoofing attacks.
- Deploy Precision Time Protocol (PTP) for specific systems or environments requiring microsecond-level accuracy, such as high-frequency trading.
ISO 27001:2022 Annex A control A.8.17 is a technological control requiring that the clocks of all information processing systems be synchronized to an approved time source. This ISO 27001 clock synchronization mandate ensures accurate timekeeping across the organization for logging, auditing, and incident response purposes.
Clock synchronization is vital because forensic investigations rely heavily on correlating events across multiple systems. If clocks drift, reconstructing the exact sequence of a security breach becomes impossible, compromising audit log integrity and potentially rendering the logs legally inadmissible.
To meet ISO 27001 A.8.17 clock synchronization requirements, organizations should configure their infrastructure to point to a centralized Network Time Protocol (NTP) server. For example, knowing how to configure NTP on Windows Server for compliance involves using Group Policy Objects (GPO), while Linux administrators should understand how to configure chrony NTP on Linux servers to pull from a trusted pool.
An approved trusted time source for NTP usually includes stratum 1 or stratum 2 servers directly linked to atomic clocks or GPS satellites. Common examples include government-provided time servers (like NIST in the US or NPL in the UK), large academic NTP pools, or the highly reliable default time services provided by major cloud platforms.
Systems should synchronize continuously or at very frequent, planned intervals to prevent measurable clock drift. Modern NTP clients typically run as persistent background daemons that frequently poll the NTP server configuration, making small, gradual adjustments (slewing) to keep the system clock perfectly aligned.
The best practices to monitor time drift across servers involve integrating NTP metrics into your centralized performance monitoring tools. Setting an alert threshold for drifts larger than a specific tolerance (such as a few milliseconds) ensures operations teams are proactively notified before the desynchronization negatively impacts log correlation.
To understand how to secure NTP against spoofing and tampering, organizations should limit NTP traffic using firewalls and implement Network Time Security (NTS) or symmetric key authentication. Comparing authenticated NTP (NTS) vs standard NTP security reveals that NTS provides cryptographic guarantees that the time data has not been maliciously altered by an attacker in transit.
For ISO 27001 clock synchronisation evidence for audit, auditors typically expect to see screenshots of NTP configurations from a sample of servers, firewalls, and network devices. They will also look for a documented policy defining the approved time sources and evidence that clock drift monitoring and alerting are active.
Understanding how to sync time in AWS Azure GCP for audit logs is straightforward, as these providers offer highly accurate, fully managed local time synchronization services such as the Amazon Time Sync Service. Organizations simply need to ensure their cloud compute instances are configured to use these native hypervisor time sources rather than routing out to the public internet.
When examining PTP vs NTP time synchronization differences, NTP provides millisecond-level accuracy suitable for general IT infrastructure and standard compliance. Precision Time Protocol (PTP) offers microsecond or nanosecond accuracy over local networks and should be used in specialized environments like high-frequency financial trading or telecommunications where extreme precision is necessary.
A common challenge is proving, at audit time, that clock sync settings are consistently applied and monitored across many systems. Tools like WatchDog Security's Compliance Center can help organize SOPs, screenshots/config exports, and recurring attestations into an evidence set and highlight gaps where proof of synchronization or monitoring is missing.
As environments grow, teams often lose visibility into which assets and environments are included in time-sync standards and drift monitoring. WatchDog Security's Asset Inventory can help maintain an up-to-date system list (including cloud and SaaS context) so teams can scope clock synchronization checks, sampling, and evidence collection to the right systems.
"The clocks of information processing systems used by the organization shall be synchronized to approved time sources."
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-17 | WatchDog Security GRC Team | Initial publication |