Skip to content

3.3.7 — Sync the Clocks

Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.

Every system clock in your CUI environment must synchronize to the same authoritative time source — typically a stratum 1 or stratum 2 NTP server. Servers, workstations, firewalls, switches, cloud services — all of them.

Three things the assessor checks:

  1. Time stamps are used for audit records. The internal system clocks are what generate the timestamps in your logs. If a system’s clock is wrong, every log entry from that system has a wrong timestamp.

  2. An authoritative time source is specified. You’ve documented which NTP server(s) your systems synchronize to. This can be a public NTP pool (time.windows.com, time.nist.gov), a domain controller acting as the NTP source, or an internal NTP server — but it must be documented and authoritative.

  3. Clocks are actually synchronized. NTP is configured and working. Drift is minimal (under 1 second is the standard). Systems synchronize on a regular frequency — not just at boot.

This sounds trivial, but it’s foundational for log correlation (3.3.5). If your firewall logs an event at 14:00 and your AD server logs a related event at 14:07, those two events won’t correlate properly. Seven minutes of drift means you can’t build a reliable timeline — and forensic investigators and courts both care about timestamp accuracy.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Do internal system clocks generate time stamps for audit records?Audit records show timestamps from the local system clock
2Is an authoritative time source specified?Documented NTP source: pool.ntp.org, time.windows.com, domain controller, or internal NTP server
3Are internal clocks compared and synchronized to the authoritative source?NTP configured on all systems, drift under 1 second, synchronization verified

Documents they’ll review: Audit and accountability policy; procedures addressing time stamp generation; system security plan; system configuration settings showing NTP configuration; documentation of the authoritative time source

People they’ll talk to: Information security personnel; system or network administrators; anyone responsible for NTP configuration

Live demos they’ll ask for: “Show me the NTP configuration on this server.” “Show me the time source your domain controller synchronizes to.” “Show me the current drift on this system.” “Are all systems pointing to the same source?”


These are the actual questions. Have answers ready.

  • “What is your authoritative time source? Show me the documentation.”
  • “Show me the NTP configuration on a CUI server.”
  • “What’s the current time drift on this system?”
  • “Do all systems — servers, workstations, network devices — synchronize to the same source?”
  • “How often do systems synchronize? Only at boot, or on a regular interval?”
  • “Are your timestamps in UTC or local time? How do you normalize across time zones in your SIEM?”

No NTP configured. Systems using their internal hardware clocks with no synchronization. Timestamps drift minutes or hours over weeks. Configure NTP on every system.

Different time sources. Some systems point to time.windows.com, others to pool.ntp.org, the firewall uses its own setting. While both are valid NTP sources, mixing them can introduce small inconsistencies. Standardize on one authoritative source — typically the domain controller for domain-joined systems and a documented NTP pool for non-domain devices.

Network devices forgotten. Windows systems synchronize via the domain, but firewalls, switches, and appliances are never configured for NTP. These devices generate critical boundary logs — their timestamps must be accurate too.

Time zone confusion. Logs from different systems in different time zones without UTC normalization. Your firewall logs in EST, your server logs in UTC, and your cloud logs in PST. Normalize everything to UTC in your SIEM.



RequirementWhy it matters here
3.3.1 — Log EverythingGenerates the audit records whose timestamps depend on synchronized clocks
3.3.5 — Connect the DotsCross-source log correlation fails without consistent timestamps
3.3.2 — Trace Every ActionTracing actions to users requires accurate “when” alongside “who”
3.4.2 — Harden EverythingNTP configuration is part of your security baseline for every system type

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: AU.L2-3.3.7 | SPRS Weight: 1 point | POA&M Eligible: Yes