WithPCI Logo
WithPCI.com

10.6.2 Systems are configured to the correct and consistent time as follows

Original requirement from PCI DSS v4.0.1

This requirement specifies how systems should be configured to maintain correct and consistent time across the environment.

Defined Approach Requirements

10.6.2 Systems are configured to the correct and consistent time as follows:

  • One or more designated time servers are in use.
  • Only the designated central time server(s) receives time from external sources.
  • Time received from external sources is based on International Atomic Time or Coordinated Universal Time (UTC).
  • The designated time server(s) accept time updates only from specific industry-accepted external sources.
  • Where there is more than one designated time server, the time servers peer with one another to keep accurate time.
  • Internal systems receive time information only from designated central time server(s).

Defined Approach Testing Procedures

10.6.2 Examine system configuration settings for acquiring, distributing, and storing the correct time to verify the settings are configured in accordance with all elements specified in this requirement.

Customized Approach Objective

The time on all systems is accurate and consistent.

Purpose

Using reputable time servers is a critical component of the time synchronization process. Accepting time updates from specific, industry-accepted external sources helps prevent a malicious individual from changing time settings on systems.

Good Practice

Another option to prevent unauthorized use of internal time servers is to encrypt updates with a symmetric key and create access control lists that specify the IP addresses of client machines that will be provided with the time updates.

purpose

Alert personnel to suspicious log events.

compliance strategies

  • SIEM alerting
  • Incident notification workflows

typical policies

  • Log Alert Policy

common pitfalls

  • No alerting configured
  • Alerts ignored

type

Technical/Process Control

difficulty

Moderate

key risks

  • Unnoticed security incidents

recommendations

  • Automate alerting and escalation

Eligible SAQ

  • SAQ-A-EP
  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy