The Implications of Network Time Protocol (NTP) for… | BeyondTrust (2024)

Network Time Protocol (NTP) is a networking protocol used for clock synchronization of networked computing devices. While it is one of the oldest networking protocols—dating back to 1985—it remains a cornerstone of modern computing synchronization, and it is crucial for maintaining the proper operation and security of computing devices.

NTP is intended to synchronize all subscribing computers to within a few milliseconds of Coordinated Universal Time (UTC) by querying a master server for the current time and then resetting its own local clock to match. NTP utilizes specific algorithms to properly coordinate time between hosting time servers and adjust local time calibrations with variables like network latency.

NTP as a solution is most commonly a client-server model, but it can also be implemented using peer-to-peer (p2P) technology, and even broadcasting and multicasting, to ensure all computing devices are operating with the same time. If any devices are out of synchronization, then environments may not only run into operational challenges, but also introduce unnecessary cybersecurity risk.

Let’s consider the following example. An application generates a log file during normal operations. Within it, each event record has a time date stamp corresponding to the entry. If the asset is not time-synchronized with other resources in the environment, the deviations in log time entries could be a few seconds, hours, or even days. In worst-case scenarios, the year could even be incorrect, either because it was improperly set, or the system was unable to maintain the proper time when it was last fully powered off. This is similar to your stove or microwave losing power and the clock resetting after a power outage. What makes this problem even more troubling is drift. Modern computer clocks are not perfect—they will slowly deviate from the proper time by seconds, or even minutes, per month. If the system has been running for a long time without the clock being reset, the deviations can be compounded.

When multiple devices are in usage, without time synchronization, each resource will think the correct time is different. If you try to compare logs between resources, none of the timestamps line up. If the data is aggregated to a log server or security information event manager, the events will appear jumbled, and analytics and correlation engines will not be able to process the data for unusual behavior or indicators of compromise. This becomes a security nightmare and a formidable challenge for any cyber forensics investigations. Some savvy threat actors may even tamper with NTP, knowing that it will complicate forensic log analysis and make their actions and tracks harder to uncover amidst the data noise.

Good security starts with good timing. Good timing implies that all resources in an environment—from cameras to servers—all have the correct time. In order to set the correct time, the most common method is to use an NTP server—but not every device needs to be an NTP client. For example, in virtual environments, instances can sync their clocks with the hypervisor and then the hypervisor with an NTP server. The point is simple--all devices need to have the same time, and they must periodically reset their clocks such that all log, operational data, alerts, and runtime have the proper time.

While NTP is 34 years old, the foundation it provides should not be overlooked for fundamental cybersecurity hygiene.

How you can ensure your organization does not succumb to the hazards of mis-timing?

Validate that your resources are using a clock synchronization server and that it is secure and accurate. You can also use a solution, such as BeyondTrust Vulnerability Management, for verification of the proper NTP settings on workstations and servers.

If you’d like to learn more about how BeyondTrust can help you identify and remediate vulnerabilities (including those from misconfigurations and other system defects) across all platforms and devices, contact us today.

The Implications of Network Time Protocol (NTP) for… | BeyondTrust (1)

Morey J. Haber,Chief Security Advisor

Morey J. Haberis the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previously served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during his nearly 12-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board, assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the acquisition of eEye Digital Security, where he served as a Product Owner and Solutions Engineer, since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

The Implications of Network Time Protocol (NTP) for… | BeyondTrust (2024)
Top Articles
Average Utilization Definition: 113 Samples | Law Insider
The Psychology of Slogans: What They Are & How They Work
What Did Bimbo Airhead Reply When Asked
UPS Paketshop: Filialen & Standorte
Amc Near My Location
Craigslist Vans
Dollywood's Smoky Mountain Christmas - Pigeon Forge, TN
Crossed Eyes (Strabismus): Symptoms, Causes, and Diagnosis
Blairsville Online Yard Sale
Konkurrenz für Kioske: 7-Eleven will Minisupermärkte in Deutschland etablieren
Savage X Fenty Wiki
Jasmine Put A Ring On It Age
6th gen chevy camaro forumCamaro ZL1 Z28 SS LT Camaro forums, news, blog, reviews, wallpapers, pricing – Camaro5.com
2016 Ford Fusion Belt Diagram
Mineral Wells Independent School District
Colorado mayor, police respond to Trump's claims that Venezuelan gang is 'taking over'
What Happened To Anna Citron Lansky
Locate At&T Store Near Me
Niche Crime Rate
Wgu Academy Phone Number
Project, Time & Expense Tracking Software for Business
Www.publicsurplus.com Motor Pool
Craigslist Battle Ground Washington
Valic Eremit
Hctc Speed Test
Arrest Gif
Jesus Revolution Showtimes Near Regal Stonecrest
Speedstepper
Free T33N Leaks
2004 Honda Odyssey Firing Order
Frank Vascellaro
Korg Forums :: View topic
Robot or human?
Does Iherb Accept Ebt
Western Gold Gateway
Vanessa West Tripod Jeffrey Dahmer
Bimmerpost version for Porsche forum?
How To Get Soul Reaper Knife In Critical Legends
Wsbtv Fish And Game Report
NHL training camps open with Swayman's status with the Bruins among the many questions
Dr Adj Redist Cadv Prin Amex Charge
Anhedönia Last Name Origin
Gasoline Prices At Sam's Club
Promo Code Blackout Bingo 2023
Shell Gas Stations Prices
Rs3 Nature Spirit Quick Guide
4k Movie, Streaming, Blu-Ray Disc, and Home Theater Product Reviews & News
Matt Brickman Wikipedia
Suzanne Olsen Swift River
Affidea ExpressCare - Affidea Ireland
Ravenna Greataxe
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6331

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.