100% found this document useful (1 vote)
166 views

Clock Synchronization Procedure

This document outlines Chinook's Edge School Division's clock synchronization procedure to ensure accurate timestamps across systems. It states that all devices that create logs, record digital information, rely on time synchronization or use time activation must have their clocks synchronized with at least two accurate time sources. The procedure details synchronizing public key servers, internal system clocks, and checking systems twice yearly. It also defines governance roles for the procedure.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
166 views

Clock Synchronization Procedure

This document outlines Chinook's Edge School Division's clock synchronization procedure to ensure accurate timestamps across systems. It states that all devices that create logs, record digital information, rely on time synchronization or use time activation must have their clocks synchronized with at least two accurate time sources. The procedure details synchronizing public key servers, internal system clocks, and checking systems twice yearly. It also defines governance roles for the procedure.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Chinook’s Edge School Division No.

73
ISMS Procedures and Controls

Clock Synchronization Procedure


Relevant ISO
Reference No. Revision No.
Control No.
xx 1
10.10.6

Issue Date: June 19, 2013

Revision Date: June 19, 2013

Approved by: Ted Harvey


Title: Director, Technology Services

Version History

Version # Version Date Author Summary of Changes

1.0 Jan 22 2012 Ted Harvey

Approvals

Name Title Date of Approval Version #

Ray Hoppins

Distribution

Name Title Date of Issue Version No.

Document Control

Document Title Server Malware Protection

Document Location http://xxx.chinooksedge.ab.ca/

Clock Synchronization Procedure Page | 1


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

Clock Synchronization Procedure Page | 2


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

Table of Contents

1.0 Overview...............................................................................................................................4
2.0 Purpose .................................................................................................................................4
3.0 Scope ....................................................................................................................................5
4.0 Risks ......................................................................................................................................6
The risks associated with the Procedure subject.................................... Error! Bookmark not defined.
5.0 Procedure Detail ...................................................................................................................7
Detailed Procedure statements ............................................................. Error! Bookmark not defined.
More Content ..................................................................................................Error! Bookmark not defined.
Procedure Detail Sub Heading ....................................................................Error! Bookmark not defined.
More Content ..................................................................................................Error! Bookmark not defined.

6.0 Enforcement .........................................................................................................................8


If any member of IT staff is found to have breached this Procedure, they may be subject to
disciplinary action. ................................................................................. Error! Bookmark not defined.
If any user is found to have breached this security Procedure, they may be subject to disciplinary action.
........................................................................................................................Error! Bookmark not defined.
Any violation of the Procedure by a temporary worker, contractor or supplier may result in the
termination of their contract or assignment................................................Error! Bookmark not defined.

7.0 Procedure Governance..........................................................................................................9


8.0 Definitions ..........................................................................................................................11
Detail any necessary definitions ............................................................ Error! Bookmark not defined.
More Content ..................................................................................................Error! Bookmark not defined.

9.0 References ..........................................................................................................................12


List any reference material used ............................................................ Error! Bookmark not defined.
More Content ..................................................................................................Error! Bookmark not defined.

Clock Synchronization Procedure Page | 3


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

1.0 Overview
The clocks of all relevant processing systems within the division shall be
synchronized with an agreed accurate time source(s).

2.0 Purpose

N e t w o r k a u t h e n t i c a t i o n p r o t o c o l s ,
t e l e p h o n e s y s t e m s a n d a c t i v i t y a u d i t s
r e l y o n a c c u r a t e ti m e t o c o r r e l a t e
s e c u r i t y e v e n t s a n d l o g s a c r o s s
s y s t e m s .

A l l s y s t e m c l o c k s s h o u l d b e
a u t o m a t i c a ll y s y n c h r o n i z e d w i t h a n
a c c u r a t e ti m e s o u r c e . D e t e r m i n i n g t h e
ti m e e v e n t s t o o k p l a c e i s o f p a r a m o u n t
i m p o r t a n c e f o r t h e p r o p e r l o g g i n g o f
a u d i t t r a il s , i n c i d e n t h a n d l i n g , s c h o o l
b e l l s , v i d e o s u r v e i ll a n c e , e t c .

Clock Synchronization Procedure Page | 4


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

3.0 Scope

This procedure encompasses any device that:

1. Creates activity, incident or authentications logs.

2. Timestamps digital records, e.g. records management software, email, video


recordings.

3. Relies on time synchronization.

4. Uses time activation to initiate tasks, programs, etc.

This includes, but is not limited to, printers, photocopiers, computers, switches and
Servers.

Clock Synchronization Procedure Page | 5


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

4.0 Risks

Inaccurate timestamps may reduce the originations ability to perform accurate


auditing of incidents.

Systems may initiate actions at the wrong time creating undesirable effects.

The Integrity and/or Availability of data may be reduced.

Clock Synchronization Procedure Page | 6


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

5.0 Procedure Detail

1. The Division should include at least two synchronized time sources to retrieve
time from on a regular basis, so time stamps are consistent,

2. Public Key and certification servers will use the division time ources to ensure
Certification Authority uses accurate time stamps.

3. Internal clocks on systems should also be synchronized to match the operating


system time.

4. Ensure that each system’s clock is synched to a common time source, so that
the timestamps will match those of other systems.

Clock Synchronization Procedure Page | 7


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

6.0 Enforcement

Systems will be routinely checked by the Data owner at leat twice and
year and confirmation logged in the site level documentation.

Clock Synchronization Procedure Page | 8


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

7.0 Procedure Governance

The following table identifies who within CESD is Accountable,


Responsible, Informed or Consulted with regards to this Procedure.
The following definitions apply:
• Responsible – the person(s) responsible for developing and
implementing the Procedure.

• Accountable – the person who has ultimate accountability and


authority for the Procedure.

• Consulted – the person(s) or groups to be consulted prior to final


Procedure implementation or 
 amendment.

• Informed – the person(s) or groups to be informed after Procedure


implementation or 
 amendment.

Responsible Core Team - Technology Services

Accountable Director Technology Services

Consulted Technology Committee,

All Technology Department Employees, All


Informed
Contractors.

Clock Synchronization Procedure Page | 9


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

Clock Synchronization Procedure Page | 10


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

8.0 Definitions
TERM DEFINITION

Clock Synchronization Procedure Page | 11


Chinook’s Edge School Division No. 73
ISMS Procedures and Controls

9.0 References

10.10.6, ISO/IEC 27002 Code of practice for information security management,


2005

Kaon Security – ISO 27002:2007 Audit Standard


http://www.kaonsecurity.co.nz/TFCC_demo/NZS27002.html

Unified Compliance (2005-12). Synchronize clocks to an accurate and universal time


source. UCF ID 01340
http://www.unifiedcompliance.com/matrices/live/01340.html

Clock Synchronization Procedure Page | 12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy