Time updates should be received from which sources, and what protections might be applied?

Prepare for the PCI DSS Test with detailed questions and explanations. Use flashcards and quizzes to enhance knowledge. Ensure you're ready for your certification exam!

Multiple Choice

Time updates should be received from which sources, and what protections might be applied?

Explanation:
Time updates must come from trusted, designated external sources that you control, typically industry-accepted time servers you configure for your environment. This ensures the timestamps across systems are consistent and trustworthy, which is critical for accurate logs, auditing, and incident response. Protecting the time data in transit helps prevent tampering or interception, hence encryption with a symmetric key may be used. Restricting who receives the updates with ACLs limits exposure and reduces the risk that an unauthorized device could receive or trust a manipulated time source. Using anything other than designated, trusted sources (or sources that aren’t industry-accepted) opens the door to incorrect or spoofed time data, compromising log integrity and security monitoring.

Time updates must come from trusted, designated external sources that you control, typically industry-accepted time servers you configure for your environment. This ensures the timestamps across systems are consistent and trustworthy, which is critical for accurate logs, auditing, and incident response. Protecting the time data in transit helps prevent tampering or interception, hence encryption with a symmetric key may be used. Restricting who receives the updates with ACLs limits exposure and reduces the risk that an unauthorized device could receive or trust a manipulated time source. Using anything other than designated, trusted sources (or sources that aren’t industry-accepted) opens the door to incorrect or spoofed time data, compromising log integrity and security monitoring.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy