Mapping Article 21 to authenticated NTP infrastructure
Directive (EU) 2022/2555 — the NIS 2 Directive — entered into force on 16 January 2023 and Member States had until 17 October 2024 to transpose it. It applies to two categories of organisations:
In both categories, Article 21 imposes a risk-management obligation that — read in 2026 with ENISA technical guidance — effectively covers time-source authentication and integrity. Unauthenticated NTP cannot credibly support the audit-trail obligations that sit downstream of the directive.
Article 21(2) lists ten categories of measures that essential and important entities must implement. Three of them anchor the NTP obligation:
Article 23 mandates a strict incident-reporting cadence to the competent CSIRT:
| Deadline | Artefact | Time-sync dependency |
|---|---|---|
| 24 hours | Early warning | "Significant incident" detection relies on monitoring thresholds that are time-bucketed. |
| 72 hours | Incident notification with initial assessment | Log correlation across services to establish the perimeter. |
| 1 month | Final report | Forensic timeline — only admissible if timestamps are authenticated and monotonic. |
NTP is one of the oldest unauthenticated protocols still in active use. Documented attack classes that an essential entity must consider under Art. 21:
pool.ntp.org; mitigated by authenticated upstream sources.| # | Control | Evidence |
|---|---|---|
| 1 | At least 4 upstream time-sources | NTP configuration file with 4+ server lines; rationale document. |
| 2 | Sources in at least 2 distinct autonomous systems (AS) | Whois / routing-registry extracts linking IPs to operators. |
| 3 | At least one authenticated source (NTS or symmetric key) | Running config + key-management procedure. |
| 4 | Stratum hierarchy documented | Architecture diagram: Stratum 1 → internal Stratum 2 → clients. |
| 5 | Monitoring of offset, jitter, reach | 90-day metrics dashboard (Prometheus/Grafana, Zabbix, Datadog). |
| 6 | Alerting on stratum ≥ 16 and false-ticker | Alert rule export + past alert history. |
| 7 | Incident-response playbook for time-source failure | Documented IR runbook with RACI and escalation path. |
| 8 | 13-month log retention | Log-management policy; retention aligned with Art. 23 final-report statute. |
| 9 | Change-management record for NTP config | Ticketing trail for every ntp.conf / chrony.conf change. |
| 10 | Periodic audit against this checklist | Annual internal audit report signed by the CISO or DPO. |
Article 21(1) requires measures to be proportionate to the risk. In 2026, NTS (Network Time Security, RFC 8915) is the only standardised, production-ready authentication layer for NTP:
chrony 4.x or ntpsec. Deployment effort is typically one day for a small infrastructure; the proportionality argument is trivial to make.
Public NTS-capable sources include Cloudflare, Netnod, NIST, and RDEM's NTS service. For internal hierarchies, chrony 4.x acts as both NTS client and NTS server — a single binary covers both roles.
Assemble these artefacts in a single folder before the audit:
ntp.conf / chrony.conf from each stratum level.Use our NTP Audit Checklist for CISOs to structure the review, and this Compliance Validator to produce machine-readable evidence on demand.
| Requirement | NIS 2 | ISO 27001:2022 | DORA | PCI-DSS v4.0 |
|---|---|---|---|---|
| Synchronised clocks | Art. 21(2)(c) | A.8.17 | Art. 11 | Req. 10.6 |
| Authenticated source | Art. 21(2)(e) | A.8.17 (implicit) | Art. 9(3) | Req. 10.6.2 |
| Monitoring & alerting | Art. 21(2)(g) | A.8.16 | Art. 10 | Req. 10.4 |
| Audit-trail retention | Art. 23 | A.8.15 | Art. 12 | Req. 10.7 |
| Supply-chain diversification | Art. 21(2)(d)(e) | A.5.19, A.5.21 | Art. 28 | Req. 12.8 |
A single evidence pack that satisfies the NIS 2 checklist above will typically close the time-sync portion of all four frameworks simultaneously.
Use the compliance validator to generate a NIS 2-aligned NTP report for your infrastructure — public and RFC 1918 servers supported.
Run the Compliance Validator → Full Audit ChecklistNot here for NIS 2 compliance? Use the right tool for your use-case: