EN FR Home

NIS 2 NTP Requirements:
Time-Sync for Essential & Important Entities

Mapping Article 21 to authenticated NTP infrastructure

Published 20 April 2026 · By Richard DEMONGEOT, RDEM Systems · Target audience: CISOs, DPOs and auditors of essential and important entities under Directive (EU) 2022/2555.

1. Who is concerned — essential vs important entities

Directive (EU) 2022/2555 — the NIS 2 Directive — entered into force on 16 January 2023 and Member States had until 17 October 2024 to transpose it. It applies to two categories of organisations:

In both categories, Article 21 imposes a risk-management obligation that — read in 2026 with ENISA technical guidance — effectively covers time-source authentication and integrity. Unauthenticated NTP cannot credibly support the audit-trail obligations that sit downstream of the directive.

2. Article 21 and time-sync: the implicit obligation

Article 21(2) lists ten categories of measures that essential and important entities must implement. Three of them anchor the NTP obligation:

Art. 21(2)(c) — Business continuity and crisis management. Incident timelines, log correlation across systems, and post-incident analysis all require a common time-reference. An untrusted time-source makes business-continuity evidence non-defensible.
Art. 21(2)(e) — Supply-chain security. Depending on a single public NTP pool without authentication is a supply-chain risk: pool operators can be compromised, BGP-hijacked, or withdrawn. ENISA guidance explicitly calls for diversified, authenticated upstream time sources.
Art. 21(2)(f) — Security in acquisition, development and maintenance of systems. Vulnerability handling and patch windows are timestamped. If time can be manipulated, so can the window of apparent vulnerability exposure.

3. Article 23 incident-reporting deadlines depend on reliable time

Article 23 mandates a strict incident-reporting cadence to the competent CSIRT:

DeadlineArtefactTime-sync dependency
24 hoursEarly warning"Significant incident" detection relies on monitoring thresholds that are time-bucketed.
72 hoursIncident notification with initial assessmentLog correlation across services to establish the perimeter.
1 monthFinal reportForensic timeline — only admissible if timestamps are authenticated and monotonic.
Practical consequence. Miss any of these deadlines and the entity exposes itself to administrative fines up to EUR 10 million or 2% of global annual turnover (Art. 34). Reliable, authenticated NTP is no longer optional hygiene — it is a direct prerequisite of Article 23 compliance.

4. Threats against unauthenticated NTP

NTP is one of the oldest unauthenticated protocols still in active use. Documented attack classes that an essential entity must consider under Art. 21:

5. NIS 2 NTP checklist — 10 controls

#ControlEvidence
1At least 4 upstream time-sourcesNTP configuration file with 4+ server lines; rationale document.
2Sources in at least 2 distinct autonomous systems (AS)Whois / routing-registry extracts linking IPs to operators.
3At least one authenticated source (NTS or symmetric key)Running config + key-management procedure.
4Stratum hierarchy documentedArchitecture diagram: Stratum 1 → internal Stratum 2 → clients.
5Monitoring of offset, jitter, reach90-day metrics dashboard (Prometheus/Grafana, Zabbix, Datadog).
6Alerting on stratum ≥ 16 and false-tickerAlert rule export + past alert history.
7Incident-response playbook for time-source failureDocumented IR runbook with RACI and escalation path.
813-month log retentionLog-management policy; retention aligned with Art. 23 final-report statute.
9Change-management record for NTP configTicketing trail for every ntp.conf / chrony.conf change.
10Periodic audit against this checklistAnnual internal audit report signed by the CISO or DPO.

6. Why NTS (RFC 8915) is the proportionate answer

Article 21(1) requires measures to be proportionate to the risk. In 2026, NTS (Network Time Security, RFC 8915) is the only standardised, production-ready authentication layer for NTP:

NTS benefits aligned with NIS 2. Cryptographic authentication of every time-packet (AEAD), no replay, no MITM time-shift, zero-config for clients that already use chrony 4.x or ntpsec. Deployment effort is typically one day for a small infrastructure; the proportionality argument is trivial to make.

Public NTS-capable sources include Cloudflare, Netnod, NIST, and RDEM's NTS service. For internal hierarchies, chrony 4.x acts as both NTS client and NTS server — a single binary covers both roles.

7. Evidence pack for the auditor

Assemble these artefacts in a single folder before the audit:

  1. Architecture diagram (PDF or draw.io export).
  2. ntp.conf / chrony.conf from each stratum level.
  3. 90-day export of offset / jitter / reach per client.
  4. Alerting rule file and past-incident tickets.
  5. Key-management procedure (who rotates NTS certs, when, how).
  6. Log-retention policy and actual log sample (13 months back).
  7. Change-log for NTP configuration files.
  8. Signed annual review of the 10-control checklist above.

Use our NTP Audit Checklist for CISOs to structure the review, and this Compliance Validator to produce machine-readable evidence on demand.

8. Cross-mapping: NIS 2, ISO 27001, DORA, PCI-DSS

RequirementNIS 2ISO 27001:2022DORAPCI-DSS v4.0
Synchronised clocksArt. 21(2)(c)A.8.17Art. 11Req. 10.6
Authenticated sourceArt. 21(2)(e)A.8.17 (implicit)Art. 9(3)Req. 10.6.2
Monitoring & alertingArt. 21(2)(g)A.8.16Art. 10Req. 10.4
Audit-trail retentionArt. 23A.8.15Art. 12Req. 10.7
Supply-chain diversificationArt. 21(2)(d)(e)A.5.19, A.5.21Art. 28Req. 12.8

A single evidence pack that satisfies the NIS 2 checklist above will typically close the time-sync portion of all four frameworks simultaneously.

Ready to produce audit evidence?

Use the compliance validator to generate a NIS 2-aligned NTP report for your infrastructure — public and RFC 1918 servers supported.

Run the Compliance Validator → Full Audit Checklist

Not here for NIS 2 compliance? Use the right tool for your use-case: