v4.0 / v4.0.1 sub-requirements 10.6.1, 10.6.2, 10.6.3 — what your QSA actually checks
Requirement 10 of PCI-DSS v4.0 — "Log and monitor all access to system components and cardholder data" — applies to every system component in the cardholder data environment (CDE). Requirement 10.6 is the time-synchronization sub-set. It applies to:
The headline requirement reads:
The "support consistent time" wording matters: the QSA looks at outcomes, not at the technology. A CDE with all systems within ±50 ms of a verified external reference passes; a CDE running chrony but with one host at +180 s drift fails — even though "NTP is configured everywhere".
The implementation answer is virtually always NTP, plus Windows W32Time when configured as an NTP client (Type=NTP). The QSA expects:
chronyc tracking or w32tm /query /status shows a stratum less than 16 and a non-zero reach value;chronyc tracking, chronyc sources, timedatectl status. Windows: w32tm /query /status, w32tm /query /peers. ESXi: ntpq -p. A clean output is part of the evidence; a stale "Last Successful Sync Time" is not.
This sub-requirement is dense. Six checks for the QSA:
| # | Check | Evidence |
|---|---|---|
| 1 | Designated central time server(s) exist | Architecture diagram + DNS name/IP of the central server. |
| 2 | Only the designated server(s) receive external time | Firewall rule allowing UDP/123 egress only from the designated server's IP; chrony.conf on all other systems pointing internally. |
| 3 | External source is TAI/UTC-based | List of upstream NTP sources documented; all standard sources qualify (TAI/UTC is what NTP carries). |
| 4 | Only industry-accepted external sources | Approved-list document; typical: NIST, PTB, Cloudflare NTS, Netnod, INRIM, OP, or a GNSS Stratum 1 operated by a reputable infrastructure provider. |
| 5 | Multiple designated servers peer with each other | chrony.conf with peer directive (or pool members configured to peer); demonstrated by chronyc sources showing peer entries. |
| 6 | Internal systems only receive from designated | chrony.conf / w32tm config on a sample of internal hosts; each lists only the designated server(s), no public sources. |
The PCI SSC has not published an exhaustive list. The convention that QSAs apply in 2026:
pool.ntp.org as the direct source of the designated server (no authentication, no SLA, no audit trail); residential ISP routers; the AWS metadata IP 169.254.169.123 when no documentation links it to a TAI/UTC chain; servers whose operator cannot be identified.
This sub-requirement is short but bites in three places:
chrony.conf or ntp.conf owned by root, mode 0640 or stricter, located outside any world-readable share. On Windows, the W32Time registry keys protected by the default ACL plus group-policy enforcement.The shape most QSAs find immediately defensible:
┌─────────────────────────────────────────┐
│ External (industry-accepted sources) │
│ ─────────────────────────────────────── │
│ • NIST time.nist.gov (UDP 123) │
│ • Cloudflare NTS (UDP 4460 NTS) │
│ • Netnod NTS (UDP 4460 NTS) │
│ • GNSS Stratum 1 vendor (UDP 123) │
└─────────────────┬───────────────────────┘
│ UDP 123 / 4460 egress restricted
│ to designated servers only (FW rule)
▼
┌─────────────────────────────────────────┐
│ Designated central time servers │
│ ─────────────────────────────────────── │
│ ntp-cde-a.internal (chrony 4.x, NTS) │
│ ntp-cde-b.internal (chrony 4.x, NTS) │
│ ── peer with each other ── │
└─────────────────┬───────────────────────┘
│ Internal UDP 123 only
│ to ntp-cde-a/b
▼
┌─────────────────────────────────────────┐
│ In-scope CDE systems │
│ ─────────────────────────────────────── │
│ Payment apps · DBs · Firewalls · SIEM │
│ Jump hosts · Bastions · IDS · Auth │
└─────────────────────────────────────────┘
Two designated servers (10.6.2 requires multiple), peering with each other, fed only by industry-accepted external sources, with strict firewall containment between layers.
Assemble in pci-dss/req-10.6/ before the assessment:
chrony.conf of both designated servers, sanitized.chrony.conf / W32Time export from a representative sample of in-scope systems (databases, application servers, firewalls, jump hosts).chronyc tracking and chronyc sources on each designated server, dated within the assessment window.PCI-DSS v3.2.1 located the time-synchronization requirement at 10.4 with three sub-requirements. v4.0 renumbered it to 10.6 and tightened the wording:
| Aspect | v3.2.1 (10.4) | v4.0 (10.6) |
|---|---|---|
| Numbering | 10.4 / 10.4.1 / 10.4.2 / 10.4.3 | 10.6 / 10.6.1 / 10.6.2 / 10.6.3 |
| External source restriction | Implicit | Explicit: "industry-accepted external sources" |
| Peering | Implicit | Explicit: "time servers peer with one another" |
| Protection of settings | One sub-requirement | Two distinct angles: ACL + change management |
| Effective date | — | v4.0 mandatory 31 March 2025 |
If your v3.2.1 evidence pack is robust, the v4.0 transition is mostly a re-tagging exercise plus a documented "approved sources" list and the explicit peering check.
A 10.6-compliant evidence pack closes time-sync requirements across the major frameworks with no additional artefacts:
| Requirement | PCI-DSS v4.0 | ISO 27001:2022 | NIS 2 | DORA |
|---|---|---|---|---|
| Designated/approved source | Req. 10.6.1, 10.6.2 | A.8.17 | Art. 21(2)(c) | Art. 11 |
| Authenticated channel | Req. 10.6.2 (industry-accepted) | A.8.17 (implicit) | Art. 21(2)(e) | Art. 9(3) |
| Protected settings | Req. 10.6.3 | A.8.24 (key mgmt) | Art. 21(2)(h) | Art. 10 |
| Audit-trail retention | Req. 10.7 | A.8.15 | Art. 23 | Art. 12 |
Test each upstream source on your approved-sources list. The validator captures stratum, offset, refID and dual-stack reach — drop the output straight into the QSA evidence folder.
Run the Validator → Full Audit ChecklistDifferent angle? Use the right tool: