Time Stamps
To meet the FedRAMP Moderate time stamps requirement (NIST SP 800-53 Rev 5 AU-8), you must generate audit-log time stamps from internal system clocks and define the time-stamp granularity you require (for example, to the second). Operationally, this means standardizing clock sources, synchronizing all in-scope systems, and proving through configuration evidence and log samples that time stamps are consistent, accurate, and complete. (NIST Special Publication 800-53 Revision 5)
Key takeaways:
- Define your required time-stamp granularity and apply it consistently across audit record sources. (NIST Special Publication 800-53 Revision 5)
- Configure systems to generate audit time stamps from internal clocks, backed by managed time synchronization. (NIST Special Publication 800-53 Revision 5)
- Retain evidence: time-sync configs, system settings, and representative log samples showing the required granularity. (NIST Special Publication 800-53 Revision 5)
“Time stamps” sounds simple until you try to correlate events across cloud services, endpoints, identity systems, and security tooling during an incident or an assessment. AU-8 exists because audit records without reliable, consistent time stamps lose investigative value: you can’t reconstruct sequences, prove when an admin action occurred, or correlate “who did what” across systems if clocks drift or logs record time differently.
For FedRAMP Moderate, AU-8 is a requirement to (1) use internal system clocks to generate time stamps for audit records and (2) ensure those time stamps meet organization-defined granularity. (NIST Special Publication 800-53 Revision 5) Your job, as a Compliance Officer, CCO, or GRC lead, is to translate that into a short list of decisions (granularity, time source, and standard fields), then drive consistent configuration across the boundary of your authorization, including third-party managed components where you still bear compliance responsibility.
This page gives requirement-level guidance you can execute: scoping, design choices, step-by-step implementation, evidence to retain, and the audit questions you should prepare for.
Regulatory text
Requirement (excerpt): “Use internal system clocks to generate time stamps for audit records and record time stamps that meet organization-defined granularity of time measurement.” (NIST Special Publication 800-53 Revision 5)
Operator interpretation:
You must (a) ensure each system that produces audit records uses its own internal clock to time-stamp events (not user-provided timestamps, not application-provided “event time” without a trusted clock), and (b) define the precision you require (granularity) and show that your logs meet it. (NIST Special Publication 800-53 Revision 5)
What auditors typically look for is not a philosophical discussion of time, but concrete proof: your defined granularity, your time synchronization approach, system configurations, and log samples demonstrating consistent timestamp format and precision.
Plain-English interpretation of the time stamps requirement
AU-8 is about log integrity and correlation:
- Every audit record needs a time stamp generated by the system clock for the system that produced the record. (NIST Special Publication 800-53 Revision 5)
- You must set an organizational standard for granularity (how precise the timestamp must be) and meet it consistently for in-scope audit logs. (NIST Special Publication 800-53 Revision 5)
Practical translation: decide what “good” looks like (precision, timezone handling, and formatting), configure all log-producing systems to match, and keep proof.
Who this applies to (entity and operational context)
Entity types in scope: Cloud Service Providers and Federal Agencies implementing FedRAMP Moderate controls. (NIST Special Publication 800-53 Revision 5)
Operational contexts where AU-8 shows up immediately:
- Centralized logging/SIEM ingestion across many sources
- Incident response timelines and root cause analysis
- Privileged access monitoring (admin actions must be sequenced correctly)
- Multi-region systems where local time settings can diverge
- Third party managed services (for example, managed databases, managed Kubernetes) where you still must document how timestamps are produced and collected within your boundary
If any component produces audit records used for security monitoring, investigations, or compliance reporting, treat it as in-scope unless you have a documented rationale that it is out of boundary.
What you actually need to do (step-by-step)
Step 1: Define your organizational granularity standard
Write down a decision that can be tested:
- Granularity requirement: define precision (examples: “to the second” or “to the millisecond”) and apply it to audit records. (NIST Special Publication 800-53 Revision 5)
- Time representation: choose UTC vs local time; pick one and enforce it. UTC is easier to correlate across systems.
- Timestamp format: select an unambiguous format for logs (for example, ISO-8601 with timezone offset). The requirement is granularity, but format is how you prevent ambiguity during investigations.
Artifact: “Audit Logging Standard” or “Logging & Monitoring Standard” section titled “Time Stamps (AU-8)” with the above decisions.
Step 2: Inventory audit record sources and their timestamp behavior
Create (or update) a log source inventory with fields that matter for AU-8:
- System / service name
- Where audit records are produced (host, service, platform)
- Current timestamp format and precision
- Current timezone behavior
- How clocks are set/synchronized
- Whether the source can be configured (and by whom)
Artifact: log source inventory spreadsheet or CMDB extract with AU-8 columns.
Step 3: Establish a managed time synchronization approach
AU-8 explicitly anchors time stamps to internal system clocks. (NIST Special Publication 800-53 Revision 5) That means you need a disciplined clock management approach, typically:
- Define approved time sources (for example, enterprise NTP servers).
- Configure all in-scope systems to sync to those sources.
- Restrict who can change time settings.
- Monitor for time drift or sync failures.
Even if a platform abstracts the OS, you still document how time is handled and what configuration you control (for example, instance-level NTP settings, container host settings, or platform guarantees). If a third party controls the underlying time configuration, document the dependency and capture their attestation or configuration statement as supporting evidence.
Artifacts: time sync configuration standards, system configuration evidence, and access control evidence for time-setting permissions.
Step 4: Configure each log-producing system to meet the standard
Do this per source type:
- Operating systems: confirm system clock sync is enabled and locked down; confirm audit subsystems log with the required precision.
- Applications: ensure application logs include timestamps with required precision and timezone; avoid relying on client-side timestamps.
- Identity and access systems: verify authentication/admin event logs include timestamps at the required granularity; confirm exports preserve precision.
- Security tools and SIEM pipeline: confirm ingestion does not truncate timestamps (common issue), and normalization preserves original event time plus ingestion time.
Test method: pull representative log samples from each source after changes. Check:
- time stamp exists on each record
- format is consistent
- granularity matches your standard
- timezone is explicit and consistent
- records can be correlated across sources without manual guesswork
Artifacts: screenshots/exports of configuration pages, config files, infrastructure-as-code snippets, and sample logs.
Step 5: Validate end-to-end correlation in your central logging workflow
AU-8 is satisfied per system clock generation and granularity, but auditors will still follow the trail to your central logs. Validate that your pipeline preserves fidelity:
- Source generates timestamp at required granularity
- Transport keeps it intact
- Parsers do not overwrite event timestamps
- SIEM stores original timestamp and (ideally) ingestion timestamp as separate fields
Artifact: a short “AU-8 validation record” with a table of sources tested, sample event IDs, and screenshots or exports.
Step 6: Operationalize with monitoring and change control
Sustaining AU-8 requires controls that survive routine changes:
- Add a build/deploy gate: new log sources must declare timestamp format and granularity before onboarding.
- Add drift/sync failure alerts to operations monitoring.
- Review time settings during baseline configuration reviews and after major platform updates.
If you use Daydream to manage control evidence, map each log source to its AU-8 evidence requests (config proof + sample logs) and set recurring tasks aligned to your change cadence.
Required evidence and artifacts to retain
Keep evidence that answers “what did you decide” and “can you prove it works.”
Minimum evidence set:
- Written standard defining required granularity for audit time stamps. (NIST Special Publication 800-53 Revision 5)
- Inventory of audit record sources with timestamp precision and timezone behavior.
- Time synchronization configuration evidence for in-scope systems (screenshots, config files, IaC).
- Role/permission evidence showing restricted ability to change system time (where applicable).
- Representative audit log samples from each major source category demonstrating required granularity. (NIST Special Publication 800-53 Revision 5)
- End-to-end ingestion proof that timestamps are not truncated/rewritten in the SIEM.
Common exam/audit questions and hangups
Expect direct, testable questions:
- “What is your defined granularity?” Auditors want a specific statement and evidence that logs meet it. (NIST Special Publication 800-53 Revision 5)
- “Show me that systems use internal clocks.” They may ask how you prevent user-controlled timestamps or client-provided times from being treated as authoritative. (NIST Special Publication 800-53 Revision 5)
- “How do you synchronize time across the environment?” They will look for consistent configuration and ownership.
- “Do all audit sources record in UTC?” If not, they will ask how you correlate across time zones.
- “Does your SIEM preserve original event time?” Many pipelines mutate timestamps; auditors often spot this via sampling.
Hangup to anticipate: teams confuse “log ingestion time” with “event time.” Keep both fields where possible and document which one is authoritative for investigations.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails AU-8 in practice | Avoid it by |
|---|---|---|
| Defining granularity but not enforcing it | Logs vary by source; correlation becomes inconsistent | Add granularity checks to log source onboarding and periodic sampling. (NIST Special Publication 800-53 Revision 5) |
| Mixing local time zones | Investigations require manual conversions and introduce errors | Standardize on UTC in logging standards and parsing rules. |
| SIEM parser truncates milliseconds | You “had” precision at the source but lost it centrally | Validate parsed fields against raw logs; store raw logs when feasible. |
| Relying on app-layer timestamps without clock governance | App timestamps still depend on clock correctness | Manage time sync at the system/platform level and document it. (NIST Special Publication 800-53 Revision 5) |
| No evidence trail | You can be compliant but fail the audit | Retain config exports and log samples per source category. |
Risk implications (why auditors care)
AU-8 ties directly to your ability to:
- reconstruct security incidents and administrative actions in sequence
- correlate identity, network, and application logs for investigations
- defend audit record integrity when timelines are disputed
If clocks drift or timestamps are inconsistent, you lose confidence in audit records. That typically escalates findings because it impacts multiple monitoring and incident response controls downstream.
Practical execution plan (30/60/90-day)
Use time-boxed phases as an execution scaffold; adjust to your environment size and change windows.
First 30 days (stabilize the standard)
- Publish your AU-8 decisions: granularity, UTC vs local, approved timestamp format. (NIST Special Publication 800-53 Revision 5)
- Build a log source inventory focused on timestamp precision and timezone handling.
- Identify the highest-risk systems first: identity, privileged access, admin consoles, and core production workloads.
Days 31–60 (implement and prove)
- Configure time synchronization for in-scope systems; document any third party managed constraints.
- Fix the top sources that don’t meet granularity or timezone requirements.
- Validate SIEM parsing and storage preserves event timestamps and granularity.
- Collect initial evidence pack: configs + log samples + validation notes.
Days 61–90 (operationalize)
- Add AU-8 checks to onboarding for new systems and services.
- Implement monitoring for time sync health and parser regressions.
- Build an audit-ready narrative: one pager that states the standard, lists in-scope sources, and points to evidence locations.
- In Daydream, assign control owners per source category and schedule recurring evidence refresh tied to change management.
Frequently Asked Questions
Do we have to use UTC to satisfy the time stamps requirement?
AU-8 requires defined granularity and use of internal system clocks, not a mandated timezone. (NIST Special Publication 800-53 Revision 5) Standardizing on UTC is a practical choice because it reduces correlation errors across systems.
What does “organization-defined granularity” mean in an audit?
It means you must write down your required precision (for example, seconds or milliseconds) and show logs meet it across in-scope sources. (NIST Special Publication 800-53 Revision 5) Auditors typically test this by sampling raw logs and SIEM-parsed fields.
If a managed cloud service controls the underlying OS clock, can we still comply?
Yes, if you document how the service generates timestamps from its internal clocks and you retain supporting evidence (service documentation, configuration screenshots you control, and log samples). AU-8 is still your responsibility within your authorization boundary. (NIST Special Publication 800-53 Revision 5)
Is ingestion time in the SIEM enough?
Usually no. AU-8 focuses on timestamps for audit records generated by the originating system clocks and meeting your defined granularity. (NIST Special Publication 800-53 Revision 5) Keep event time authoritative and preserve ingestion time as a separate field if you can.
How many log samples should we retain as evidence?
Keep enough samples to prove each major log source category meets your timestamp standard, plus at least one end-to-end example showing the SIEM preserved the timestamp. AU-8 does not set a numeric sampling requirement. (NIST Special Publication 800-53 Revision 5)
Where does Daydream fit for AU-8?
Daydream helps you track log sources as “evidence objects,” assign owners, and collect recurring proof (time sync configs, parsing rules, and log samples) so AU-8 doesn’t degrade after platform changes. The work still requires technical configuration, but Daydream keeps the evidence and accountability tight. (NIST Special Publication 800-53 Revision 5)
Frequently Asked Questions
Do we have to use UTC to satisfy the time stamps requirement?
AU-8 requires defined granularity and use of internal system clocks, not a mandated timezone. (NIST Special Publication 800-53 Revision 5) Standardizing on UTC is a practical choice because it reduces correlation errors across systems.
What does “organization-defined granularity” mean in an audit?
It means you must write down your required precision (for example, seconds or milliseconds) and show logs meet it across in-scope sources. (NIST Special Publication 800-53 Revision 5) Auditors typically test this by sampling raw logs and SIEM-parsed fields.
If a managed cloud service controls the underlying OS clock, can we still comply?
Yes, if you document how the service generates timestamps from its internal clocks and you retain supporting evidence (service documentation, configuration screenshots you control, and log samples). AU-8 is still your responsibility within your authorization boundary. (NIST Special Publication 800-53 Revision 5)
Is ingestion time in the SIEM enough?
Usually no. AU-8 focuses on timestamps for audit records generated by the originating system clocks and meeting your defined granularity. (NIST Special Publication 800-53 Revision 5) Keep event time authoritative and preserve ingestion time as a separate field if you can.
How many log samples should we retain as evidence?
Keep enough samples to prove each major log source category meets your timestamp standard, plus at least one end-to-end example showing the SIEM preserved the timestamp. AU-8 does not set a numeric sampling requirement. (NIST Special Publication 800-53 Revision 5)
Where does Daydream fit for AU-8?
Daydream helps you track log sources as “evidence objects,” assign owners, and collect recurring proof (time sync configs, parsing rules, and log samples) so AU-8 doesn’t degrade after platform changes. The work still requires technical configuration, but Daydream keeps the evidence and accountability tight. (NIST Special Publication 800-53 Revision 5)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream