Back to Resources
Field Note Apr 2026 6 min read

Time Synchronization: The Security Topic Nobody Talks About

Accurate time is foundational to OT security. Without it, forensics become impossible, compliance audits fail, and security controls malfunction.

C

Cascadia OT Security

Compliance Readiness

PLC-01HMIRTU-02DMZHISTSCADACORPZONE TOPOLOGYTRAFFIC FLOW →

Time synchronization is the unglamorous foundation of OT security. Every log message, every firewall rule timestamp, every forensic investigation depends on accurate time. Yet most manufacturing facilities have production networks running with clock skew of hours or days. We have seen incidents where conflicting timestamps across devices made sequence-of-event reconstruction impossible, turning a measurable breach into an unquantifiable loss.

Time synchronization is both critical infrastructure and attack surface. An attacker who can control system time can disable security controls, forge log entries, and cover their tracks. A proper OT time architecture requires attention to both availability and authenticity of time sources.

Requirement for Compliance and Forensics

NERC CIP, ISA-62443, and most manufacturing compliance frameworks explicitly require synchronized time across all security-relevant devices, typically within 5 seconds. Forensic analysis of industrial incidents depends on accurate timestamps to reconstruct what happened and when. If logs on your PLC show action X at 10:02:15 UTC but your firewall shows a connection at 10:02:45, you cannot definitively prove causation.

More critically, certificate-based authentication, logging retention policies, and security rules that reference time windows all depend on synchronized clocks. A system with incorrect time will reject valid certificates, age out logs prematurely, or fail to enforce time-based access controls.

OT Time Architecture

Common Misconfigurations

Many industrial networks pull time from internet NTP pools (pool.ntp.org), trusting the public internet for time accuracy. This is fine for rough synchronization, but unacceptable for security-critical systems. Internet NTP is unauthenticated and can be manipulated by anyone on the path between your network and the NTP pool.

Worse, some facilities have production devices manually time-synced via SNTP queries to corporate servers outside the OT perimeter. This forces OT traffic through firewalls to corporate networks unnecessarily and creates dependency on corporate infrastructure stability. Time synchronization should be solved entirely within OT, fed from isolated reference clocks.

If you'd like to discuss time architecture for your facility, reach out.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call