Office ofinspector General. Independent Evaluation Report

Size: px
Start display at page:

Download "Office ofinspector General. Independent Evaluation Report"

Transcription

1 AR * Oice onspector General ndependent Evaluation Report./ o. --r-; - - Review o Federal Trade Commission mplementation o the Federal normation Security Management Act For Fiscal Year 2008 September 30,2008 NON PUBLC REPORT

2 Chainnan Kovacic: UNTED STATES OF AMERCA FEDERAL TRADE COMMSSON WASHNGTON. D.C. ZOS80 September 30, 2008 The Oice o nspector General (OG) or the Federal Trade Commission engaged Allied Technology, nc~ to independently evaluate its inormation security or compliance with requirements contained in the Federal nonnation Security Management Act (FSMA) o This report provides the resultsothat evaluation. The objectives were to evaluate the adequacy o the FTC's inonnation security program and its procedures or identiying and protecting Personally dentiiable normation (Pl) and other Privacy Act concerns. This inonnation is provided to senior management and others to enable them to determine the eectiveness o overajl security programs, to ensure the conidentiality and integrity o data entrusted to the FTC, and to develop strat.::gieslbest practices or cost eectively improving inonnation security. The OG reviewed the FTC's security policies, procedures, and practices and conducted an assessmentosecurity controls in the ollowing areas: REDACTED This evaluation was conducted rom June through September 2008 and ollowed standards and requirements or ederal government agencies such as those provided through FSMA, National nstitute o Standards and Technology and the Otlice o Management and Budget memorandums. The FTC s(."curity environment is strone: and robust and continues to evolve to expand its coverage. REDACTED REDACTED REDACTED Tb~ normation and Technology Management oice (TM) took actions that address~ REDACTED recommendations at Headquarters an1 REDACTED!.ecommendations at the REDACTED The

3 - i i -, Ola analysis o the current FTC security/privacy control indi{'l!~ at J..REDA"CTED lieneraliy, tnt: recommendations addressed two area.. RWACTED Respectully submitted, &s:~ nspector General environment irttmtiiptu? REDACTED The major eort or TM nex.t year will h~ '''''o~c-u-s-o-n--~c;-:-'''''---'------;;red~a;-;cted:;;;';.. - Ola commrnds TM on its eorts to assure a secure T environment at the FTC and to thank: TM management or the cooperation and assistance it provided to the OG during our review. it<:,

4 AR Oice o nspector General ndependent Evaluation Report Review ofederal Trade Commission mplementation othe Federal normation Security Management Act For Fiscal Year 2008 September 30, 2008 NON PUBLC REPORT

5 Federal Trade Commission Evaluation othe Federal normation Security Mana ement Act o2002 Submitted to: The Federal Trade Commission Oice othe nspector General 600 Pennsylvania. Avenue, N.w. Washington, DC ATN:John Seeba nspector General Submitted by: Allied Technology Group, nc Research Boulevard Rockville, Maryland Contract Number: GS-35F-0079J Task Order Number: FTC-07-G-7114 This document contains nonpublic normation. Access, mantenance, use, disclosure, removal, and disposal are subject to ederal laws, regulations, orders and policies, including the Federal normation Security Management Act, Federal Records Act, Privacy Act o 1974, FTC Act, and/or other restrictions, where applicable. Violations may result n criminal, civil or disciplinary action, including ines, penalties or imprisonment. FOR OFFCAL USE ONLY

6 TABLE OF CONTENTS EXECUTVE SUMMARY BACKGROUND SCOPE OBJECTVE(S) METHODOLOGY GENERAL OVERVEW FlNDNGS AND RECOMMENDATONS STATUS OFFSCAL YEAR2007 RECOMMENDATONS SUMMARY OF FNDNGS AND RECOMMENDATONS 35 Table ofigures Figure 1: Comparison orevised FTC Policy with NST Requirements 11 Figure 2: e-authentication Filters 14 Figure 3: FTC Systems Summary 14 Figure 4: FSMA Assignment osecurity Responsibility 17 Figure 5: BPD Scanning Tests 19 FOR OFFCAL USE ONLY

7 EXECUTVE SUMMARY Results in Brie The Federal Trade Commission (FTC) is an independent agency responsible or the administration oa variety ostatutes that are designed to promote competition and to protect the public rom unair and deceptive acts and practices in the advertising and marketing ogoods and services. These responsibilities oten result in the accumulation ovast quantities orecords, some o which contain sensitive inormation. Automated inormation systems have been developed or acquired to assist FTC stain conducting their law enorcement and management eorts. This includes collection oinormation rom commercial organizations and the general public. normation in these systems and systems unctionality is made available to FTC employees based on their organizational role. Access to selected inormation is available to the public on a read-only basis via the nternet. The agency also relies on automated iles and records to pay its employees and vendors, process personnel transactions, and perorm other "housekeeping" unctions. The normation and Technology Management (TM) Oice is responsible or the technological inrastructure and the oice systems that provide the FTC with the tools and the inormation needed to conduct and manage its consumer protection and competition missions. Responsibility or establishing and maintaining the FTC inormation assurance/security program is assigned to the Chienormation Security Oicer who reports to the Chienormation Oicer. Responsibility or the FTC Privacy Program is assigned to the ChiePrivacy Oicer who reports to the FTC ChieoSta. The Federal normation Security Management Act o2002 (FSMA) provides a comprehensive ramework or ensuring the eectiveness otechnical, administrative, and physical security controls over inormation resources that support Federal operations and assets. FSMA requires an annual assessment ocompliance with requirements and related inormation security policies, procedures, standards, and guidelines. The assessments are meant to provide agency senior management and others with the needed inormation to determine the eectiveness ooverall security programs, ensure the conidentiality and integrity odata entrusted to the FTC, and to develop strategies/best practices or cost eectively improving inormation security. A critical component othe FSMA inormation assurance program monitoring requirements is an independent assessment oprogram eectiveness by the nspector General (G) othe respective ederal agency. This assessment is intended to identiy weaknesses in agency programs, provide recommendations or corrective actions, and monitor agency success in maintaining the security oagency inormation assets (hardware, sotware, data, and system availability). n its FY 2008 FSMA reporting guidance, OMB expanded the scope othe annual FSMA assessment to include evaluation oagency policies and procedures or collecting, storing, and protecting privacy inormation. 11 FOR OFFCAL USE ONLY

8 The Oice onspector General (OG) reviewed FTC security policies, procedures, and practices and conducted detailed assessmentsoftc security and privacy controls in the ollowing areas: This report provides the results othe independent evaluation othe FTC inormation security environment by the Oice othe nspector General (OG). The results are current as o September 30,2008 and provide the evaluation othe adequacy othe FTC's inormation security program and practices or Fiscal Year 2008 (FY 2008). Findings in Brie TheFC security environment is strong and robust and continues to evolve to expand its coverage and to address changing threats and requirements. FTC management recognizes that continued vigilance, and resource investment is required to protect the data entrusted to its care and secure the availability and integrity othe inormation technology (T) systems that are critical to the agency's ability to successully complete its missions. The FTC Oice onormation Technology Management (TM) is continuing its eort to update its security policies and procedures. This eort is integrated with the FTC Privacy Program. ntegration othe FTC normation and Privacy programs will result in stronger protection than independent program eorts. The OG analysis othe current FTC securi privacy control environment identiied indings. The indings related t 1! The ollowing table lists the indings and recommendations developed through this FY 2008 FSMA evaluation. JlJ FOR OFFCAL USE ONLY 1 i

9 , V FOR OFFCAL USE ONLY i [! i! i

10 i! v FOR OFFCAL USE ONLY!

11 1.0 BACKGROUND The Federal Trade Commission (FTC) is an independent agencyresponsible or the administration oa variety ostatutes that are designed to promote competition and to protect the public rom unair and deceptive acts and practices in the advertising and marketing ogoods and services. These responsibilities oten result in the accumulation ovast quantities orecords, some owhich contain sensitive inormation. Automated inormation systems have been developed to assist FTC stain conducting their law enorcement and management eorts. DACTE Access to selected m ormaton S aval a e to e pu C on a rea -on y ass Va the nternet. The agency also relies on automated.iles and records to pay its employees and vendors, process personnel transactions, and perorm other "housekeeping" unctions ormally perormed manually. n the past ew years, the FTC has expanded its use othe nternet to support publicocused missions such as establishment othe "Do Not Call Registry" and collecting complaints regarding companies, business practices, identity thet, and episodes o violence in the media. The implementation othese mission-support systems increased the need or the FTC to establish and maintain an inormation security environment that both protects inormation assets (hardware, sotware, data) without being so restrictive that it limits intended use by the general public. The normation and Technology Management OTM) Oice, in the Oice othe Executive Director, is responsible or the technological inrastructure and the oice systems that provide the FTC with the tools and the inormation needed to conduct and manage its consumer protection and competition missions. The Federal normation Security Management Act o2002 (FSMA) provides a comprehensive ramework or ensuring the eectiveness otechnical, administrative, and physical security controls over inormation resources that support Federal operations and assets. FSMA requires an annual assessment ocompliance with requirements and related inormation security policies, procedures, standards, and guidelines. The assessments are meant to provide agency senior management and others with the inormation needed to determine the eectiveness ooverall security programs, ensure the conidentiality and integrityodata entrusted to the FTC, and to develop strategieslbest practices or cost eectively improving inormation security. The Oice omanagement and Budget (OMB) through Circular A-130, Management o Federal normation Resources, Appendix ll, provides guidance to ederal agencies regarding the implementation ofsma requirements. OMB Circular A-130 emphasizes that, under FSMA, Agencies are required to implement, maintain, and enhance an automated inormation assurance program, including the preparation opolicies, 1 FOR OFFCAL USE ONLY 1,! i

12 standards, and procedures or providing inormation security and monitoring program eectiveness. Establishing and maintaining an eective inormation security program is an important managerial responsibility. The OMB also provides guidance regarding the scope and inormation to be reported through the annual FSMA assessments. n 2008, OMB guidance expanded the scope othe annual FSMA assessments to address concerns regarding the protection aorded inormation related to individuals (i.e., privacy data). A critical component othe FSMA inormation assurance program monitoring requirements is an independent assessment oprogram eectiveness by the nspector General (G) othe respective ederal agency. This assessment is intended to identiy weaknesses in agency programs, provide recommendations or corrective actions, and monitor agency success in maintaining the security oagency inormation assets (hardware, sotware, data, and system availability). An independent assessment is especially critical because threats to ederal inormation assets are continuously changing as technology evolves and the number and complexity oattacks on ederal systems is increasing. The independent assessment provides an opportunity to examine security controls and security planning and ensure that the controls are addressing the changed security environment and the increased ocus on protecting inormation related to individual privacy. This report provides the results othe independent evaluation othe FTC inormation security environment by the Oice othe nspector General (OG). The results are current as oseptember 30,2008 and provide the evaluation othe adequacy othe FTC's inormation security program and practices or iscal year 2008 (FY 2008)., ~! t 2 FOR OFFCAL USE ONLY

13 . 2.0 SCOPE To accomplish this FSMA evaluation, the ora reviewed F'C security policies, procedures, and practices and conducted an assessment oftc security controls in the ollowing areas: This assessment ocused on the F'C procedures and practices used to maintain and evolve its inonnation security controls. This approach provides an assessment othe capability to maintain eective security as well as a "snapshot" othe status othe F'C security environment.!! i 3 FOR OFFCAL USE ONLY l 1

14 3.0 OBJECTlVE(S) The objectives othis evaluation are to provide- All analyses were perormed in accordance with the ollowing guidance: l. Oice omanagement and Budget (OMB) Memorandum M-05-15, Reporting nstructions or the Federal normation Security Management Act, June 13, 2005; 2. DMB M-06-20, FY2006Reportinglnstructionsor the Federal normation Security Management Act andagency Privacy Management, July 27,2007; 3. OMB M-08-09, New FSMA Privacy Reporting Requirementsor FY2008, January 18, 2008; 4. OMB M-08-21, FY 2008 Reporting nstructions or the Federal normation Security Management Act and Agency Privacy Management, July 14, 2008; 5. FTC policies and procedures 6. National nstitute ostandards and Technology (NS) Special Publication (SP) , Guideor Developing Security Plansor normation Technology Systems, December 1998; 7. NSTSP , Risk Management Guideor normation Technology Systems, July 2004; 8. NSTSP , Contingency Planning Guideor normation Technology Systems, June 2002; 9. NST SP , Guideor the Security Certiication andaccreditation o Federal normation S:vstems, May 2004; 4 FOR OFFCAL USE ONLY ; ; 1., r

15 10. NSTSP , Recommended Security Controls or Federal normation Systems, Rev. 1, Dec 2006; 11. NSTSP A, Guideor Assessing the Security Controls in Federal normation Systems, June 2008; 12. Federal nonnation Processing Standards (FPS) Publication (PUB) 199, Standards or Security Categorization ofederal normation andnormation Systems, February 2004; 13. Small Agency Council Memorandum SACCO-05-l; 14. Quality Standards or nspection issued by the President's Council on ntegrity and Eiciency; 15. GAO, Federal normation System Controls Audit Manual, Volume : Financial Statement Audits, January 1999; 16. FTC/OG guidance; 17.0MB Memorandum M-03-22, Guidanceor mplementing Privacy Provisions o the E-Government Act o2002; and 18.0MB Guidance M-04-15, Guidanceor Development ohomeland Security Directive (HSPD) - 7 Critical nrastructure Protection Plans to Protect Federal nrastructure and Key Resources. This evaluation was conducted rom June, 2008 through September, FOR OFFCAL USE ONLY ~.

16 4.0 Methodology This evaluation constitutes the annual evaluation required by the OMB and conorms to the requirements and guidance provided by the National nstitute ostandards and Technology (NST) through Federal normation Processing Standards (e.g., FPS 199 and 200) and series 800 Special Publications (e.g., SP , A). The ollowing methodology was used to conduct the overall security control evaluation. Planned the Evaluation - Developed a project plan that delineated the evaluation approach and areas oconcern or the FY 2008 assessment; Collected available published data - Documents containing data relevant to the evaluation was collected. This included: e mtent 0 S an YSS was to denh changes in FTC security practices and procedures implemented since the completion othe FY 2007 FSMA assessment; nterviewed FTC sta- Conducted interviews oftc stato validate documentation, discuss identiied concerns, and evaluate the level osenior management involvement with security planning and perormance. The FTC sta interviewed included the Chienormation Oicer (CO), the Chienonnation Security Oicer (CrSO), ChiePrivacy Oicer (CPO) and members othe TM; 6 FOR OFFCAL USE ONLY

17 Developed preliminary indings - Evaluated the data collected and discussed indings and recommendations with FTC sta. This ensured the accuracy o indings and viability orecommendations; and Prepared FY 2008 FSMA report - The inormation collected and the associated indings and recommendations were used to prepare this FY 2008 FC FSMA report.! 1 it ~ 7 FOR OFFCAL USE ONLY!,.,! j ~

18 5.0 GENERAL OVERVEW n general, the FTC security program is strong and robust. ~ REDACTED REDACTED The level oawareness osecurity issues and e concern or protecting assets S igh. There are procedures in place to monitor program perormance and to quickly respond to identiied vulnerabilities and opportunities or pro am enhancement. For example, during the course o evaluation,/. REDACTED D The FTC inormation security ard privacy programs need to continue to evolve and enhance their control environments. FSMA expanded the security coverage rom a ocus on computer system security to a ocus on inormation security. The expansion othe scopeothe FSMA evaluations was urther exparded this year with the additionoareas oconcern speciic to protection opersona dentiiable normation (pm. This. " - REDACTED contmumg expanson) REDACTED i! t 8 FOR OFFCAL USE ONLY! ~ t

19 1 The FTC is perceived as a ocus osecurity inonnation by the general public. The public looks to the FTC to provide inormation as to how to protect its inormation assets rom threats such as identity thet and to protect their privacy through activities such as the Do Not Call Registry. This perception is crucial to the FTC's ability to obtain the inonnation and public support it needs to eectively complete its missions. Public conidence in the FTC's ability to protect inonnation requires a continuing ocus on security and privacy. The FTC management's continuing emphasis on providing a secure computing environment shows that it recognizes the importance osecurity and privacy controls to the successul completion oits missions. j j 9 FOR OFFCAL USE ONLY, i i j 1 t[,

20 6.0 Findings and Recommendations This section presents indings and recommendations developed through the FY 2008 FSMA evaluation. i j t! 10 FOR OFFCAL USE ONLY!

21 1 t r 11 FOR OFFCAL USE ONLY! r j ~.

22 ! i!,! 12 FOR OFFCAL USE ONLY 1 ;

23 Cb)6-) REDACTED 13 FOR OFFCAL USE ONLY

24 14 FOR OFFCAL USE ONiY!! i t 1!

25 S FOR OFFCAL USE ONLY

26 i Recommendation: None. Agency Response: No response required. l! t 16 FOR OFFCAL USE ONLY [ ~ t

27 17 FOR OFFCAL USE ONLY,, t

28 Agency Response: 18 FOR OFFCAL USE ONLY

29 ![ i l 1, r t 1 1i 19 FOR OFFCAL USE ONLY i

30 i!!i i 20 FOR OFFCAL USE ONLY J!

31 l j 21 FOR OFFCAL USE ONLY, i 1! t

32 i j! REDACTED 22 FOR OFFCrAL USE ONLY!! t! ;

33 23 FOR OFFCAL USE ONLY

34 3 FAR case FOR OFFCAL USE ONLY i

35 7.0 STATUS OF FSCALYEAR 2007 RECOMMENDATONS n its FY 2007 FSMA report, the OG ide r.... ~~~::: environment. j 25 FOR OFFCAL USE ONLY

36 j j i!t 1 26 FOR OFFCAL USE ONLY! i. i

37 i t l 27 FOR OFFCAL USE ONLY!

38 28 FOR OFFCAL USE ONLY!!! ~, '

39 29 FOR OFFCAL USE ONLY

40 30 FOR OFFCAL USE ONLY i 1 1 i r

41 31 FOR OFFCAL USE ONLY J!! 1t!

42 32 FOR OFFCAL USE ONLY

43 ! r 1! 33 FOR OFFCAL USE ONLY 1 1 j :

44 i! t t 34 FOR OFFCAL USE ONLY t

45 8.0 SUMMARY OF FNDNGS AND RECOMMENDATONS The FC security environment is robust an i i! FOR OFFCAL USE ONLY ; 1 t r

46 36 FOR OFFCAL USE ONLY

47 !,! 37 FOR OFFCAL USE ONLY t

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

Date: 2. Name of individual responsible for the administration of debates: Individual's title in the organization:

Date: 2. Name of individual responsible for the administration of debates: Individual's title in the organization: Debate Certiication Each Clean Elections candidate is required to ile this orm no later than October 1, 2005 to report the arrangements or the two mandatory Clean Elections candidates' debates. Name o

More information

Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness.

Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness. Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness September 2004 Reference Number: 2004-20-155 This report has cleared the Treasury

More information

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.

More information

U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report

U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management

More information

1. Overview of Nios II Embedded Development

1. Overview of Nios II Embedded Development January 2014 NII52001-13.1.0 1. Overview o Nios II Embedded Development NII52001-13.1.0 The Nios II Sotware Developer s Handbook provides the basic inormation needed to develop embedded sotware or the

More information

How To Check If Nasa Can Protect Itself From Hackers

How To Check If Nasa Can Protect Itself From Hackers SEPTEMBER 16, 2010 AUDIT REPORT OFFICE OF AUDITS REVIEW OF NASA S MANAGEMENT AND OVERSIGHT OF ITS INFORMATION TECHNOLOGY SECURITY PROGRAM OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL FY 2015 INDEPENDENT EVALUATION OF THE EFFECTIVENESS OF NCUA S INFORMATION SECURITY PROGRAM UNDER THE FEDERAL INFORMATION SECURITY MODERNIZATION

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Stronger Access Controls and Further System Enhancements Are Needed to Effectively Support the Privacy Impact Assessment Program September 1, 2015 Reference

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

1. Overview of Nios II Embedded Development

1. Overview of Nios II Embedded Development May 2011 NII52001-11.0.0 1. Overview o Nios II Embedded Development NII52001-11.0.0 The Nios II Sotware Developer s Handbook provides the basic inormation needed to develop embedded sotware or the Altera

More information

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07 EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014

More information

SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAGEMENT SYSTEM

SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAGEMENT SYSTEM SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAGEMENT SYSTEM Mohammad Al Rawajbeh 1, Vladimir Sayenko 2 and Mohammad I. Muhairat 3 1 Department o Computer Networks, Al-Zaytoonah

More information

Final Audit Report. Report No. 4A-CI-OO-12-014

Final Audit Report. Report No. 4A-CI-OO-12-014 U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S

More information

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)

More information

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION

More information

Review of the SEC s Systems Certification and Accreditation Process

Review of the SEC s Systems Certification and Accreditation Process Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. ELECTION ASSISTANCE COMMISSION EVALUATION OF COMPLIANCE WITH THE REQUIREMENTS OF THE FEDERAL INFORMATION SECURITY MANAGEMENT

More information

POSTAL REGULATORY COMMISSION

POSTAL REGULATORY COMMISSION POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1

More information

EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human Health and the Environment

EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human Health and the Environment U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human

More information

A FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING

A FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING A FRAMEWORK FOR AUTOMATIC FUNCTION POINT COUNTING FROM SOURCE CODE Vinh T. Ho and Alain Abran Sotware Engineering Management Research Laboratory Université du Québec à Montréal (Canada) vho@lrgl.uqam.ca

More information

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU) Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)

More information

Management Advisory Report: No Violations of the Fair Debt Collection Practices Act Resulted in Administrative or Civil Actions (Fiscal Year 2001)

Management Advisory Report: No Violations of the Fair Debt Collection Practices Act Resulted in Administrative or Civil Actions (Fiscal Year 2001) Management Advisory Report: No Violations of the Fair Debt Collection Practices Act Resulted in Administrative or Civil Actions July 2001 Reference Number: 2001-10-081 This report has cleared the Treasury

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 Department

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

NASA OFFICE OF INSPECTOR GENERAL

NASA OFFICE OF INSPECTOR GENERAL NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA

More information

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department

More information

NEIAF June 18, 2015. IS Auditing 101

NEIAF June 18, 2015. IS Auditing 101 NEIAF June 18, 2015 IS Auditing 101 http://www.gao.gov/fiscam/overview Planning Understand the Overall Audit Objectives and Related Scope of the Information System Controls Audit Understand the Entity

More information

High School Students Who Take Acceleration Mechanisms Perform Better in SUS Than Those Who Take None

High School Students Who Take Acceleration Mechanisms Perform Better in SUS Than Those Who Take None May 2008 Dr. Eric J. Smith, Commissioner Dr. Willis N. Holcombe, Chancellor High School Who Take Acceleration Mechanisms Perorm Better in SUS Than Those Who Take None Edition 2008-01 Introduction. is one

More information

Federal Communications Commission Office of Inspector General

Federal Communications Commission Office of Inspector General Federal Communications Commission Office of Inspector General Report on Government Information Security Reform Act Evaluation - Findings and Recommendations Report No. 01-AUD-11-43 November 29, 2001 Executive

More information

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106

More information

How To Improve Nasa'S Security

How To Improve Nasa'S Security DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL

More information

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002

More information

Briefing Report: Improvements Needed in EPA s Information Security Program

Briefing Report: Improvements Needed in EPA s Information Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Briefing Report: Improvements Needed in EPA s Information Security Program Report No. 13-P-0257 May 13, 2013 Scan this mobile code to learn

More information

EPA Needs to Strengthen Its Privacy Program Management Controls

EPA Needs to Strengthen Its Privacy Program Management Controls OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment EPA Needs to Strengthen Its Privacy Program Management Controls Report No. 2007-P-00035 September 17, 2007 Report Contributors:

More information

2014 Audit of the Board s Information Security Program

2014 Audit of the Board s Information Security Program O FFICE OF I NSPECTOR GENERAL Audit Report 2014-IT-B-019 2014 Audit of the Board s Information Security Program November 14, 2014 B OARD OF G OVERNORS OF THE F EDERAL R ESERVE S YSTEM C ONSUMER FINANCIAL

More information

Audit Report. Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland, Oregon

Audit Report. Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland, Oregon U.S. Department of Agriculture Office of Inspector General Western Region Audit Report Natural Resources Conservation Service Water and Climate Information System Review of Application Controls Portland,

More information

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes

More information

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,

More information

Audit of Controls over Government Property Provided under Federal Student Aid Contracts FINAL AUDIT REPORT

Audit of Controls over Government Property Provided under Federal Student Aid Contracts FINAL AUDIT REPORT Audit of Controls over Government Property Provided under Federal Student Aid Contracts FINAL AUDIT REPORT ED-OIG/A19-B0001 March 2002 Our mission is to promote the efficiency, effectiveness, and integrity

More information

Audit of the Department of State Information Security Program

Audit of the Department of State Information Security Program UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program

More information

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason

More information

Identifying Innovative Agricultural Education Programs. John Rayfield Tim Murphy Gary Briers Lauren Lewis Texas A&M University ABSTRACT

Identifying Innovative Agricultural Education Programs. John Rayfield Tim Murphy Gary Briers Lauren Lewis Texas A&M University ABSTRACT Identiying Innovative Agricultural Education Programs ABSTRACT John Rayield Tim Murphy Gary Briers Lauren Lewis Texas A&M University Researchers identiied innovative agricultural education programs across

More information

Attributes of an analyst: What we can learn from the intelligence analysts job description

Attributes of an analyst: What we can learn from the intelligence analysts job description Edith Cowan University Research Online Australian Security and Intelligence Conerence Conerences, Symposia and Campus Events 2015 Attributes o an analyst: What we can learn rom the intelligence analysts

More information

Department of Homeland Security

Department of Homeland Security for the Immigration and Customs Enforcement Component of the FY 2013 Department of Homeland Security s Financial Statement Audit OIG-14-85 April 2014 OFFICE OF INSPECTOR GENERAL Department of Homeland

More information

UNITED STATES COMMISSION ON CIVIL RIGHTS. Fiscal Year 2012 Federal Information Security Management Act Evaluation

UNITED STATES COMMISSION ON CIVIL RIGHTS. Fiscal Year 2012 Federal Information Security Management Act Evaluation Memorandum UNITED STATES COMMISSION ON CIVIL RIGHTS Date: November 15, 2012 To: From: Subject: The Honorable Commissioners Frances Garcia, Inspector General Fiscal Year 2012 Federal Information Security

More information

Hanh Do, Director, Information System Audit Division, GAA. SUBJECT: Review of HUD s Information Technology Contingency Planning and Preparedness

Hanh Do, Director, Information System Audit Division, GAA. SUBJECT: Review of HUD s Information Technology Contingency Planning and Preparedness Issue Date: August 31, 2006 Audit Report Number 2006-DP-0005 TO: Lisa Schlosser, Chief Information Officer, A FROM: Hanh Do, Director, Information System Audit Division, GAA SUBJECT: Review of HUD s Information

More information

The IRS Sensibility of Wireless Telecommunication Device Inventory Control and audit

The IRS Sensibility of Wireless Telecommunication Device Inventory Control and audit TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Wireless Telecommunication Device Inventory Control Weaknesses Resulted in Inaccurate Inventory Records and Unsupported Service Fees September 19, 2014

More information

Final Audit Report -- CAUTION --

Final Audit Report -- CAUTION -- U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management

More information

Information Technology Processes FinCEN is an agency whose mission is dependent on the effective collection,

Information Technology Processes FinCEN is an agency whose mission is dependent on the effective collection, Appendix L Project Management and Information Technology Processes FinCEN is an agency whose mission is dependent on the effective collection, dissemination, and meaningful analysis of large quantities

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION A Complete Certification and Accreditation Is Needed to Ensure the Electronic Fraud Detection System Meets Federal Government Security Standards September

More information

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12 Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General

More information

How To Audit The Mint'S Information Technology

How To Audit The Mint'S Information Technology Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Taxpayer Data Used at Contractor Facilities May Be at Risk for Unauthorized Access or Disclosure May 18, 2010 Reference Number: 2010-20-051 This report

More information

May 2, 2016 OIG-16-69

May 2, 2016 OIG-16-69 Information Technology Management Letter for the United States Secret Service Component of the FY 2015 Department of Homeland Security Financial Statement Audit May 2, 2016 OIG-16-69 DHS OIG HIGHLIGHTS

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information

AUDIT OF USAID s IMPLEMENTATION OF INTERNET PROTOCOL VERSION 6

AUDIT OF USAID s IMPLEMENTATION OF INTERNET PROTOCOL VERSION 6 OFFICE OF INSPECTOR GENERAL AUDIT OF USAID s IMPLEMENTATION OF INTERNET PROTOCOL VERSION 6 AUDIT REPORT NO. A-000-08-006-P September 4, 2008 WASHINGTON, DC Office of Inspector General September 4, 2008

More information

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy The Tangled Web o Agricultural Insurance: Evaluating the Impacts o Government Policy Jason Pearcy Vincent Smith July 7, 2015 Abstract This paper examines the eects o changes in major elements o the U.S.

More information

The Certification and Accreditation of Computer Systems Should Remain in the Computer Security Material Weakness. August 2004

The Certification and Accreditation of Computer Systems Should Remain in the Computer Security Material Weakness. August 2004 The Certification and Accreditation of Computer Systems Should Remain in the Computer Security Material Weakness August 2004 Reference Number: 2004-20-129 This report has cleared the Treasury Inspector

More information

Federal Trade Commission Privacy Impact Assessment

Federal Trade Commission Privacy Impact Assessment Federal Trade Commission Privacy Impact Assessment for the: StenTrack Database System September, 2011 1 System Overview The Federal Trade Commission (FTC) protects America s consumers. As part of its work

More information

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy

The Tangled Web of Agricultural Insurance: Evaluating the Impacts of Government Policy Journal o Agricultural and Resource Economics 40(1):80 111 ISSN 1068-5502 Copyright 2015 Western Agricultural Economics Association The Tangled Web o Agricultural Insurance: Evaluating the Impacts o Government

More information

Results of Technical Network Vulnerability Assessment: EPA s Region 1

Results of Technical Network Vulnerability Assessment: EPA s Region 1 U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Results of Technical Network Vulnerability Assessment: EPA s Region 1 Report No. 12-P-0518 June 5, 2012 Scan this mobile code to learn more

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Additional Security Is Needed for the Taxpayer Secure Email Program February 4, 2011 Reference Number: 2011-20-012 This report has cleared the Treasury

More information

Why focus on assessment now?

Why focus on assessment now? Assessment in th Responding to your questions. Assessment is an integral part o teaching and learning I this sounds amiliar to you it s probably because it is one o the most requently quoted lines rom

More information

March 17, 2015 OIG-15-43

March 17, 2015 OIG-15-43 Information Technology Management Letter for the U.S. Citizenship and Immigration Services Component of the FY 2014 Department of Homeland Security Financial Statement Audit March 17, 2015 OIG-15-43 HIGHLIGHTS

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This

More information

Fiscal Year 2014 Work Plan

Fiscal Year 2014 Work Plan Federal Election Commission Office of Inspector General Fiscal Year 2014 Work Plan Lynne A. McFarland Inspector General TABLE OF CONTENTS A Message from the Inspector General--------------------------------------------

More information

DEPARTMENT OF TRANSPORTATION

DEPARTMENT OF TRANSPORTATION OFFICE OF THE SECRETARY Federal Funds General and special unds: SALARIES AND EXPENSES For necessary expenses o the Oice o the Secretary, ø$87,234,000, o which not to exceed $2,220,000 shall be available

More information

Audit of Veterans Health Administration Blood Bank Modernization Project

Audit of Veterans Health Administration Blood Bank Modernization Project Department of Veterans Affairs Office of Inspector General Audit of Veterans Health Administration Blood Bank Modernization Project Report No. 06-03424-70 February 8, 2008 VA Office of Inspector General

More information

AUDIT REPORT. The Energy Information Administration s Information Technology Program

AUDIT REPORT. The Energy Information Administration s Information Technology Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department

More information

MEMORANDUM. Comments on the Updating of the LSC Risk Management Program

MEMORANDUM. Comments on the Updating of the LSC Risk Management Program Office of Inspector General Legal Services Corporation 3333 K Street, NW. 3rd Floor Washington, DC 20007 3558 202.295. 1660 (p) 202.337.6616 (f) www.oig.lsc.gov MEMORANDUM TO: FROM: LSC Audit Committee

More information

OFFICE OF INSPECTOR GENERAL. Audit Report. Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security

OFFICE OF INSPECTOR GENERAL. Audit Report. Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security OFFICE OF INSPECTOR GENERAL Audit Report Evaluation of the Railroad Retirement Board Medicare Contractor s Information Security Report No. 08-04 September 26, 2008 RAILROAD RETIREMENT BOARD INTRODUCTION

More information

M ANAGEMENT I NTEGRATION G OAL. Achieve organizational and management excellence

M ANAGEMENT I NTEGRATION G OAL. Achieve organizational and management excellence M ANAGEMENT I NTEGRATION G OAL Achieve organizational and management excellence 71 MANAGEMENT INTEGRATION STRATEGIC GOAL Management Integration Goal Achieve organizational and management excellence The

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Customer Account Data Engine 2 (CADE 2): System Requirements and Testing Processes Need Improvements September 28, 2012 Reference Number: 2012-20-122 This

More information

An Epicor White Paper. Improve Scheduling, Production, and Quality Using Cloud ERP

An Epicor White Paper. Improve Scheduling, Production, and Quality Using Cloud ERP An Epicor White Paper Improve Scheduling, Production, and Quality Using Cloud ERP Table o Contents Introduction...1 Best Practices or Discrete anuacturers...2 Inventory-based manuacturing...2 Discrete

More information

WASHINGTON, THURSDAY, MARCH 15, 2001

WASHINGTON, THURSDAY, MARCH 15, 2001 UR IB U U E PL NU Congressional Record M S United States o America PROCEEDINGS AND DEBATES OF THE Vol. 147 107 th CONGRESS, FIRST SESSION WASHINGTON, THURSDAY, MARCH 15, 2001 No. 35 House o Representatives

More information

OFFICE OF INSPECTOR GENERAL

OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment Evaluation of U.S. Chemical Safety and Hazard Investigation Board s Compliance with the Federal Information Security Management

More information

OFFICE OF INSPECTOR GENERAL. Audit Report

OFFICE OF INSPECTOR GENERAL. Audit Report OFFICE OF INSPECTOR GENERAL Audit Report Audit of the Business Process Controls in the Financial Management Integrated System Report No. 14-10 August 01, 2014 RAILROAD RETIREMENT BOARD EXECUTIVE SUMMARY

More information

Audit of Controls over Government Travel Cards FINAL AUDIT REPORT

Audit of Controls over Government Travel Cards FINAL AUDIT REPORT Audit of Controls over Government Travel Cards FINAL AUDIT REPORT ED-OIG/A19-B0010 March 2002 Our mission is to promote the efficiency, effectiveness, and integrity of the Department s programs and operations.

More information

Information Resource Management Directive 5000.09 USAP Information Security Awareness, Training and Education Program

Information Resource Management Directive 5000.09 USAP Information Security Awareness, Training and Education Program The National Science Foundation Polar Programs United States Antarctic Program Information Resource Management Directive 5000.09 USAP Information Security Awareness, Training and Education Program Organizational

More information

DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES

DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans

More information

CREATING MENTOR NETWORKS IN THE OSCE REGION: A Practical Roadmap. Organization for Security and Co-operation in Europe

CREATING MENTOR NETWORKS IN THE OSCE REGION: A Practical Roadmap. Organization for Security and Co-operation in Europe CREATING MENTOR NETWORKS IN THE OSCE REGION: A Practical Roadmap. Organization or Security and Co-operation in Europe table o contents Project Partners: The Organization or Security and Co-operation in

More information

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL THE INSPECTOR GENERAL October 12, 2006 The Honorable Karen S. Evans Administrator for Electronic Government and Information Technology

More information

VA Office of Inspector General

VA Office of Inspector General VA Office of Inspector General OFFICE OF AUDITS AND EVALUATIONS Department of Veterans Affairs Review of Alleged Lack of Access Controls for the Project Management Accountability System Dashboard May 9,

More information

AUDIT REPORT. Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses

AUDIT REPORT. Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses DOE/IG-0920

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314

NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: APRIL 14, 1997 LETTER NO: 97-CU-5 TO: The Board of Directors of the Federal Insured Credit

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Standard Database Security Configurations Are Adequate, Although Much Work Is Needed to Ensure Proper Implementation August 22, 2007 Reference Number:

More information

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR August 6, 2003 M-03-19 MEMORANDUM FOR HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua

More information

Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA)

Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA) Network Infrastructure - General Support System (NI-GSS) Privacy Impact Assessment (PIA) System Categorization: Moderate Version 1.5 May 30, 2013 Prepared by: Security & Compliance Services (SCS) and Infrastructure

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

Department of Veterans Affairs VHA HANDBOOK 1030.01. Washington, DC 20420 July 31, 2006 COMPLIANCE AND BUSINESS INTEGRITY (CBI) PROGRAM ADMINISTRATION

Department of Veterans Affairs VHA HANDBOOK 1030.01. Washington, DC 20420 July 31, 2006 COMPLIANCE AND BUSINESS INTEGRITY (CBI) PROGRAM ADMINISTRATION Department of Veterans Affairs VHA HANDBOOK 1030.01 Veterans Health Administration Transmittal Sheet Washington, DC 20420 July 31, 2006 COMPLIANCE AND BUSINESS INTEGRITY (CBI) PROGRAM ADMINISTRATION 1.

More information

9. Did the Agency's Executive/Investment Committee approve this request?

9. Did the Agency's Executive/Investment Committee approve this request? Electronic Medical Record (EMR) Exhibit 300: Part I: Summary and Justification (All Capital s) I.A. Overview 1. Date of Submission: 2. Agency: Department of State 3. Bureau: M/MED Medical Director 4. Name

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector

More information

Department of Homeland Security

Department of Homeland Security Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief

More information

Susanville Indian Rancheria Higher Education Program Policy Amended and approved by tile Tribal Business Council on July 9,2010.

Susanville Indian Rancheria Higher Education Program Policy Amended and approved by tile Tribal Business Council on July 9,2010. Susanville Indian Rancheria Higher Education Program Policy Amended and approved by tile Tribal Business Council on July 9,2010. li~ghereducation Mission The Susanville Indian Rancheria Tribal Business

More information

Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02

Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 BACKGROUND OBJECTIVES, SCOPE, AND METHODOLOGY FINDINGS INFORMATION SECURITY PROGRAM AUDIT FOLLOW-UP CATS SECURITY PROGRAM PLANNING

More information