GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
|
|
|
- Sylvia Webster
- 10 years ago
- Views:
Transcription
1 GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement Statement of Gregory C. Wilshusen, Director Information Security Issues David A. Powner, Director Information Technology Management Issues
2 Accountability Integrity Reliability Highlights Highlights of, a testimony before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives April 19, 2007 INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement Why GAO Did This Study For many years, GAO has reported that weaknesses in information security are a widespread problem with potentially devastating consequences such as intrusions by malicious users, compromised networks, and the theft of personally identifiable information. In reports to Congress since 1997, GAO has identified information security as a governmentwide highrisk issue. Concerned by reports of significant vulnerabilities in federal computer systems, Congress passed the Federal Information Security Management Act of 2002 (FISMA), which permanently authorized and strengthened the information security program, evaluation, and reporting requirements for federal agencies. FISMA also defines responsibilities for ensuring centralized compilation and analysis of incidents that threaten information security and providing timely technical assistance in handling security incidents. In this testimony, GAO discusses the continued weaknesses in information security controls at 24 major federal agencies, the reporting and analysis of security incidents, and efforts by the Department of Homeland Security (DHS) to develop a cyber threat analysis and warning capability. What GAO Found In their fiscal year 2006 financial statement audit reports, 21 of 24 agencies indicated that they had significant weaknesses in information security controls. As shown by reports by GAO and agency inspectors general (IG), the weaknesses persist in major categories of controls including, for example, access controls, which ensure that only authorized individuals can read, alter, or delete data, and configuration management controls, which provide assurance that only authorized software programs are implemented. An underlying cause for these weaknesses is that agencies have not yet fully implemented agencywide information security programs, which provide the framework for ensuring that risks are understood and that effective controls are selected and properly implemented. Until agencies effectively and fully implement agencywide information security programs, federal data and systems will not be adequately safeguarded to prevent unauthorized use, disclosure, and modification. Organizations can reduce the risks associated with intrusions and misuse if they take steps to detect and respond to incidents before significant damage occurs, analyze the causes and effects of incidents, and apply the lessons learned. As part of this process, federal policy requires agencies to report incidents to the federal information security incident center US-CERT (Computer Emergency Readiness Team). According to US-CERT, federal agencies reported a record number of incidents in fiscal year As the figure shows, since 2005, the number of incidents reported increased in every category except one. However, inconsistencies exist in reporting at various levels. If agencies do not properly capture and analyze security incidents, they risk losing valuable information needed to prevent future exploits and understand the nature and cost of security threats. Strategic analysis and warning is an essential element of assisting agencies in addressing information security incidents. GAO has recommended that DHS develop such a capability for addressing cyber attacks. DHS has established various initiatives to enhance its analytical capabilities through US-CERT and GAO believes with continued progress in addressing strategic analysis and warnings, US-CERT can further agencies efforts to reduce risks associated with incidents. GAO based its testimony on its previous work in this area as well as agency and congressional reports. To view the full product, including the scope and methodology, click on the link above. For more information, contact Gregory C. Wilshusen at (202) or [email protected]. United States Government Accountability Office
3 Mr. Chairman and Members of the Subcommittee: Thank you for the opportunity to join in today s hearing to discuss information security over federal systems. Information security is a critical consideration for any organization that depends on information systems and computer networks to carry out its mission or business. It is especially important for government agencies, where the public s trust is essential. The need for a vigilant approach to information security is demonstrated by the dramatic increase in reports of security incidents, the wide availability of hacking tools, and steady advances in the sophistication and effectiveness of attack technology. Proper safeguards are essential to protect systems from attackers attempting to gain access and obtain sensitive information, commit fraud, disrupt operations, or launch attacks against other systems. For many years, we have reported that poor information security is a widespread problem with potentially devastating consequences. In reports to Congress since 1997, we have identified information security as a governmentwide high-risk issue. 1 Concerned by reports of significant weaknesses in federal computer systems, Congress passed the Federal Information Security Management Act (FISMA) of 2002, 2 which permanently authorized and strengthened the information security program, evaluation, and annual reporting requirements for federal agencies. In our testimony today, we will summarize (1) the continued weaknesses in information security controls at federal agencies, (2) federal agencies reporting of information security incidents, and (3) efforts by the Department of Homeland Security (DHS) to develop a cyber threat warning and analysis capability. In preparing for this testimony, we relied on our previous reports on information security at federal agencies and the challenges 1 GAO, High-Risk Series: An Update, GAO (Washington, D.C.: January 2007). 2 FISMA was enacted as title III, E-Government Act of 2002, Pub. L , 116 Stat (Dec. 17, 2002). Page 1
4 faced by DHS in fulfilling its cybersecurity responsibilities. We also analyzed agencies Inspector General (IG) reports pertaining to information security; congressional reports; the 24 major federal agencies FISMA reports for fiscal years 2004, 2005, and 2006; the performance and accountability reports for those agencies; and the Office of Management and Budget s FISMA guidance and mandated annual reports to Congress. The work on which this testimony is based was performed in accordance with generally accepted government auditing standards. Results in Brief Significant information security weaknesses continue to place federal agencies at risk. In their fiscal year 2006 financial statement audit reports, 21 of 24 major agencies cited information security control weaknesses. An underlying cause for these weaknesses is that agencies have not fully implemented agencywide information security programs. These weaknesses persist even as many agencies report increased implementation of information security program activities. However, until agencies effectively and fully implement agencywide information security programs, federal data and systems will not be sufficiently safeguarded to prevent unauthorized use, disclosure, and modification. In 2006, agencies reported a record number of information security incidents to US-CERT (Computer Emergency Readiness Team) the DHS unit responsible for collecting such information. At the same time, although agencies have noted improvements in incident reporting procedures, inconsistencies exist across agencies. For example, one agency reported no incidents to US-CERT, although it reported more than 800 incidents internally and to law enforcement authorities. IGs have also reported weaknesses in agencies incident reporting procedures. Page 2
5 In addition to its incident reporting activities with US-CERT, DHS has taken steps towards addressing prior recommendations for developing a strategic analysis and warning capability for cyber attacks. Specifically, DHS has established various initiatives to enhance its analytical capabilities, including intelligence sharing through US-CERT and situational awareness tools at selected federal agencies. We believe that with continued progress in addressing strategic analysis and warnings, US-CERT can further agencies efforts to reduce risks associated with incidents. However, DHS has not yet fully implemented our original recommendations, particularly in implementing such a capability beyond the federal environment. Background Virtually all federal operations are supported by automated systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions and account for their resources without these information assets. Hence, the degree of risk caused by security weaknesses is high. For example, resources (such as federal payments and collections) could be lost or stolen, data could be modified or destroyed, and computer resources could be used for unauthorized purposes or to launch attacks on other computer systems. Sensitive information, such as taxpayer data, Social Security records, medical records, and proprietary business information could be inappropriately disclosed, browsed, or copied for improper or criminal purposes. Critical operations could be disrupted, such as those supporting national defense and emergency services. Finally, agencies missions could be undermined by embarrassing incidents, resulting in diminished confidence in their ability to conduct operations and fulfill their fiduciary responsibilities. Recognizing the importance of securing federal systems and data, Congress passed FISMA, which set forth a comprehensive framework for ensuring the effectiveness of security controls Page 3
6 over information resources that support federal operations and assets. FISMA also defined several public sector responsibilities that have been assumed by US-CERT, a partnership between DHS and the public and private sectors that was established in 2003 to coordinate defense against and responses to cyber attacks across the nation. 3 US-CERT s responsibilities include compiling and analyzing information about incidents that threaten information security and providing timely technical assistance regarding security incidents. Significant Weaknesses Continue to Place Federal Agencies at Risk Significant weaknesses continue to threaten the confidentiality, integrity and availability of federal information and information systems. In their fiscal year 2006 financial statement audit reports, 21 of 24 major agencies indicated that deficient information security controls were either a reportable condition 4 or material weakness (see fig. 1). 5 3 FISMA charged the Director of OMB with ensuring the operation of a federal information security center. The required functions are performed by US-CERT, which was established to aggregate and disseminate cybersecurity information to improve warning and response to incidents, increase coordination of response information, reduce vulnerabilities, and enhance prevention and protection. 4 Reportable conditions are significant deficiencies in the design or operation of internal control that could adversely affect the entity s ability to record, process, summarize, and report financial data consistent with the assertions of management in the financial statements. 5 A material weakness is a reportable condition that precludes the entity s internal control from providing reasonable assurance that misstatements, losses, or noncompliance material in relation to the financial statements or to stewardship information would be prevented or detected on a timely basis. Page 4
7 Figure 1: Agencies Reporting of Information Security Controls in Fiscal Year 2006 Financial Statement Audits These persistent weaknesses appear in the five major categories of information system controls: (1) access controls, which ensure that only authorized individuals can read, alter, or delete data; (2) configuration management controls, which provide assurance that only authorized software programs are implemented; (3) segregation of duties, which reduces the risk that one individual can independently perform inappropriate actions without detection; (4) continuity of operations planning, which provides for the prevention of significant disruptions of computer-dependent operations; and (5) an agencywide information security program, which provides the framework for ensuring that risks are understood and that effective controls are selected and properly implemented. Figure 2 shows how many of the agencies had weaknesses in these five areas. Page 5
8 Figure 2: Information Security Weaknesses at the 24 Major Agencies for Fiscal Year 2006 Access Controls Were Not Adequate A basic management control objective for any organization is to protect data supporting its critical operations from unauthorized access, which could lead to improper modification, disclosure, or deletion of the data. Access controls, which are intended to prevent, limit, and detect unauthorized access to computing resources, programs, information, and facilities, can be both electronic and physical. Electronic access controls include use of passwords, access privileges, encryption, and audit logs. Physical security controls are important for protecting computer facilities and resources from espionage, sabotage, damage, and theft. Our analysis of IG, agency, and our own reports uncovered that agencies did not have adequate access controls in place to ensure that only authorized individuals could access or manipulate data. Of the 24 major agencies, 18 had access control weaknesses. Such weaknesses included not replacing Page 6
9 Shortcomings Existed in Other Controls well-known vendor-supplied passwords, permitting excessive access privileges that users did not need to perform their jobs, not encrypting sensitive information, and not creating or maintaining adequate audit logs. Agencies also lacked effective physical security controls. For instance, many of the data losses that occurred at federal agencies over the past few years were a result of physical thefts or improper safeguarding of systems, including laptops and other portable devices. In addition to access controls, other important controls should be in place to protect the confidentiality, integrity, and availability of information. These controls include policies, procedures, and techniques addressing configuration management to ensure that software patches are installed; appropriately segregating incompatible duties; and establishing service continuity planning. Weaknesses in these areas increase the risk of unauthorized use, disclosure, modification, or loss of information. Federal agencies demonstrated weaknesses in these control areas. For example, several agencies did not always consistently install critical software patches in a timely manner, segregate duties such as security and system administration, or adequately update and test contingency plans. Agencywide Security Programs Were Not Fully Implemented An underlying cause for the information security weaknesses identified at federal agencies is that they have not yet fully implemented agencywide information security programs. An agencywide security program provides a framework and continuing cycle of activity for managing risk, developing security policies, assigning responsibilities, promoting awareness, monitoring the adequacy of the entity s computerrelated controls through security tests and evaluations, and implementing remedial actions as appropriate. Without a welldesigned program, security controls may be inadequate; responsibilities may be unclear, misunderstood, and improperly implemented; and controls may be inconsistently applied. Such Page 7
10 conditions may lead to insufficient protection of sensitive or critical resources. In their annual FISMA reports for fiscal year 2006, agencies reported increased compliance in several security program elements required by the law or federal policy. For example, agencies reported increases in the percentages of systems with assigned risk levels, employees receiving security awareness training, systems that have been certified and accredited 6 and systems whose security controls were tested and evaluated. However, our reports and those of agency IGs indicate that at least 18 of the 24 major agencies had not fully implemented agencywide programs. For example, agencies often did not effectively ensure that all employees and contractors, including those with significant information security responsibilities, received sufficient training. Also, 10 IGs rated the quality of their agencies certification and accreditation process as poor or failing and continued to identify specific weaknesses with the process, such as incomplete risk assessments and security plans. We have also identified shortcomings in agencies efforts in testing and evaluating the effectiveness of their information security controls. In 2006, we reported that agencies had not adequately designed and effectively implemented policies for performing such tests and evaluations. 7 Policies often did not include elements important for performing effective testing. In addition, at agencies where we examined the effectiveness of security controls, we found that they did not identify many of the vulnerabilities we identified on their systems. Further, for case studies of 30 systems at six agencies, weaknesses included insufficient testing documentation, inadequately defined assessment methods, inadequate security testing, and lack of 6 OMB requires that agency management officials formally authorize their information systems to process information and accept the risk associated with their operation. This management authorization (accreditation) is to be supported by a formal technical evaluation (certification) of the management, operational, and technical controls established in an information system s security plan. 7 GAO, Information Security: Agencies Need to Develop and Implement Policies for Periodic Testing, GAO (Washington, D.C.: Oct. 20, 2006). Page 8
11 remedial actions included in testing plans. Finally, for 16 of 24 major agencies, IGs were not able to provide assurance that their agencies almost always incorporated weaknesses for all systems into their remediation plans. Our reviews have also reported that weaknesses were not always resolved as reported, and agencies remedial action plans did not identify resources necessary to correct weaknesses and were not always updated. As a result, agencies do not have reasonable assurance that controls are implemented correctly, operating as intended, or producing the desired outcome with respect to meeting the security requirements of the agency. Furthermore, agencies may not be fully aware of the security control weaknesses in their systems, thereby leaving their information and systems vulnerable to attack or compromise. Until agencies effectively and fully implement agencywide information security programs, federal data and systems will not be adequately safeguarded to prevent unauthorized use, disclosure, and modification. Incident Reporting Varies Across Agencies Although strong controls may not block all intrusions and misuse, organizations can reduce the associated risks if they take steps to detect and respond to them before significant damage occurs. Accounting for and analyzing security problems and incidents are also effective ways for an organization to improve its understanding of security threats and potential costs of security incidents, as well as pinpointing vulnerabilities that need to be addressed so that they are not exploited again. When incidents occur, agencies are to notify the federal information security incident center US-CERT. According to the US-CERT annual report for fiscal year 2006, federal agencies reported a record number of incidents, with a notable increase in incidents reported in the second half of the year. As figure 3 shows, since 2005, the number of incidents reported to US-CERT increased in every category except for malicious code. Further, a 2006 report by the House Committee Page 9
12 on Government Reform illustrated that agencies have a wide range of incidents involving loss or theft and privacy breaches. 8 The report further indicates that the loss of personally identifiable information occurs governmentwide and is not limited to the well-publicized incident at the Department of Veterans Affairs (which involved information on about 26.5 million veterans and active duty military personnel). Figure 3. Incidents Reported to US-CERT in FY05 and FY06 Although agencies have noted many improvements in incident reporting procedures, there are still inconsistencies in reporting at various levels. For example, one agency reported no incidents to US-CERT, although it reported more than 800 incidents internally and to law enforcement authorities. Several IGs also noted specific weaknesses in incident procedures such as components not reporting incidents reliably, information 8 Committee on Government Reform, U.S. House of Representatives, Staff Report: Agency Breaches Since January 1, 2003 (Washington, D.C.: Oct. 13, 2006). Page 10
13 being omitted from incident reports, and reporting time requirements not being met. Without properly accounting for and analyzing security problems and incidents, agencies risk losing valuable information needed to prevent future exploits and understand the nature and cost of threats directed at them. DHS Is Acting to Implement GAO Recommendations on Strategic Analysis and Warning, But More Actions Needed Strategic analysis and warning is an essential element of assisting agencies in addressing information security incidents. We have previously reported that developing and enhancing a national cyber analysis and warning capability is a key DHS cybersecurity responsibility. 9 Over the last several years, we have made recommendations to DHS as the nation s focal point for cyber critical infrastructure protection to develop a strategic analysis and warning capability for addressing cyber attacks. 10 Specifically, we recommended that responsible executive branch officials and agencies establish a capability for strategic analysis of computer-based threats, including developing a methodology, acquiring expertise, and obtaining infrastructure data. DHS has taken steps towards addressing our recommendations. As we reported in 2005, DHS established various initiatives to enhance its analytical capabilities, including intelligence-sharing through US-CERT and situational awareness tools through the US-CERT Einstein program at selected federal agencies. The Einstein program provides an automated process for collecting, correlating, analyzing, and sharing computer security information across the federal civilian government. Einstein is 9 GAO, Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities, GAO (Washington, D.C.: May 26, 2005). 10 GAO, Critical Infrastructure Protection: DHS Leadership Needed to Enhance Cybersecurity, GAO T (Washington, D.C.: Sept. 13, 2006). Page 11
14 currently deployed to nine federal agencies; US-CERT plans to deploy Einstein to an additional 10 to 15 agencies in fiscal year 2008, with a goal of deploying it to all cabinet level and critical independent federal agencies. According to DHS officials, Einstein has greatly reduced the time for the federal government to gather and share critical data on computer security risks (from 5 to 7 days to 4 to 5 hours). Further, the officials stated that Einstein has the potential to reduce data collection and information sharing to under 2 hours, allowing for vast improvements in governmental cyber response and recovery times. If properly implemented and expanded as planned, DHS s efforts in this program could strengthen its cyber threat analysis and warning capability. However, DHS has not yet fully implemented our original recommendations, particularly in implementing such a capability beyond the federal environment. In summary, although agencies report increased compliance with security program activities required by FISMA and federal policy, serious weaknesses persist at federal agencies, and reported incidents are rising. The weaknesses exist, in part, because agencies have not fully implemented their information security programs. Until such programs are fully implemented, agencies will be at increased risk of exposure to cyber attacks. As agencies report record numbers of incidents, inconsistencies in reporting persist. With continued progress in addressing strategic analysis and warning, DHS s US-CERT can help agencies mitigate the risk associated with incidents. Mr. Chairman, this concludes our statement. We would be happy to answer any questions at this time. Contacts and Acknowledgements If you have any questions regarding this report, please contact Gregory C. Wilshusen at (202) or [email protected], or David A. Powner at (202) or [email protected]. Page 12
15 Other key contributors to this report include Scott Borre, Barbara Collier, Larry Crosland, Mike Gilmore, Min Hyun, Jeffrey Knott, Jayne Wilson, and Eric Winter. (310594) Page 13
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies
United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION
FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
GAO INFORMATION SECURITY. FBI Needs to Address Weaknesses in Critical Network
GAO United States Government Accountability Office Report to the Honorable F. James Sensenbrenner Jr., House of Representatives April 2007 INFORMATION SECURITY FBI Needs to Address Weaknesses in Critical
GAO. INFORMATION SECURITY Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing
GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, July 1, 2010 United States Government Accountability Office Testimony Before the Committee on Oversight and Government Reform and Its Subcommittee
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
a GAO-05-700 GAO INFORMATION SECURITY Department of Homeland Security Needs to Fully Implement Its Security Program
GAO United States Government Accountability Office Report to the Ranking Minority Member, Committee on Homeland Security and Governmental Affairs, U.S. Senate June 2005 INFORMATION SECURITY Department
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks
GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2014 May 19, 2015 14-01820-355 ACRONYMS CRISP
NASA OFFICE OF INSPECTOR GENERAL
NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.C. 20546-0001 April 14, 2016 TO: SUBJECT: Renee P. Wynn Chief Information Officer Final Memorandum, Review of NASA
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2010 INFORMATION SECURITY Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing GAO-10-513
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
Chairman Johnson, Ranking Member Carper, and Members of the committee:
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Treasury Inspector General for Tax Administration Federal Information Security Management Act Report October 27, 2009 Reference Number: 2010-20-004 This
Department of Homeland Security
for the Immigration and Customs Enforcement Component of the FY 2013 Department of Homeland Security s Financial Statement Audit OIG-14-85 April 2014 OFFICE OF INSPECTOR GENERAL Department of Homeland
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
March 17, 2015 OIG-15-43
Information Technology Management Letter for the U.S. Citizenship and Immigration Services Component of the FY 2014 Department of Homeland Security Financial Statement Audit March 17, 2015 OIG-15-43 HIGHLIGHTS
REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013 Inquiries about this report may be addressed
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
CRS Report for Congress
Order Code RL33612 CRS Report for Congress Received through the CRS Web Department of Veterans Affairs: Information Security and Information Technology Management Reorganization August 14, 2006 Sidath
GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.
GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected
Department of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General
GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination
GAO November 2011 United States Government Accountability Office Report to the Chairman, Subcommittee on Immigration, Refugees, and Border Security, Committee on the Judiciary U.S. Senate CYBERSECURITY
AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS
SEPTEMBER 14, 2010 AUDIT REPORT OFFICE OF AUDITS AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Privacy Impact Assessment EINSTEIN Program
Privacy Impact Assessment EINSTEIN Program Collecting, Analyzing, and Sharing Computer Security Information Across the Federal Civilian Government Department of Homeland Security National Cyber Security
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Department of Homeland Security
Implementation Status of EINSTEIN 3 Accelerated OIG-14-52 March 2014 Washington, DC 20528 / www.oig.dhs.gov March 24, 2014 MEMORANDUM FOR: FROM: SUBJECT: Bobbie Stempfley Acting Assistant Secretary Office
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Standard Database Security Configurations Are Adequate, Although Much Work Is Needed to Ensure Proper Implementation August 22, 2007 Reference Number:
How To Improve Nasa'S Security
DECEMBER 5, 2011 AUDIT REPORT OFFICE OF AUDITS NASA FACES SIGNIFICANT CHALLENGES IN TRANSITIONING TO A CONTINUOUS MONITORING APPROACH FOR ITS INFORMATION TECHNOLOGY SYSTEMS OFFICE OF INSPECTOR GENERAL
GAO Information Security Issues
GAO Information Security Issues Presented to: Federal Audit Executive Council April 18, 2012 1 Agenda Snapshots of Federal Information Security Highlights of Selected GAO Reports GAO Focus Areas List of
INFORMATION SECURITY. SEC Needs to Improve Controls over Financial Systems and Data
United States Government Accountability Office Report to the Chair, U.S. Securities and Exchange Commission April 2014 INFORMATION SECURITY SEC Needs to Improve Controls over Financial Systems and Data
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Office of Inspector General Audit Report
Office of Inspector General Audit Report USMMA SECURITY CONTROLS WERE NOT SUFFICIENT TO PROTECT SENSITIVE DATA FROM UNAUTHORIZED ACCESS Maritime Administration Report Number: FI-2012-138 Date Issued: May
