AUDIT REPORT. Audit of NRC s Communications Security Program. OIG-14-A-21 September 29, 2014
|
|
|
- Elmer Baldwin
- 9 years ago
- Views:
Transcription
1 AUDIT REPORT Audit of NRC s Communications Security Program OIG-14-A-21 September 29, 2014 All publicly available OIG reports (including this report) are accessible through NRC s Web site at:
2 UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C OFFICE OF THE INSPECTOR GENERAL September 29, 2014 MEMORANDUM TO: Mark A. Satorius Executive Director for Operations FROM: Stephen D. Dingbaum /RA/ Assistant Inspector General for Audits SUBJECT: AUDIT OF NRC S COMMUNICATIONS SECURITY PROGRAM (OIG-14-A-21) Attached is the Office of the Inspector General s (OIG) audit report titled Audit of NRC s Communications Security Program. The report presents the results of the subject audit. Following the September 17, 2014, exit conference, agency staff indicated that they had no formal comments for inclusion in this report. Please provide information on actions taken or planned on each of the recommendations within 30 days of the date of this memorandum. Actions taken or planned are subject to OIG followup as stated in Management Directive 6.1. We appreciate the cooperation extended to us by members of your staff during the audit. If you have any questions or comments about our report, please contact me at or Beth Serepca, Team Leader, at Attachment: As stated cc: M. Galloway, OEDO K. Brock, OEDO J. Arildsen, OEDO C. Jaegers, OEDO RidsEdoMailCenter
3 EXECUTIVE SUMMARY BACKGROUND Nuclear Regulatory Commission (NRC) facilities are equipped with communications security (COMSEC) 1 equipment to facilitate communication of classified and sensitive unclassified information during routine and emergency operations. COMSEC equipment is designed to protect information while it is being transmitted by telephone, cable, microwave, satellite, or any other means. This includes, but is not limited to, keying materials, 2 equipment, devices, documents, and firmware or software that embodies or describes cryptographic logic or performs COMSEC functions. Examples of COMSEC equipment include a key processor, in-line encryptor (data), and a Secure Terminal Equipment (STE) 3 phone (voice). Information and material that are designated and marked as containing classified and/or sensitive unclassified information are made available only to appropriately cleared personnel who have a legitimate need-to-know. COMSEC Program at NRC COMSEC equipment at NRC is used to communicate sensitive and classified information and is a vital link for secure communication. NRC headquarters, region offices, and resident inspectors use a mix of classified and unclassified COMSEC equipment. As of August 2014, NRC had 696 COMSEC items in its inventory. In Fiscal Year 2013 (the most current year for which data were available during this audit), NRC spent $3,622,500 on classified information systems, which included COMSEC equipment. 1 COMSEC is a technical term used in the Federal Government to describe material and equipment designed to secure or authenticate telecommunications. COMSEC is used to protect both classified and unclassified traffic on Government and military communications networks, including voice, video, and data. Specific encryption criteria vary depending on information's sensitivity. 2 Keying materials contain an algorithm used to convert information from plain text to cipher text (encrypt) and convert the information from cipher text (encrypt) to plain text (decrypt). 3 A STE consists of a host terminal and a removable security core. The host terminal is the STE, which provides the application hardware and software. The security core is the crypto card, which provides all the security services. i
4 COMSEC Responsibilities The Office of Nuclear Security and Incident Response is responsible for communicating policy and procedural information to the regions and making sure the regions are conforming to Federal policy. Each region has at least one COMSEC custodian and one alternative person; they are responsible for COMSEC items at resident inspector offices both nuclear power plants and fuel cycle facilities and for supporting resident inspector staff with equipment or network problems. The resident inspector staff are not custodians, but rather end users; thus, custodian responsibilities fall on the regional office COMSEC custodians. OBJECTIVE The audit objective was to determine whether NRC staff manage COMSEC systems in accordance with NRC and Federal Government COMSEC policies. RESULTS IN BRIEF The Office of the Inspector General evaluated NRC staff s management of the COMSEC program in accordance with Federal and agency policies. Based on this work, auditors did not identify instances where staff mismanaged the COMSEC program, or classified and sensitive information was disclosed to unauthorized personnel. However, opportunities exist to improve the COMSEC emergency plans and management of equipment maintenance contracting. COMSEC Emergency Plans Are Not Consistently Updated and Communicated to Staff Federal Government COMSEC policy states that emergency plans must be documented and maintained, and that staff must be aware of plans for the accounting and protection of COMSEC materials during emergencies. NRC has not fully complied with Federal Government COMSEC emergency planning requirements. This occurs because of inconsistent management emphasis on updating plans and informing personnel of their ii
5 responsibilities. As a result, NRC staff who manage and use COMSEC equipment may not be prepared to uphold their COMSEC responsibilities during emergency situations such as natural disasters or hostile actions against their facilities. Inadequate Maintenance Support Causes High Malfunction Rates for Secure Fax Machines Federal and NRC guidance provides criteria for procurement and resource management that emphasizes efficient and effective resource use. Although NRC has a contract in place for secure fax maintenance, auditors observed a 60-percent malfunction rate across the agency s inventory of secure fax machines. The high malfunction rates of NRC s secure fax machines are attributable to a lack of performance-based contract terms that reflect the agency s equipment readiness requirements. While no NRC staff faced immediate harm because of malfunctioning secure fax machines, the quarterly testing and compensating maintenance work performed by staff on these machines is an inefficient use of agency resources. RECOMMENDATIONS This report makes recommendations to enhance the management of NRC s COMSEC program. A list of these recommendations appears on page 11 of this report. AGENCY COMMENTS An exit conference was held with the agency on September 17, Prior to this meeting, after reviewing a discussion draft, agency management provided supplemental information that has been incorporated into this report, as appropriate. As a result, agency management stated their general agreement with the findings and recommendations in this report and opted not to provide formal comments for inclusion in this report. iii
6 ABBREVIATIONS AND ACRONYMS COMSEC CNSS CSS EKMS MD NRC NSA OIG STE Communications Security Committee on National Security Systems Central Security Service Electronic Key Management System Management Directive Nuclear Regulatory Commission National Security Agency Office of the Inspector General Secure Terminal Equipment iv
7 TABLE OF CONTENTS EXECUTIVE SUMMARY... i ABBREVIATIONS AND ACRONYNMS... iv I. BACKGROUND... 1 II. OBJECTIVE... 3 III. FINDINGS... 4 A. COMSEC Emergency Plans Are Not Consistently Updated and Communicated to Staff... 4 B. Inadequate Maintenance Support Causes High Malfunction Rates for Secure Fax Machines... 7 IV. CONSOLIDATED LIST OF RECOMMENDATIONS V. AGENCY COMMENTS APPENDIXES A. OBJECTIVE, SCOPE, AND METHODOLOGY v
8 I. BACKGROUND Nuclear Regulatory Commission (NRC) facilities are equipped with communications security (COMSEC) 4 equipment to facilitate communication of classified and sensitive unclassified information during routine and emergency operations. COMSEC equipment is designed to protect information while it is being transmitted by telephone, cable, microwave, satellite, or any other means. This includes, but is not limited to, keying materials, 5 equipment, devices, documents, and firmware or software that embodies or describes cryptographic logic or performs COMSEC functions. Examples of COMSEC equipment include a key processor, in-line encryptor (data), and a Secure Terminal Equipment (STE) 6 phone (voice). Information and material that are designated and marked as containing classified and/or sensitive unclassified information are made available only to appropriately cleared personnel who have a legitimate need-to-know. Figure 1 Examples of COMSEC Equipment. Source: NRC 4 COMSEC is a technical term used in the Federal Government to describe material and equipment designed to secure or authenticate telecommunications. COMSEC is used to protect both classified and unclassified traffic on Government and military communications networks, including voice, video, and data. Specific encryption criteria vary depending on information's sensitivity. 5 Keying materials contain an algorithm used to convert information from plain text to cipher text (encrypt) and convert the information from cipher text (encrypt) to plain text (decrypt). 6 A STE consists of a host terminal and a removable security core. The host terminal is the STE, which provides the application hardware and software. The security core is the crypto card, which provides all the security services. 1
9 Controlled Cryptographic Item is a National Security Agency (NSA) term for secure telecommunications or information handling equipment, associated cryptographic component, or other hardware items that perform a critical COMSEC function. The Electronic Key Management System (EKMS) is an NSA program responsible for COMSEC key management, accounting, and distribution. EKMS performs account registration, privilege management, ordering, distribution, and accounting to direct the management and distribution of physical COMSEC materials. NRC is currently in process of upgrading EKMS to a newer version. COMSEC Guidance The Committee on National Security Systems (CNSS), which is led by the Department of Defense, sets guidance on Federal Government COMSEC standards. CNSS guidance 7 prescribes the minimum standards, processes, and procedures for the routine destruction and emergency protection of COMSEC. U.S. Government departments, agencies, and military services may impose more stringent standards or requirements; however, the standards set forth in this instruction cannot be diminished. NRC adheres to CNSS instructions and standards related to the routine destruction and emergency protection of COMSEC. COMSEC Program at NRC COMSEC equipment at NRC is used to communicate sensitive and classified information and is a vital link for secure communications. NRC headquarters, regional offices, and resident inspectors use a mix of classified and unclassified COMSEC equipment. According to NRC guidance, one goal of the agency s cyber security program 8 is to ensure that COMSEC and classified systems comply with CNSS security requirements. NSA/Central Security Service (CSS) Policy Manual No. 3-16, Control of Communications Security (COMSEC) Material, and NRC Management Directive (MD) 12.4, NRC Telecommunications Systems Security Program, are the primary NRC guidance documents. 7 CNSS Instruction No , DESTRUCTION AND EMERGENCY PROTECTION PROCEDURES FOR COMSEC AND CLASSIFIED MATERIAL. 8 NRC Management Directive (MD) 12.5, NRC Cyber Security Program. 2
10 As of August 2014, NRC had 696 COMSEC items in its inventory. In Fiscal Year 2013 (the most current year for which data were available during this audit), NRC spent $3,622,500 on classified information systems, which included COMSEC equipment. COMSEC Responsibilities The Office of Nuclear Security and Incident Response is responsible for communicating policy and procedural information to the regions and making sure the regions are conforming to CNSS policy. Each region has at least one COMSEC custodian and one alternate; they are responsible for COMSEC items at resident inspector offices both nuclear power plants and fuel cycle facilities and for supporting resident inspector staff with equipment or network problems. The resident inspector staff are not custodians, but rather end users; thus, custodian responsibilities fall on the regional office COMSEC custodians. COMSEC custodians are responsible for the receipt, custody, issue, safeguarding, accounting for, and, when necessary, destruction of COMSEC material. 9 In addition, they are responsible for the maintenance of up-to-date records and submission of all required accounting reports. There are a number of COMSEC related tasks and responsibilities that require time in addition to other information technology support duties at the regional office. These duties include quarterly STE function and secure fax testing at each of the resident inspector sites, semiannual inventory checks, data calls with resident inspector sites and the regional office, and encryption keys that must be updated. II. OBJECTIVE The audit objective was to determine whether NRC staff manage COMSEC systems in accordance with NRC and Federal Government COMSEC policies. Appendix A contains information on the audit scope and methodology. 9 Under certain circumstances, end-users are also responsible for destruction of COMSEC material. 3
11 III. FINDINGS The Office of the Inspector General (OIG) evaluated NRC staff s management of the COMSEC program in accordance with Federal and agency policies. Based on this work, auditors did not identify instances where staff mismanaged the COMSEC program, or classified and sensitive information was disclosed to unauthorized personnel. However, opportunities exist to improve the COMSEC emergency plans and management of equipment maintenance contracting. A. COMSEC Emergency Plans Are Not Consistently Updated and Communicated to Staff Federal Government COMSEC policy states that emergency plans must be documented and maintained, and that staff must be aware of plans for the accounting and protection of COMSEC materials during emergencies. NRC has not fully complied with Federal Government COMSEC emergency planning requirements. This occurs because of inconsistent management emphasis on updating plans and informing personnel of their responsibilities. As a result, NRC staff who manage and use COMSEC equipment may not be prepared to uphold their COMSEC responsibilities during emergency situations such as natural disasters or hostile actions against their facilities. Federal Policy Requires Updating and Disseminating COMSEC Emergency Plans Federal Government COMSEC policies require agencies that hold COMSEC material to maintain a current, written emergency plan appropriate for natural disasters (e.g., hurricanes in the South, tornados or floods in the Midwest, wild fires in the West) likely to occur in their location, and hostile actions (such as an enemy or terrorist attack, mob action, or civil uprising) against their facilities. Furthermore, all emergency plans are required to be reviewed annually and updated as necessary, and all authorized personnel at the facility must be aware of the existence of the plan NSA/CSS Policy Manual No
12 In addition, NRC s primary internal guidance for COMSEC program, MD 12.4, NRC Telecommunications Systems Security Program, states that each organization holding classified COMSEC material must maintain a current, written emergency plan for the protection of this material during emergencies. 11 NRC s management is responsible for developing internal controls such as a current, written emergency plan, procedures, and practices to fit the agency s operations and help staff understand and carry out their responsibilities. Plans are necessary so that staff know how to react during an emergency. Emergency plans for natural disasters, for example, must provide preparedness procedures such as procedures for receiving first responders, securing and removal of COMSEC materials, assessment and reporting, and post-emergency inventory. Hostile actions plans must provide preparedness procedures such as threat assessment, physical security availability and adequacy, and facilities for implementing emergency evacuation. NRC Compliance with Federal and Agency s Emergency Plans Requirement Inconsistent NRC is not consistently complying with Federal Government COMSEC emergency planning requirements. OIG visited 13 facilities including all 4 regional offices, agency headquarters, and resident inspector offices at nuclear power plants. Among these sites, only six sites maintained current emergency plan action procedures. For those offices that had plans, the plans ranged from a verbal description of the process to various types of documents including office instructions, plant and personnel safety procedures, and/or agencywide equipment destruction procedures that did not include specific information needed to safeguard and control COMSEC materials against natural disasters or hostile actions against their facilities. The remaining seven offices reported having no relevant guidance for emergency plans and procedures. Other guidance referenced instructions for transferring and decommissioning of COMSEC equipment; however, procedures such as preparedness planning for natural disasters/accidental emergency, 11 MD 12.4 was last issued in 1999, but was undergoing revision during this audit. 5
13 planning for hostile actions, and post emergency procedures were not addressed in their instructions. COMSEC Emergency Plans Not Consistently Updated and Communicated NRC is not consistently complying with COMSEC emergency planning requirements because of inconsistent management emphasis on updating plans and informing personnel. In five of seven instances, when asked about emergency plans, resident inspectors stated that they did not keep such plans and were not aware of the plans. In addition, resident inspectors acknowledged that the regional offices might have such plans, but they had not been apprised of the plans. One rationale provided for the failure to update plans and inform personnel was the infrequent use of COMSEC equipment for actual emergency events. 12 Further, two resident inspectors questioned the need for such plans because the COMSEC items requiring special controls were already located in a secure location i.e., inside a nuclear power plant s protected area. 13 Other NRC staff acknowledged having COMSEC emergency plans on file, but had not informed their staff of this guidance because it had not been updated since Staff Need Updated Guidance To Perform Duties Without current COMSEC emergency plans and informed personnel, NRC staff may not appropriately perform their COMSEC protection and accountability duties during natural disasters or hostile actions against their facilities. Further, NRC, a participant in the Federal Government s COMSEC program, has a responsibility to meet the program s requirements for ensuring its staff are prepared to fulfill their COMSEC duties in emergency situations. Recommendations: OIG recommends that the Executive Director for Operations 12 COMSEC equipment at resident inspector offices is rarely used other than for testing purposes. 13 Protected areas in nuclear power plants have physical barriers and other controls designed to limit access to authorized personnel conducting official business. 6
14 1. Develop and maintain current, written emergency plans appropriate for natural disasters and hostile actions against their facilities in accordance with NSA/CSS Policy Manual No Review COMSEC emergency plans annually. 3. Include current emergency plan information and COMSEC equipment user duties with COMSEC equipment testing. B. Inadequate Maintenance Support Causes High Malfunction Rates for Secure Fax Machines Federal and NRC guidance provides criteria for procurement and resource management that emphasizes efficient and effective resource use. Although NRC has a contract in place for secure fax maintenance, auditors observed a 60-percent malfunction rate across the agency s inventory of secure fax machines. The high malfunction rates of NRC s secure fax machines are attributable to a lack of performance-based contract terms that reflect the agency s equipment readiness requirements. While no NRC staff faced immediate harm because of malfunctioning secure fax machines, the quarterly testing and compensating maintenance work performed by staff on these machines is an inefficient use of agency resources. Federal and NRC Guidance Emphasizes Efficient and Effective Resource Use Federal and NRC guidance provides criteria for procurement and resource management that emphasizes efficient and effective resource use. Government Accountability Office guidance emphasizes internal controls to help agencies meet their operational objectives through effective and efficient use of resources. Moreover, the objectives of NRC MD 11.1, NRC Acquisition of Supplies and Services, include achieving the best value for NRC's acquisition of supplies and services, and ensuring appropriate use of taxpayer funds when planning, negotiating, awarding, and administering contracts. Secure Fax Machines Have High Malfunction Rates 7
15 Although NRC has a contract in place for secure fax maintenance, there is a high malfunction rate across the agency s inventory of 90 secure fax machines. 14 Auditors reviewed secure fax test result logs from the regions and found failure rates ranging from 37 percent to 81 percent during the most recent quarterly tests. 15 One region did not provide data because its staff had suspended the required functionality tests knowing in advance that their machines would fail. Figure 2 High malfunction rate of secure fax machines from the regions. 40% Passed 60% Failed Source: OIG NRC staff has attempted to maintain secure fax machines that fail due to inoperable components using an in place maintenance contract, while also allocating some funds for new secure fax machines of a different model. As of July 24, 2014, NRC had spent a total of $63,000 for maintenance of secure fax equipment covering the period of August 2011 to December NRC recently extended the contract into the option year (starting December 2013) even though those model faxes were known to function poorly. OIG was advised that NRC could not replace all of its malfunctioning machines with a more reliable model due to limited funds. 14 Staff interviews and documentation of fax test results show a total of 43 sites tested during the first quarter of 2014; 26 sites failed the test. 15 Staff interviews and documentation of equipment test results show the fax machines have had functionality problems for several years. 8
16 Subsequent to this audit, NRC staff reportedly issued a new contract to replace malfunctioning secure fax machines at resident inspector sites. NRC Lacks Performance-Based Maintenance Support Contract for Secure Faxes The high failure rates of NRC s secure fax machines are attributable to lack of performance-based contract terms that reflect the agency s equipment readiness requirements. 16 NRC has relied on a firm-fixed price maintenance support contract worth approximately $31,000 annually to procure maintenance and support service for the 90 NRC-owned secure fax machines. Maintenance covers all parts and labor and phone technology support. The contract was renewed most recently for the December 2013 through December 2014 time period. While the contract specifies work to be performed by the vendor, it does not include performance goals such as readiness rates for NRC s secure faxes. 17 Moreover, the contract does not link vendor compensation to defined performance metrics; thus NRC pays its vendor for work regardless of the outcome of that work. 18 NRC staff acknowledged that future maintenance support contracts would benefit from more specific language about the agency s expectations, as well as performance-based terms to hold vendors accountable for meeting work quality standards. Malfunctioning Secure Faxes Result in Inefficient Resource Use and Diminished Communications Capabilities While OIG did not identify immediate harm to NRC staff resulting from malfunctioning secure fax machines, staff would not have been able to use the machines for their intended purpose to send or receive sensitive written information or graphics. Additionally, the $63,000 spent over a 16 Performance-based acquisition is the preferred method for acquiring services in the Federal Government. Under this approach, all aspects of the work and acquisition are structured around the purpose of the work to be performed (i.e., performance results or outputs) rather than the manner in which the work is to be performed. 17 Performance-based contracts are to include performance work statements or statements of objectives that describe work in terms of required results rather than how the work is to be accomplished or the number of hours to be provided. See Federal Acquisition Regulation, Subpart If appropriate, performance incentives are to correspond to performance standards set forth in the contract. See Federal Acquisition Regulation, Subpart
17 3-year period to maintain inoperable machines could have been used to support other COMSEC program needs. Furthermore, the quarterly testing and compensating maintenance work performed by staff on these machines is an inefficient use of agency resources. 19 Staff expressed concerns about the administrative burden associated with testing and reported devoting considerable time to repairing the machines or helping their colleagues repair the machines, 20 despite the fact that COMSEC custodian duties are ancillary for region-based staff tasked primarily with other duties. In addition to this burden on staff time, malfunctioning of secure faxes diminishes NRC s ability to disseminate information to staff under specific emergency conditions. Recommendation: OIG recommends that the Executive Director for Operations 4. Procure a secure fax maintenance support contract that specifies maintenance performance standards and links these standards to vendor compensation. 19 During each test, at least two staff are involved: one sending the test fax, and one confirming receipt or failure to receive the test fax. When fax machines fail, these tests can take up to an hour as the staff troubleshoot and attempt to fix malfunctions. 20 In some cases, region-based COMSEC custodians drive to nearby resident inspector sites to perform maintenance work themselves. In cases where Resident Inspector sites are located far from NRC region offices, COMSEC custodians provide maintenance support by phone. 10
18 IV. CONSOLIDATED LIST OF RECOMMENDATIONS OIG recommends that the Executive Director for Operations 1. Develop and maintain current, written emergency plans appropriate for natural disasters and hostile actions against their facilities in accordance with NSA/CSS Policy Manual No Review COMSEC emergency plans annually. 3. Include current emergency plan information and COMSEC equipment user duties with COMSEC equipment testing. 4. Procure a secure fax maintenance support contract that specifies maintenance performance standards and links these standards to vendor compensation. 11
19 V. AGENCY COMMENTS An exit conference was held with the agency on September 17, Prior to this meeting, after reviewing a discussion draft, agency management provided supplemental information that has been incorporated into this report, as appropriate. As a result, agency management stated their general agreement with the findings and recommendations in this report and opted not to provide formal comments for inclusion in this report. 12
20 OBJECTIVE, SCOPE, AND METHODOLOGY APPENDIX A OBJECTIVE SCOPE The audit objective was to determine whether NRC staff manage COMSEC systems in accordance with NRC and Federal Government COMSEC policies. The audit reviewed NRC s activities related to COMSEC with special emphasis on process and compliance with current laws. OIG performed the audit work at NRC headquarters in Rockville, Maryland; NRC regional offices; and licensee facilities from March 2014 to August Internal controls related to the audit objective were reviewed and analyzed. Throughout the audit, auditors were aware of the possibility of fraud, waste, and abuse in the program. METHODOLOGY To accomplish the audit objective, OIG reviewed and analyzed Federal Government guidance, and internal agency procedures. Guidance reviewed included the following: Government Accountability Office Standards for Internal Control in the Federal Government. National Security Agency Central Security Service Policy Manual No. 3-16, Control Of Communications Security (COMSEC) Material. Committee on National Security Systems Instruction No , Destruction and Emergency Protection Procedures for COMSEC and Classified Material. NRC Management Directive 12.4, NRC Telecommunications Systems Security Program. NRC Management Directive 12.5, NRC Cyber Security Program. 13
21 NRC Management Directive 11.1, NRC Acquisition of Supplies and Services. OIG interviewed headquarters staff, regional personnel, and resident inspectors at nuclear power plants and fuel cycle facilities to gain an understanding about COMSEC policies and procedures. Furthermore, OIG inspected COMSEC equipment at all four region offices, seven nuclear power plants, and one fuel cycle facility: Three Mile Island Nuclear Station in Middletown, PA; Salem - Hope Creek Nuclear Station in Hancock's Bridge, NJ; Braidwood Nuclear Generating Station in Braidwood, IL; Dresden Nuclear Power Plant in Morris, IL; Comanche Peak Nuclear Power Plant in Glen Rose, TX; Columbia Generating Station in Richland, WA; North Anna Power Station in Mineral, VA; and Babcock & Wilcox Nuclear Operations Group Fuel Cycle Facility in Lynchburg, VA. We selected these sites to sample commercial nuclear power reactors and fuel cycle facilities under each of the four region office jurisdictions. We conducted this performance audit in accordance with generally accepted Government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient and appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objective. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The work was conducted by Beth Serepca, Team Leader; Paul Rades, Audit Manager; Rob Woodward, Audit Manager; Neil Doherty, Senior Analyst; and Ziad Buhaissi, Senior Auditor. 14
Audit of NRC s Network Security Operations Center
Audit of NRC s Network Security Operations Center OIG-16-A-07 January 11, 2016 All publicly available OIG reports (including this report) are accessible through NRC s Web site at http://www.nrc.gov/reading-rm/doc-collections/insp-gen
Executive Director for Operations AUDIT OF NRC S CYBER SECURITY INSPECTION PROGRAM FOR NUCLEAR POWER PLANTS (OIG-14-A-15)
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 OFFICE OF THE INSPECTOR GENERAL May 7, 2014 MEMORANDUM TO: Mark A. Satorius Executive Director for Operations FROM: Stephen D. Dingbaum
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
AUDIT REPORT. Audit of NRC s Shared S Drive. OIG-11-A-15 July 27, 2011
AUDIT REPORT Audit of NRC s Shared S Drive OIG-11-A-15 July 27, 2011 All publicly available OIG reports (including this report) are accessible through NRC s Web site at: http:/www.nrc.gov/reading-rm/doc-collections/insp-gen/
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Final Evaluation Report
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF EVALUATIONS AND INSPECTIONS Final Evaluation Report EVALUATION OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT S OVERSIGHT OF THE
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Hanh Do, Director, Information System Audit Division, GAA. SUBJECT: Review of HUD s Information Technology Contingency Planning and Preparedness
Issue Date: August 31, 2006 Audit Report Number 2006-DP-0005 TO: Lisa Schlosser, Chief Information Officer, A FROM: Hanh Do, Director, Information System Audit Division, GAA SUBJECT: Review of HUD s Information
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS AND EVALUATIONS Department of Veterans Affairs Review of Alleged Lack of Access Controls for the Project Management Accountability System Dashboard May 9,
AUDIT OF SBA S COMPLIANCE WITH JOINT FINANCIAL MANAGEMENT IMPROVEMENT PROGRAM PROPERTY MANAGEMENT SYSTEM REQUIREMENTS AUDIT REPORT NUMBER 3-34
AUDIT OF SBA S COMPLIANCE WITH JOINT FINANCIAL MANAGEMENT IMPROVEMENT PROGRAM PROPERTY MANAGEMENT SYSTEM REQUIREMENTS AUDIT REPORT NUMBER 3-34 JULY 23, 2003 This report may contain proprietary information
LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC.
LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC. RNO 140000 Report No. AU 16-05 March 2016 www.oig.lsc.gov TABLE OF CONTENTS
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security
Federal Communications Commission Office of Inspector General FY 2003 Follow-up on the Audit of Web Presence Security Audit Report No. 03-AUD-09-21 October 20, 2004 TABLE OF CONTENTS Page EXECUTIVE SUMMARY
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
Five-Year Strategic Plan
U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department of Energy's Management and Use of Mobile Computing Devices and Services DOE/IG-0908 April
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Management Oversight of the Small Business/Self-Employed Division s Fuel Compliance Fleet Card Program Should Be Strengthened September 27, 2011 Reference
Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02
Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 BACKGROUND OBJECTIVES, SCOPE, AND METHODOLOGY FINDINGS INFORMATION SECURITY PROGRAM AUDIT FOLLOW-UP CATS SECURITY PROGRAM PLANNING
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
Report No. D-2010-058 May 14, 2010. Selected Controls for Information Assurance at the Defense Threat Reduction Agency
Report No. D-2010-058 May 14, 2010 Selected Controls for Information Assurance at the Defense Threat Reduction Agency Additional Copies To obtain additional copies of this report, visit the Web site of
POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS
Committee on National Security Systems CNSSP No. 7 9 December 2015 POLICY ON THE USE OF COMMERCIAL SOLUTIONS TO PROTECT NATIONAL SECURITY SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT
Navy and Marine Corps Have Weak Procurement Processes for Cost reimbursement Contract Issuance and Management
Inspector General U.S. Department of Defense Report No. DODIG-2014-092 JULY 11, 2014 Navy and Marine Corps Have Weak Procurement Processes for Cost reimbursement Contract Issuance and Management INTEGRITY
GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.
GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction
Department of Homeland Security
Implementation Status of EINSTEIN 3 Accelerated OIG-14-52 March 2014 Washington, DC 20528 / www.oig.dhs.gov March 24, 2014 MEMORANDUM FOR: FROM: SUBJECT: Bobbie Stempfley Acting Assistant Secretary Office
AUDIT REPORT. Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses DOE/IG-0920
AUDIT OF THE MACOMB COUNTY SHERIFF S OFFICE EQUITABLE SHARING PROGRAM ACTIVITIES MOUNT CLEMENS, MICHIGAN EXECUTIVE SUMMARY*
AUDIT OF THE MACOMB COUNTY SHERIFF S OFFICE EQUITABLE SHARING PROGRAM ACTIVITIES MOUNT CLEMENS, MICHIGAN EXECUTIVE SUMMARY* The Department of Justice (DOJ) Office of the Inspector General (OIG) conducted
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 7600.07 August 3, 2015 IG DoD SUBJECT: DoD Audit Manual References: See Enclosure 1 1. PURPOSE. This manual: a. Reissues DoD 7600.07-M (Reference (a)) in accordance
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
AUDIT REPORT. Materials System Inventory Management Practices at Washington River Protection Solutions
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Materials System Inventory Management Practices at Washington River Protection Solutions OAS-M-15-01
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL REVIEW OF NATIONAL CREDIT UNION ADMINISTRATION S PURCHASE AND TRAVEL CARD PROGRAMS Report #OIG-15-07 March 31, 2015 James W. Hagen Inspector
Hotline Complaint Regarding the Defense Contract Audit Agency Examination of a Contractor s Subcontract Costs
Inspector General U.S. Department of Defense Report No. DODIG-2015-061 DECEMBER 23, 2014 Hotline Complaint Regarding the Defense Contract Audit Agency Examination of a Contractor s Subcontract Costs INTEGRITY
AUDIT REPORT 12-1 8. Audit of Controls over GPO s Fleet Credit Card Program. September 28, 2012
AUDIT REPORT 12-1 8 Audit of Controls over GPO s Fleet Credit Card Program September 28, 2012 Date September 28, 2012 To Director, Acquisition Services From Inspector General Subject Audit Report Audit
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Information Security Awareness Training and Phishing
Information Security Awareness Training and Phishing Audit Report Report Number IT-AR-16-001 October 5, 2015 Highlights The Postal Service s information security awareness training related to phishing
March 2007 Report No. 07-009. FDIC s Contract Planning and Management for Business Continuity AUDIT REPORT
March 2007 Report No. 07-009 FDIC s Contract Planning and Management for Business Continuity AUDIT REPORT Report No. 07-009 March 2007 FDIC s Contract Planning and Management for Business Continuity Results
REAL PROPERTY MANAGEMENT: Applying Best Practices Can Improve Real Property Inventory Management Information
REAL PROPERTY MANAGEMENT: Applying Best Practices Can Improve Real Property Inventory Management Information Report No. OIG-A-2013-015 June 12, 2013 NATIONAL RAILROAD PASSENGER CORPORATION The Inspector
Security Requirements for Spent Fuel Storage Systems 9264
Security Requirements for Spent Fuel Storage Systems 9264 P. G. Brochman, S. R. Helton, E. A. Thompson US Nuclear Regulatory Commission 11555 Rockville Pike, M/S: T4-F25M, Rockville, MD 20852-2738 ABSTRACT
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
REVIEW OF NRC S SEPARATION-CLEARANCE PROCESS FOR EXITING STAFF AND CONTRACTORS. OIG/99A-06 July 20, 1999
REVIEW OF NRC S SEPARATION-CLEARANCE PROCESS FOR EXITING STAFF AND CONTRACTORS OIG/99A-06 July 20, 1999 July 20, 1999 MEMORANDUM TO: William D. Travers Executive Director for Operations Stewart T. Reiter
Napa County, California, Needs Additional Technical Assistance and Monitoring to Ensure Compliance with Federal Regulations
Napa County, California, Needs Additional Technical Assistance and Monitoring to Ensure Compliance with Federal Regulations OIG-15-135-D August 28, 2015 August 28, 2015 Why We Did This On August 24, 2014,
Report No. D-2011-6-008
Hotline Review June 28, 2011 Hotline Complaint Regarding a Defense Contract Audit Agency Employee Conducting Private For-Profit Tax Business Activity on Government Time and Using Government Equipment Report
The U.S. Coast Guard Travel to Obtain Health Care Program Needs Improved Policies and Better Oversight
The U.S. Coast Guard Travel to Obtain Health Care Program Needs Improved Policies and Better Oversight February 9, 2015 OIG-15-31 HIGHLIGHTS The U.S. Coast Guard Travel to Obtain Health Care Program Needs
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
State and District Monitoring of School Improvement Grant Contractors in California FINAL AUDIT REPORT
State and District Monitoring of School Improvement Grant Contractors in California FINAL AUDIT REPORT ED-OIG/A09O0009 March 2016 Our mission is to promote the efficiency, effectiveness, and integrity
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)
CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
Office of Inspector General Evaluation of the Consumer Financial Protection Bureau s Consumer Response Unit
Office of Inspector General Evaluation of the Consumer Financial Protection Bureau s Consumer Response Unit Consumer Financial Protection Bureau September 2012 September 28, 2012 MEMORANDUM TO: FROM: SUBJECT:
Audit Report OFFICE OF INSPECTOR GENERAL. Farm Credit Administra on s Personnel Security and Suitability Program A 15 04
OFFICE OF INSPECTOR GENERAL Audit Report Farm Credit Administra on s Personnel Security and Suitability Program A 15 04 Auditor in Charge Tori Kaufman Issued September 29, 2015 FARM CREDIT ADMINISTRATION
2IÀFHRI,QVSHFWRU*HQHUDO
2IÀFHRI,QVSHFWRU*HQHUDO Santa Clara Pueblo, New Mexico, Needs Assistance to Ensure Compliance with FEMA Public Assistance Grant Requirements OIG-14-128-D August 2014 Washington, DC 20528 I www.oig.dhs.gov
Audit Report OFFICE OF INSPECTOR GENERAL. Farm Credit Administration s Purchase Card Program A-14-02. Auditor-in-Charge Sonya Cerne.
OFFICE OF INSPECTOR GENERAL Audit Report Farm Credit Administration s Purchase Card Program A-14-02 Auditor-in-Charge Sonya Cerne Issued September 5, 2014 FARM CREDIT ADMINISTRATION Farm Credit Administration
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
