OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT
|
|
|
- Loraine Haynes
- 10 years ago
- Views:
Transcription
1 County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor: Franco D. Lopez, CPA, CIA, CISA Auditor I: Wasim M. Akand Report No. A January 2014
2 Intentionally Left Blank
3
4 INTRODUCTION Audit Objective The Office of Audits & Advisory Services (OAAS) completed an audit of SharePoint Security. The objective of the audit was to assess the design and operating effectiveness of SharePoint security controls in areas including, but not limited to Health and Human Services Agency s (HHSA): Governance & Management Oversight Monitoring Configuration & Content Management Background SharePoint is a Microsoft platform that allows organizations to provide sharing and retention of data in various forms. The SharePoint platform provides users an environment to: Manage content and business processes. Discuss ideas and review documents or proposals. Coordinate projects, calendars, and schedules. Find and share information across business boundaries. Enable informed decisions. In the County, SharePoint implementations are decentralized by department. Using the Insite, Collaboration or Application modules, departments can create, manage, and build sites within SharePoint to meet their business needs. Departments are responsible for ensuring their SharePoint environments are maintained in accordance with the SharePoint Management Plan and relevant County policies. HP Enterprise Services (HP) maintains the SharePoint infrastructure, while the County Technology Office (CTO) is the technical owner of the environment. Group Leads are assigned to each County Group and act as a liaison between the CTO and County departments. Within HHSA, Group Leads also take on the role of Site Administrator for all sites within the Agency, assigning Site Owner account privileges to sites and sub-sites as appropriate. Site Owner privileges allow users to create sites and maintain appropriate user access. According to ISACA, decentralized implementation provides more challenges to the effective and secure controls over content; requiring a focus on governance practices, policy and guideline communications with the users, and a managerial monitoring activity to assure compliance with governance requirements. 1 Audit Scope & Limitations The scope of the audit focused on evaluating the adequacy of HHSA s SharePoint security controls from April to June This included reviewing technical configurations and the application of Countywide standards that affect SharePoint security for all County users. OAAS 1 ISACA Microsoft SharePoint 2010 Audit/Assurance Program 1
5 also based their assessment on recommended IT controls from the IT Governance Institute s Control Objectives for Information and related Technology 4.1 (COBIT). This audit was conducted in conformance with the International Standards for the Professional Practice of Internal Auditing prescribed by the Institute of Internal Auditors as required by California Government Code, Section Methodology OAAS performed the audit using the following methods: Reviewed SharePoint enterprise objectives and guiding principles. Reviewed HHSA policies and interviewed stakeholders. Reviewed site monitoring and content controls of sampled sites. Reviewed if privileged accounts are appropriately configured and assigned to minimize unauthorized access. Ensured site security controls are established to protect the integrity of SharePoint site content. AUDIT RESULTS Summary Within the scope of the audit, the design and operating effectiveness of SharePoint security controls were generally adequate as applied in the HHSA SharePoint environment. Specific issues were identified in the areas of SharePoint training and privileged account management. To further strengthen current SharePoint security controls and improve control effectiveness, OAAS offers the following findings and related recommendations. Finding I: SharePoint Training Requirements Should be Enforced Out of 18 HHSA Collaboration sites identified, OAAS sampled 6 sites to evaluate the effectiveness of monitoring controls. Site Administrator and Site Owner monitoring efforts of the SharePoint Collaboration environment were adequate in areas outlined within the HHSA SharePoint policy. However, specific issues were identified in the area of training that highlight security controls which should be improved. Site Owners of the six sampled sites had not completed HHSA SharePoint required training at the time of audit. While all site owners in the sample have started taking preliminary training, none had completed all SharePoint courses required by HHSA SharePoint policy (HHSA-F-11). Additionally, four of five sub-sites tested had managers with Site Owner privileges that also had not completed required SharePoint training. 2
6 Recommendation: Finding II: To comply with policy and improve security controls, HHSA should ensure SharePoint users comply with training as outlined in policy (HHSA-F-11, Appendix C). Additionally, HHSA managers should obtain direction on the appropriate level of access they need within SharePoint. SharePoint Privileged Accounts Security Needs Improvement The SharePoint environment has local Structured Query Language (SQL) accounts with excessive elevated privileges which need to be reduced. All other SharePoint administrative accounts have gone through a role based access (RBAC) review which restricts privileged account access to the least required per HP's standard. However, at the time of review local SQL accounts had not gone through an RBAC review. HP indicated they are working on identifying individuals associated with local SQL accounts where appropriate. This effort will include determining employee role and reducing privileges to the least required for that role. The T424 Security Management Plan and COBIT 2 outline access should be granted to the users on a need-to-know basis for their job duties. Roles and responsibilities should be divided to reduce the risk of an individual having the ability to compromise a critical process. Currently, local SQL accounts have a high risk of providing account holders with the ability to compromise the SharePoint database. A compromise would not be automatically identified because monitoring of administrative accounts is not an activity currently conducted by HP. 2 Standard PO 4.11, Segregation of Duties 3
7 DEPARTMENT S RESPONSE (COUNTY TECHNOLOGY OFFICE) 4
8 5
9 DEPARTMENT S RESPONSE (HEALTH AND HUMAN SERVICES AGENCY) 6
10 7
11 8
OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT Chief of Audits: Juan R. Perez Senior Audit Manager:
OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
COMPUTER OPERATIONS - BACKUP AND RESTORATION
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES COMPUTER OPERATIONS - BACKUP AND RESTORATION FINAL AUDIT REPORT Chief of Audits: Julie Nieminski, CPA, CIA, CFE, CISA, MPA
OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,
OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA,
COMPUTER OPERATIONS AUDIT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES COMPUTER OPERATIONS AUDIT FINAL AUDIT REPORT Chief of Audits: James L. Pelletier, CIA, CICA IT Audit Manager: Lynne Prizzia,
OFFICE OF AUDITS & ADVISORY SERVICES BEHAVIORAL HEALTH SERVICES CONTRACT MONITORING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES BEHAVIORAL HEALTH SERVICES CONTRACT MONITORING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Laura R.
AUDITOR GENERAL WILLIAM O. MONROE, CPA
AUDITOR GENERAL WILLIAM O. MONROE, CPA HILLSBOROUGH COUNTY DISTRICT SCHOOL BOARD LAWSON FINANCIALS MODULE Information Technology Audit SUMMARY To support its financial management needs, the Hillsborough
Performance Audit of the San Diego Convention Center s Information Technology Infrastructure JULY 2012
Performance Audit of the San Diego Convention Center s Information Technology Infrastructure JULY 2012 Audit Report Office of the City Auditor City of San Diego This Page Intentionally Left Blank July
Database Security and Auditing
Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit
Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452
Mecklenburg County Department of Internal Audit PeopleSoft Application Security Audit Report 1452 February 9, 2015 Internal Audit s Mission Through open communication, professionalism, expertise and trust,
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
Agenda Item: 7.6 Prepared by: Mark Majek, Kathy Thomas, Deborah Bell, Tamara Cowen and Jaye Stepp Meeting Date: October 2014
Agenda Item: 7.6 Prepared by: Mark Majek, Kathy Thomas, Deborah Bell, Tamara Cowen and Jaye Stepp Meeting Date: October 2014 Summary of Request: The purpose, authority, and responsibility of the internal
IS Audit and Assurance Guideline 2402 Follow-up Activities
IS Audit and Assurance Guideline 2402 Activities The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
Department of Public Utilities Customer Information System (BANNER)
REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Sarbanes-Oxley Control Transformation Through Automation
Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 [email protected]
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Internal Audit Department NeighborWorks America. Audit Review of Database Administration and Controls
Department NeighborWorks America Audit Review of Database Administration and Controls Project Number: IM.DATADMN.2013 Audit Review of Database Administration and Controls Table of Contents Project Completion
Information Technology Operational Audit DEPARTMENT OF STATE. Florida Voter Registration System (FVRS) Report No. 2016-002 July 2015
July 2015 Information Technology Operational Audit DEPARTMENT OF STATE Florida Voter Registration System (FVRS) Sherrill F. Norman, CPA Auditor General Secretary of State Section 20.10, Florida Statutes,
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
AUDIT OF THE HUMAN RESOURCES PROCESS
April 25, 2011 Texas Water Development Board Internal Audit Lawrence C. Gambone, CPA Gilbert W. Mokry, Jr., CPA, CFE Shari Daffern, CPA, CIA, CFE KEY POINTS OF INTEREST Overall Conclusion In September
AUDIT LOGGING/LOG MANAGEMENT
1 AUDIT LOGGING/LOG MANAGEMENT KATHLEEN A MULLIN, MBA, CIA, CISA, CISSP, ISA, CISM, CRISC, CGEIT DIRECTOR OF IT SECURITY/CISO HEALTHPLAN SERVICES (HPS) AHIA 31 st Annual Conference August 26-29, 2012 Philadelphia
CITY OF SAN ANTONIO OFFICE OF THE CITY AUDITOR. Audit of Customer Service/311. CRM System. Project No. AU12-020. April 15, 2013
CITY OF SAN ANTONIO OFFICE OF THE CITY AUDITOR Audit of Customer Service/311 CRM System Project No. AU12-020 April 15, 2013 Kevin W. Barthold, CPA, CIA, CISA City Auditor Executive Summary As part of our
Feature. Auditing SQL Server Databases Using CAATs
Feature Ian Cooke, CISA, CGEIT, CRISC, COBIT Foundation, CFE, CPTS, DipFM, ITIL-F, Six Sigma Green Belt, is an IT audit manager based in Dublin, Ireland, with more than 25 years of experience in all aspects
Citywide Identity Management Follow up Report
Citywide Identity Management Follow up Report July 2015 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of Denver
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
INTERNAL AUDIT DIVISION CLERK OF THE CIRCUIT COURT
INTERNAL AUDIT DIVISION CLERK OF THE CIRCUIT COURT FOLLOW UP REVIEW TO AUDIT OF COURTROOM AUTOMATION Karleen F. De Blaker Clerk of the Circuit Court Ex officio County Auditor Robert W. Melton, CPA*, CIA,
Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014
Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication
INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION
INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION Report No.: 2015-ITA-017 November 2015 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR
INFORMATION SECURITY Humboldt State University
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of
Big Data: Impact, Benefits, Risk and Governance
Big Data: Impact, Benefits, Risk and Governance Urs Fischer, CPA (Swiss), CRISC, CISA, CIA Fischer IT GRC Consulting & Training Urs Fischer Agenda 1. Introduction 2. Impact on the Enterprise 3. Business
Comptroller of Public Accounts Effectiveness of Internal Engagement May 1997
Table of Contents Comptroller of Public Accounts Effectiveness of Internal Engagement May 1997 Overall Conclusion...1 The Internal Audit Department Is Currently Effective in All Eight Criteria, But Could
MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE
MANAGEMENT AUDIT REPORT OF ACCOUNTS PAYABLE REPORT NO. 04-108 CITY OF ALBUQUERQUE OFFICE OF INTERNAL AUDIT AND INVESTIGATIONS of Accounts Payable Report No. 04-108 Executive Summary Background The Department
Distribution: Sheryl L. Sculley, City Manager Erik Walsh, Deputy City Manager Ben Gorzell, Chief Financial Officer Charles N. Hood, Fire Chief Martha
Distribution: Sheryl L. Sculley, City Manager Erik Walsh, Deputy City Manager Ben Gorzell, Chief Financial Officer Charles N. Hood, Fire Chief Martha Sepeda, Acting City Attorney Leticia M. Vacek, City
J u n e 2 0 1 0. N a t i o n a l R e s e a r c h C o u n c i l C a n a d a. I n t e r n a l A u d i t, N R C. Audit of Risk Management.
N a t i o n a l R e s e a r c h C o u n c i l C a n a d a Audit of Risk Management I n t e r n a l A u d i t, N R C J u n e 2 0 1 0 June 2010 i 1.0 Executive Summary and Conclusion Background This audit
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica
G11 EFFECT OF PERVASIVE IS CONTROLS
IS AUDITING GUIDELINE G11 EFFECT OF PERVASIVE IS CONTROLS The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically
Oracle E-Business Suite Controls: Application Security Best Practices
Table of Contents Table of Contents vi Acknowledgements 1 Foreword 2 What Makes This Book Different 3 Who Should Read this Book 3 Organization of this Book 4 Chapter 1: Introduction 5 Chapter 2: Introduction
Mecklenburg County Department of Internal Audit. Business Support Services Agency Fuelman Gas Card Investigation Follow-Up Audit Report 1467
Mecklenburg County Department of Internal Audit Business Support Services Agency Fuelman Gas Card Investigation Follow-Up Audit Report 1467 February 25, 2014 Internal Audit s Mission Through open communication,
FEDERAL FAMILY EDUCATION LOAN PROGRAM (FFELP) SYSTEM
REPORT NO. 2015-007 AUGUST 2014 DEPARTMENT OF EDUCATION FEDERAL FAMILY EDUCATION LOAN PROGRAM (FFELP) SYSTEM Information Technology Operational Audit DEPARTMENT OF EDUCATION Pursuant to Article IX, Section
June 2008 Report No. 08-037. An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs
John Keel, CPA State Auditor An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs Report No. 08-037 An Audit Report on The Texas Education Agency s Oversight
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications
Risk-Based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA Webinar Logistics Hide and unhide the Webinar
Major IT Projects: Continue Expanding Oversight and Strengthen Accountability
Secretary of State Audit Report Jeanne P. Atkins, Secretary of State Gary Blackmer, Director, Audits Division Major IT Projects: Continue Expanding Oversight and Strengthen Accountability Summary Information
How quality assurance reviews can strengthen the strategic value of internal auditing*
How quality assurance reviews can strengthen the strategic value of internal auditing* PwC Advisory Internal Audit Table of Contents Situation Pg. 02 In response to an increased focus on effective governance,
Oracle E-Business Suite: SQL Forms Risks and. Presented by: Jeffrey T. Hare, CPA CISA CIA
Oracle E-Business Suite: SQL Forms Risks and Controls Presented by: Jeffrey T. Hare, CPA CISA CIA Presentation Agenda Overview: Introductions Overall system risks Audit Trails Change Management Implementation
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning
IS Audit and Assurance Guideline 2202 Risk Assessment in Planning The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards
September 2011 Report No. 12-002
John Keel, CPA State Auditor An Audit Report on The Criminal Justice Information System at the Department of Public Safety and the Texas Department of Criminal Justice Report No. 12-002 An Audit Report
Auditors Need to Know June 13th, 2012. ISACA COBIT 5 for Assurance
COBIT 5 What s New, What Auditors Need to Know June 13th, 2012 Anthony Noble Viacom Inc. ISACA COBIT 5 for Assurance Task Force Chair Special thanks to Derek Oliver & ISACA for supplying material for this
Health and Human. Services. Commission. InternalAutht Division. Internal Audit Plan. Fiscal Year 2016
x Health and Human Services, Commission InternalAutht Division Internal Audit Plan Fiscal Year 2016 September 22, 2015 NicolE Guerrero, MBA, CIA, CGAP DiredQgof Internal Audit Chris Traylor Executive Commissioner
4-07-20 Introduction to the ISO 9000 Quality Standard William E. Perry
4-07-20 Introduction to the ISO 9000 Quality Standard William E. Perry Payoff Organizations developing software or contracting for its development may need to comply with ISO 9000, a quality standard published
KAREN E. RUSHING. AUDIT OF Human Capital Management System (HCMS) Application Controls
KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller AUDIT OF Human Capital Management System (HCMS) Application Controls Audit Services Karen E. Rushing Clerk of the Circuit Court and County
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
