INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION
|
|
|
- Jared Harmon
- 10 years ago
- Views:
Transcription
1 INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION Report No.: 2015-ITA-017 November 2015
2 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR Memorandum NOV To: From: Sylvia Burns Chief Information Of Mary L. Kendall Deputy Inspector Gene \_ Subject: Inspection Report - Cloud Computing Security Documentation in the Cyber Security Assessment Management Solution Assignment No ITA-017 We inspected the completeness and adequacy of required information technology (IT) security documentation for a sample of U.S. Department of the Interior (Department) IT systems that had been moved to a public cloud. The inspection focused on: 1) whether the sampled cloud computing systems were recorded in the Cyber Security Assessment Management Solution (CSAM), and 2) if CSAM entries met Department and Federal security documentation requirements. We sampled 16 of 26 operational systems reported by the Department: 1 from the Bureau of Ocean Energy Management, 2 from the Bureau of Safety and Environmental Enforcement, 3 from the U.S. Bureau of Reclamation, and 10 from the U.S. Geological Survey. We issued three Notices of Potential Finding and Recommendations (NPFRs) and received bureau responses to our NPFRs' recommendations. Based on our findings, we are making seven recommendations to strengthen the Department's IT security program, and close identified security gaps. Please provide us with your written response to this report within 30 days. The response should provide detailed information on actions you have taken or plan to take to address each recommendation, as well as target dates and titles of the officials responsible for implementing these actions. Please address your response to: Kimberly Elmore Assistant Inspector General Office of Audits, Inspections, and Evaluations U.S. Department of the Interior Office of Inspector General Mail Stop C Street, NW. Washington, DC Office of Inspector General I Washington, DC
3 The legislation creating the Office of Inspector General requires that we report to Congress semiannually on all audit, inspection, and evaluation reports issued; actions taken to implement our recommendations; and recommendations that have not been implemented. If you have any questions regarding this report, please call me at
4 Table of Contents Results in Brief... 1 Introduction... 2 Objective... 2 Background... 2 Findings... 4 USBR s Documentation in CSAM is Incomplete... 4 USGS s Documentation in CSAM was Incomplete... 5 Cloud Computing Governance Needs Strengthening... 5 Conclusion... 7 Appendix 1: Scope and Methodology... 8 Scope... 8 Methodology... 8
5 Results in Brief We conducted this inspection to determine the completeness and adequacy of required information technology (IT) security documentation for 16 IT systems that the Bureaus of Reclamation (USBR), Safety and Environmental Enforcement (BSEE), and U.S. Geological Survey (USGS) had moved to a public Cloud. USBR and USGS did not meet the U.S. Department of the Interior s (Department s) policy for maintaining required IT security documentation. Specifically, USBR had not completed any security documentation for its three operational Cloud systems. As such, these systems were operating without authorization, placing bureau data in the Cloud potentially at risk of unauthorized access, disclosure, modification, or destruction. While we found that USGS had moved its data to the Cloud in early 2013, it had not completed necessary security documentation until late These deficiences possibly occurred because the Office of Chief Information Officer (OCIO) did not effectively oversee the bureaus to ensure that operational Cloud systems met required IT security reqirements. We make seven recommendations to OCIO and affected bureaus to strengthen oversight of the Department s IT security program and close identified security gaps. 1
6 Introduction Objective To determine if the U.S. Department of the Interior s (Department s) security documentation for Cloud computing systems was complete by determining: 1) whether the bureaus recorded their operational Cloud systems in the Cyber Security Assessment Management system 1 (CSAM), and 2) if CSAM entries met Department and Federal security documentation requirements. Background A public Cloud is a shared, Internet-accessible computing environment operated by a Cloud service provider such as Amazon or Microsoft. Cloud based IT systems have the same Federal and Department security requirements as systems managed by bureau personnel and operated by a departmental data center. As of September 2014, the Department reported it had contracted for 26 operational Cloud computer information systems. In addition, it projects significant increases in future Cloud usage, with up to 100 percent of new IT programs potentially beginning in the Cloud, and nearly all of the Department s current or legacy systems, as well as public data, likely to be moved to the Cloud. The Department s Office of the Chief Information Officer (OCIO) requires bureaus to use CSAM as its database for information systems, including Cloud computing information systems. OCIO requires that specific security documentation for each information system be placed in CSAM. 2 The documentation required includes a system s security plan, security configurations, continuous monitoring strategy, contingency plans, configuration management plan, risk assessments, plan of action with milestones, and authorization decision documents. CSAM must contain all of the Department s computer systems in order to support the annual evaluations required by the Federal Information System Management Act (FISMA). 3 Systems need to have the required security information so that system owners and authorizing officials have the relevant information to support continuous monitoring, and meet the requirements of FISMA s annual assurance statements. To help Federal agencies meet Cloud First requirements, the General Services Administration, in collaboration with several other agencies, established the Federal Risk Authorization Management Program (FedRAMP). FedRAMP helps 1 The Cyber Security Assessment Management solution is a software database system used to store the Department s computer security documentation. 2 Department of Interior, Office of Chief Information Officer Directive , Information System Boundary Assessment & Authorization Package Documentation and Inventory, March 23, The Federal Information Security Management Act (FISMA) of 2002 requires an annual, independent evaluation of agencies information security programs and practices. 2
7 agencies adopt Cloud computing technologies by (1) ensuring that Cloud providers have adequate IT security, (2) eliminating duplication of effort and reducing risk management costs, and (3) enabling rapid and cost-effective purchasing of Cloud computing services. As of June 2014, agencies are required to use only FedRAMP-approved Cloud service providers. The Department has also mandated its Cloud First policy. 4 The Department is transitioning from owning and operating its entire IT infrastructure to using Cloud services. The January 2014 Cloud First policy memorandum notes the Department s Cloud Strategy is key to transforming the Department s IT capabilities into a modern Cloud based environment. Central to this strategy is the use of a Department contracting vehicle for future IT hosting procurements. The goal is to reduce the total cost of ownership of enterprise hosting hardware, software, and IT operations; and to provide greater service, security, and end-user support. OCIO oversees bureau compliance for using CSAM. The Internal Control, Audit, and Compliance Management Division (ICACMD) in OICO is responsible for ensuring that bureaus meet Department and Federal information technology security requirements. 4 Memorandum from Chief Information Officer and Director of the Office of Acquisition and Property Management and Senior Procurement Executive, Subject: Mandatory Use Policy for the Department of the Interior Foundation Cloud Hosting Services Contracts, dated January 6,
8 Findings Of the 16 cloud computing systems we reviewed during our inspection, we found no security documentation for the 3 USBR systems, complete but not timely documentation for the 10 USGS systems, and complete and timely documentation for the 3 BOEM/BSEE systems. Not having complete and timely documentation for these cloud systems not only doesn't meet the requirements of FISMA s annual assurance statements, but places Bureau data at risk of unauthorized access, disclosure, modification, or destruction. We believe the Department's OCIO plays a key role in ensuring cloud systems compliance, and as such, needs to strengthen its oversight in this area. USBR s Documentation in CSAM is Incomplete The Bureau of Reclamation (USBR) operated three Cloud computing systems without any security documentation or records placed in CSAM. USBR security managers stated that they were unaware of these systems; consequently, they had not done proper security planning, completed required security documents, or formally authorized the systems for operation. Accordingly, USBR s Cloud computing systems could be subject to unauthorized access, modification, or undetected destruction. USBR shared one of its Cloud systems with eight other entities, including Federal, State, county, and tribal units. USBR personnel stated they were not aware of which entity had security responsibilities, or if security responsibilities were shared. FedRAMP specifies how to implement a shared Cloud computing system among several agencies. Specifically, one of the agencies acts as a sponsor and is then responsible for obtaining an authorization to operate. The other participating agencies may choose to leverage the sponsoring agency s authorization to operate, or conduct their own security assessment work. USBR s noncompliance with FedRAMP occurred because the responsible USBR officials said they had not conducted security planning and documentation, and, therefore, had not placed security documentation in CSAM as required. We issued a Notice of Potential Findings and Recommendations (NPFR) to USBR with three recommendations. USBR concurred with the recommendations that were in the NPFR and that follow. 4
9 Recommendations We recommend that USBR s Chief Information Security Officer: 1. Prepare the appropriate security documentation for existing and planned Cloud computing systems, grant authority to operate as appropriate, and ensure required documents are added to CSAM. 2. Review FedRAMP for guidance, roles, and responsibilities when multiple Federal agencies implement a shared Cloud computing service. 3. Ensure all planned and operational Cloud computing services are reported to OCIO s ICACMD. USGS s Documentation in CSAM was Incomplete USGS combined its 10 Cloud systems into one CSAM boundary 5 because of their design and use. The Cloud computing systems were operational in 2013, but USGS did not timely update CSAM with a full set of security documents until December CSAM now contains the appropriate documentation. We made one recommendation to USGS in an NPFR concerned with services reported to OCIO s ICACMD (see Recommendation 4 below). USGS concurred with this recommendation and noted that it has developed new internal processes for ensuring Cloud computing systems meet security requirements, and that it now has sufficient documentation within CSAM. Recommendation We recommend that USGS: 4. Ensure all planned and operational Cloud computing services are timely reported to OCIO s ICACMD. Cloud Computing Governance Needs Strengthening Overall, OCIO does not have adequate oversight of the Department s security documentation for Cloud systems. It is important for all departmental systems to have the required security information so that system owners and system authorizing officials can support continuous monitoring and annual assurance statements. If CSAM is incomplete, then the annual FISMA evaluation may misrepresent the status of the Department s security program. The deficiencies we identified occurred because neither the responsible bureaus nor the Department s 5 Computer security boundaries are a set of systems under a single administrative control. 5
10 officials ensured that their Cloud computing systems met Federal and Department security protocols. In particular, Department security personnel need to better understand FedRAMP s stated roles and responsibilities when collaborating with other agencies. We issued an NPFR to OCIO that contained four recommendations to help ensure bureau compliance with Federal and Department IT security requirements, and to strengthen OCIO oversight of bureau practices related to Cloud computing. OCIO concurred with two recommendations directing bureaus to update CSAM and review FedRAMP roles and responsibilities to ensure Cloud systems meet applicable IT security requirements. Based on OCIO s response to our other two preliminary recommendations, we withdrew one, which required bureaus to biannually report to OCIO all planned and operational Cloud computing systems as OCIO already requires such reporting. Finally, we reworded our last recommendation to strengthen the Department s IT governance by having OCIO reevaluate and enhance its IT security oversight practices. Recommendations We recommend that OCIO: direct responsible Bureau information technology staff to: 5. Update CSAM for all planned and operational Cloud computing systems. 6. Review specific FedRAMP roles and responsibilities for authorizing Cloud computing systems. We recommend that OCIO: 7. Direct ICACMD to reevaluate and enhance its oversight, monitoring, and testing processes, to include periodic reviews to ensure bureaus comply with OCIO Directive
11 Conclusion The bureaus need to evaluate systems to ensure they are following Federal guidelines, including FedRAMP. They have the responsibility to upload current and accurate security documentation into CSAM. OCIO needs to monitor CSAM regularly to ensure the bureaus timely upload the required security documentation. Although ICACMD oversees this area, it must improve its oversight to ensure a complete inventory is maintained. For example, our findings show that the current practice of bureau self-reporting Cloud systems is ineffective and increases the risk of unauthorized access to Department Cloud systems. In addition, the Department must keep an accurate inventory to have the required security information so that system owners and system authorizing officials have the relevant information to support continuous monitoring and, most importantly, meet the requirements of FISMA s annual assurance statements. As a result of OMB s Cloud First policy, the Department has also implemented a mandatory policy to move IT into a modern Cloud based environment. The Department s goal is to reduce the total cost of owning enterprise hosting hardware, software, and IT operations, while providing greater service, security, and end-user support. Our findings relating to deficiencies in operating Cloud systems show the need for the Department to strengthen its governance over Cloud systems to ensure that the Department meets its IT security requirements for this new paradigm. The bureaus need to improve uploading security documentation into CSAM and OCIO needs to improve its oversight of the bureaus use of CSAM. 7
12 Appendix 1: Scope and Methodology Scope We limited our inspection to a judgmental sample of 16 of the 26 operational Cloud information systems reported by the U.S. Department of the Interior. Methodology The Department s policy for using the Cyber Security Assessment Management system (CSAM) specifies that each computer system s security documentation must be posted in CSAM. 6 Required documentation includes the system s security plan, security configurations, continuous monitoring strategy, contingency plans, configuration management plan, risk assessments, plan of action with milestones, and authorization decision documents. We identified each of the sampled Cloud systems in CSAM, and looked at their documentation to assure that the documents met Federal and departmental requirements. We conducted our inspection in accordance with the Quality Standards for Inspection and Evaluation as put forth by the Council of the Inspectors General on Integrity and Efficiency. We believe that the work performed provides a reasonable basis for our conclusions and recommendations. We interviewed bureau and Department staff to determine the processes and guidance they were following. We reviewed the DOI Cloud First policy and Federal policy documentation to determine best practices. 6 Department of Interior Office of Chief Information Officer Directive , Information System Boundary Assessment & Authorization Package Documentation and Inventory, March 23,
13 Report Fraud, Waste, and Mismanagement Fraud, waste, and mismanagement in Government concern everyone: Office of Inspector General staff, departmental employees, and the general public. We actively solicit allegations of any inefficient and wasteful practices, fraud, and mismanagement related to departmental or Insular Area programs and operations. You can report allegations to us in several ways. By Internet: By Phone: 24-Hour Toll Free: Washington Metro Area: By Fax: By Mail: U.S. Department of the Interior Office of Inspector General Mail Stop 4428 MIB 1849 C Street, NW. Washington, DC 20240
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES
INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES Report No.: ISD-IS-OCIO-0001-2014 June 2014 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR Memorandum JUN 0 4 2014 To: From:
EVALUATION U.S. DEPARTMENT OF THE INTERIOR S ADOPTION OF CLOUD COMPUTING TECHNOLOGIES
EVALUATION U.S. DEPARTMENT OF THE INTERIOR S ADOPTION OF CLOUD COMPUTING TECHNOLOGIES Report No.: ISDN-EV-OCI-0002-2014 May 2015 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OFTHE INTERIOR Memorandum MAY21
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009 ISD-EV-MOA-0002-2009 Contents Acronyms and Other Reference
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
EVALUATION SECURITY OF THE U.S. DEPARTMENT OF THE INTERIOR S PUBLICLY ACCESSIBLE INFORMATION TECHNOLOGY SYSTEMS
EVALUATION SECURITY OF THE U.S. DEPARTMENT OF THE INTERIOR S PUBLICLY ACCESSIBLE INFORMATION TECHNOLOGY SYSTEMS This is a revised version of the report prepared for public release. Report No.: ISD-IN-MOA-0004-2014
INSPECTION UNITED MINE WORKERS OF AMERICA HEALTH AND RETIREMENT FUNDS (REVISED)
INSPECTION UNITED MINE WORKERS OF AMERICA HEALTH AND RETIREMENT FUNDS (REVISED) Report No.: ER-IS-OSM-0007-2013 December 2013 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR DEC 1 3 2013 Memorandum
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL. Evaluation Report. Working Capital Fund. Photos Courtesy of Microsoft Clip Art Gallery
U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Evaluation Report Working Capital Fund Photos Courtesy of Microsoft Clip Art Gallery No. 2003-I-0056 June 2003 E-IN-0SS-091-02 Memorandum United
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Department of Homeland Security
for the Immigration and Customs Enforcement Component of the FY 2013 Department of Homeland Security s Financial Statement Audit OIG-14-85 April 2014 OFFICE OF INSPECTOR GENERAL Department of Homeland
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028)
MEMORANDUM FOR KATHERINE ARCHULETA Director FROM: SUBJECT: PATRICK E. McFARLAND Inspector General Status of Cloud Computing Environments within OPM (Report No. 4A-CI-00-14-028) The purpose of this memorandum
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
March 17, 2015 OIG-15-43
Information Technology Management Letter for the U.S. Citizenship and Immigration Services Component of the FY 2014 Department of Homeland Security Financial Statement Audit March 17, 2015 OIG-15-43 HIGHLIGHTS
INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED AND MONITORED
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED
AUDIT REPORT. Federal Energy Regulatory Commission's Fiscal Year 2014 Financial Statement Audit
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Federal Energy Regulatory Commission's Fiscal Year 2014 Financial Statement Audit OAS-FS-15-05 December
OFFICE OF INSPECTOR GENERAL. Audit Report
OFFICE OF INSPECTOR GENERAL Audit Report Audit of the Data Management Application Controls and Selected General Controls in the Financial Management Integrated System Report No. 14-12 September 30, 2014
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies
United States Government Accountability Office Report to Congressional Requesters June 2014 INFORMATION SECURITY Additional Oversight Needed to Improve Programs at Small Agencies GAO-14-344 June 2014 INFORMATION
AUDIT REPORT REPORT NUMBER 14 08. Information Technology Professional Services Oracle Software March 25, 2014
AUDIT REPORT REPORT NUMBER 14 08 Information Technology Professional Services Oracle Software March 25, 2014 Date March 25, 2014 To Chief Information Officer Director, Acquisition Services From Inspector
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Internal Revenue Service September 14, 2010 Reference Number: 2010-10-115 This report has cleared the Treasury Inspector General for Tax Administration
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC.
LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC. RNO 140000 Report No. AU 16-05 March 2016 www.oig.lsc.gov TABLE OF CONTENTS
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS AND EVALUATIONS Department of Veterans Affairs Review of Alleged Lack of Access Controls for the Project Management Accountability System Dashboard May 9,
Department of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General
FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness
United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed
EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human Health and the Environment
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human
Department of Homeland Security
CBP Acquisition of Aviation Management Tracking System OIG-12-104 (Revised) August 2012 August 31, 2012 Background The (DHS) has the world s largest law enforcement aviation organization. Both U.S. Customs
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
2.0 ROLES AND RESPONSIBILITIES
2.0 ROLES AND RESPONSIBILITIES This handout describes applicable roles and responsibilities for the Capital Planning and Investment Process (CPIC) as presented in the NIST Integrating IT Security into
NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS
MARCH 18, 2013 AUDIT REPORT OFFICE OF AUDITS NASA S PROCESS FOR ACQUIRING INFORMATION TECHNOLOGY SECURITY ASSESSMENT AND MONITORING TOOLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration
ClOP CHAPTER 1351.39. Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1
ClOP CHAPTER 1351.39 Departmental Information Technology Governance Policy TABLE OF CONTENTS Section 39.1 Purpose... 1 Section 39.2 Section 39.3 Section 39.4 Section 39.5 Section 39.6 Section 39.7 Section
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process
Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2
PROCUREMENT. Actions Needed to Enhance Training and Certification Requirements for Contracting Officer Representatives OIG-12-3
PROCUREMENT Actions Needed to Enhance Training and Certification Requirements for Contracting Officer Representatives OIG-12-3 Office of Inspector General U.S. Government Accountability Office Report Highlights
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Improvements Are Needed to the Information Security Program March 11, 2008 Reference Number: 2008-20-076 This report has cleared the Treasury Inspector
Office of Audits and Evaluations Report No. AUD-13-007. The FDIC s Controls over Business Unit- Led Application Development Activities
Office of Audits and Evaluations Report No. AUD-13-007 The FDIC s Controls over Business Unit- Led Application Development Activities September 2013 Executive Summary The FDIC s Controls over Business
The United States Secret Service Has Adequate Oversight and Management of its Acquisitions (Revised)
The United States Secret Service Has Adequate Oversight and Management of its Acquisitions (Revised) February 10, 2015 OIG-15-21 HIGHLIGHTS The United States Secret Service Has Adequate Oversight and Management
DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes
United States Government Accountability Office Report to Congressional Committees July 2015 DOD BUSINESS SYSTEMS MODERNIZATION Additional Action Needed to Achieve Intended Outcomes GAO-15-627 July 2015
Department of Homeland Security
Department of Homeland Security Review of Costs Invoiced by the City of San Antonio Relating to the San Antonio International Airport Terminal B Checked Baggage Screening Project Under Other Transaction
AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS
SEPTEMBER 14, 2010 AUDIT REPORT OFFICE OF AUDITS AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space
GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.
GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers
AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks
Five-Year Strategic Plan
U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
DEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process
United States Government Accountability Office Report to Congressional Committees May 2014 DEFENSE BUSINESS SYSTEMS Further Refinements Needed to Guide the Investment Management Process GAO-14-486 May
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
How To Manage Cloud Computing In The United States Of American Agriculture
United States Department of Agriculture Office of Inspector General USDA s Implementation of Cloud Computing Services Audit Report 50501-0005-12 What Were OIG s Objectives Our objective was to evaluate
AUDIT REPORT REPORT NUMBER 14 10. Information Technology Microsoft Software Licenses March 27, 2014
AUDIT REPORT REPORT NUMBER 14 10 Information Technology Microsoft Software Licenses March 27, 2014 Date March 27, 2014 To Chief Information Officer From Inspector General Subject Audit Report Information
INTERNATIONAL TRADE ADMINISTRATION Improvements Are Needed to Strengthen ITA s Information Technology Security Program
INTERNATIONAL TRADE ADMINISTRATION Improvements Are Needed to Strengthen ITA s Information Technology Security Program FINAL REPORT NO. OIG-12-037-A SEPTEMBER 27, 2012 U.S. Department of Commerce Office
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2014 May 19, 2015 14-01820-355 ACRONYMS CRISP
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 22, 20 14
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL INFORMATION TECHNOLOGY AUDIT DIVISION September 22, 20 14 FINAL MANAGEMENT INFORMATION REPORT To: From: Subject: James W. Runcie ChiefOperating
How To Improve Mainframe Software Asset Management
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Internal Revenue Service Should Improve Mainframe Software Asset Management February 20, 2014 Reference Number: 2014-20-002 This report has cleared
DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer
DEPARTMENT OF THE INTERIOR Privacy Impact Assessment Guide Departmental Privacy Office Office of the Chief Information Officer September 30, 2014 Table of Contents INTRODUCTION... 1 Section 1.0 - What
Division of Insurance Internal Control Questionnaire For the period July 1, 2013 through June 30, 2014
Official Audit Report Issued March 6, 2015 Internal Control Questionnaire For the period July 1, 2013 through June 30, 2014 State House Room 230 Boston, MA 02133 [email protected] www.mass.gov/auditor
