Hardware Inventory Management Greater Boston District
|
|
|
- Mervin Hubbard
- 10 years ago
- Views:
Transcription
1 Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR March 25, 2015
2 Highlights Management does not have an accurate inventory of hardware assets connected to the Postal Service network. Background An effective asset management process actively manages all hardware devices on a network, so that only authorized devices have network access, and allows for quick response to security events. Asset management consists of maintaining inventory, tracking assets, and updating records. The U.S. Postal Service Office of Inspector General s (OIG) Information Technology (IT) Security Risk Model identified the Greater Boston District as the district with the highest risk for security events associated with information technology assets in Quarter 1, fiscal year Security events include adware, spyware, and computer viruses. If hardware affected by any of these events is not quickly physically located, postal operations may be disrupted. To respond effectively to security events, management must be able to physically locate assets. In 2014, the Greater Boston District managed about 12,000 information technology assets. Our objective was to determine whether the Greater Boston District has an accurate inventory and processes to manage hardware assets connected to the Postal Service network. What The OIG Found Management does not have an accurate inventory of hardware assets connected to the Postal Service network. Specifically, management could not physically locate 49 of the 182 (27 percent) active systems sampled at the three facilities we visited. In addition, 33 network assets or 18 percent of our sample that we physically located had inaccurate and incomplete data in the Asset Inventory Management System. We also determined the inventory list of sensitive property (such as laptops, computers, and switches) is not reconciled with physical assets. These circumstances occurred primarily because the Postal Service does not have a process to effectively track all IT assets and enforce existing policy. We estimated about $3.9 million for incomplete data in the Asset Inventory Management System and assets potentially at risk. Management needs an accurate and complete inventory to physically locate and disconnect a compromised or unauthorized device attached to the Postal Service network. What The OIG Recommended We recommended the Postal Service implement validation controls to the Asset Inventory Management System application and procedures to verify assets are authorized for connectivity before adding to the system. We also recommended management implement a scheduled inventory verification process for sensitive property and complete plans to prevent unauthorized devices from gaining access to the network. 1
3 Transmittal Letter March 25, 2015 MEMORANDUM FOR: JOHN T. EDGAR VICE PRESIDENT, INFORMATION TECHNOLOGY RICHARD P. ULUSKI VICE PRESIDENT, AREA OPERATIONS, NORTHEAST AREA E-Signed by Kimberly Benoit VERIFY authenticity with esign Desktop FROM: Kimberly F. Benoit Deputy Assistant Inspector General for Technology, Investment and Cost SUBJECT: Audit Report Hardware Inventory Management Greater Boston District () This report presents the results of our audit of the U.S. Postal Service s Hardware Inventory Management Greater Boston District (Project Number 14WG014IT000). We appreciate the cooperation and courtesies provided by your staff. If you have any questions or need additional information, please contact Aron Alexander, director, Information Technology, or me at Attachment cc: Corporate Audit and Response Management 2
4 Table of Contents Cover Highlights...1 Background...1 What The OIG Found...1 What The OIG Recommended...1 Transmittal Letter...2 Findings...4 Introduction...4 Conclusion...4 Management of Information Technology Assets...5 Hardware Not Physically Located...5 Inaccurate Asset Inventory...5 Asset Inventory Management System Data Analysis...6 Inventory Verification and Reconciliation...7 Network Authentication...8 Recommendations...9 Management s Comments...9 Evaluation of Management s Comments...10 Appendices...11 Appendix A: Additional Information...12 Background...12 Objective, Scope, and Methodology...12 Prior Audit Coverage...13 Appendix B: Management s Comments...14 Contact Information
5 Findings Management could not physically locate 49 of the 182 (27 percent) active systems sampled at the three facilities we visited. Introduction This report presents the results of our audit of the U.S. Postal Service s Hardware Inventory Management - Greater Boston District (Project Number 14WG014IT000). Our objective was to determine whether the Greater Boston District has an accurate inventory and processes to manage hardware assets connected to the Postal Service network. See Appendix A for additional information about this audit. Asset management is the process of tracking and managing the physical components of computers and network devices from acquisition through disposal. According to the SysAdmin, Audit, Networking, and Security (SANS) Institute, 1 Inventory of Authorized and Unauthorized Devices ranked first on the list of the 20 most critical security controls. The goal of hardware asset management is to account for all hardware assets on the information technology (IT) infrastructure and to provide comprehensive inventory visibility. Specifically, this process should actively manage inventory by tracking assets and updating records to ensure that only authorized hardware devices have network access. Proper asset management results in effective maintenance and timely troubleshooting of network problems. The U.S. Postal Service Office of Inspector General s (OIG) IT Security Risk Model identified the Greater Boston District as the highest risk district for security events associated with IT assets in Quarter 1, fiscal year Security events include adware, 2 spyware, 3 Trojans, 4 viruses, 5 and worms. 6 If hardware infected by any of these events is not quickly physically located, postal operations would be disrupted. In 2014, the Boston District managed about 12,000 IT assets. According to the Enterprise Information Repository, 7 the Asset Inventory Management System (AIMS) is the official central repository for tracking IT assets. AIMS allows users to interactively query the asset database using a variety of search results to review, analyze, and maintain the Postal Service s network and non-network asset inventory. Conclusion Management did not have an accurate inventory of hardware assets connected to the Postal Service network in the Greater Boston District. Specifically, management could not physically locate 49 of the 182 active systems (27 percent) sampled at the three sites we visited. In addition, 33 network assets (18 percent) that we physically located had inaccurate and incomplete data in AIMS. Further, we found that network devices are entered into AIMS without verifying the devices are authorized for connection to the network. Finally, we determined management does not reconcile the sensitive property inventory listing (such as laptops, computers, and switches) with physical assets at the district level to ensure accountability. We estimated about $3.9 million for incomplete data in AIMS and assets potentially at risk. 1 The SANS Institute develops, maintains, and makes available, at no cost, the largest collection of research documents about various aspects of information security. 2 Software that can track and view a user s personal information and provide it to third parties without the user s authorization or knowledge. 3 Software that conducts activities on a computer without the user s consent, including collecting personal information on a user. 4 Software programs that appear to be harmless but contain hidden code designed to exploit or damage a system. Hackers can transmit them through messages, or use them to modify or destroy data or obtain confidential information. 5 Computer programs or scripts that attempt to spread from one file to another on a single computer and/or from one computer to another without the knowledge or consent of the computer user. 6 Specific types of viruses that spread across many computers through network connections, creating copies of themselves on the infected computers. 7 The Postal Service s database of record that maintains information about existing applications, toolsets, and data. This report has not yet been reviewed for release under FOIA or the Privacy Act. Distribution should be limited to those within the Postal Service with a need to know. 4
6 Highlights Thirty desktop computers were Table of Contents assigned to retired, former, or transferred employees who no longer controlled the assets. Management of Information Technology Assets Management did not have an accurate inventory of hardware assets connected to the Postal Service network in the Greater Boston District. This occurred because the Postal Service has not developed a process to effectively track all IT assets. Without an accurate and complete inventory management system, the Postal Service may have difficulty promptly locating and disconnecting a compromised or unauthorized device attached to its network. This could limit the Postal Service s ability to troubleshoot and respond quickly to security events. Hardware Not Physically Located Retired assets removed from the network were still Findings These conditions occurred because management has not developed standard operating procedures for documenting the physical location of these assets. Additionally, the Postal Service does not use an official centralized asset inventory management system to manage all IT assets connected to the network and enforce existing policy.8 Furthermore, the Postal Service has not implemented a process to verify the existence of sensitive assets that are valued below the capital asset threshold. As a result, an unauthorized device could compromise operations or could be added to the network without detection. Similarly, sensitive assets could be lost or stolen without detection. documented as active in AIMS. Based on our enumeration9 scans, we sampled 182 assets connected to the Postal Service network at the three district facilities we visited. Management could not physically locate 49 of the 182 assets, and 18 of the 49 were not documented in any asset management system. When management cannot physically locate network devices, it can be difficult to promptly respond to issues and recover operations. If a device were compromised, an attacker could install malware, steal information, corrupt data, and disrupt operations before management could physically locate and disconnect the device. Inaccurate Asset Inventory From our sample of 182 assets, we identified 33 with inaccurate and incomplete data recorded in AIMS. For example: Recommendations We identified 30 desktop computers assigned to retired, former, or transferred employees who no longer controlled the assets. A computer and a printer connected to the network in the Greater Boston District were documented in AIMS as physically located in other cities.10 We identified three active assets on the network that were. Retired assets removed from the network were still documented as active in AIMS. Appendices Figure 1 summarizes the number of computers and printers with inaccurate data records that we identified in AIMS for the three facilities selected. 8 Handbook AS-805, Information Security, Section : Individual Information Resource Inventories, March The method used to discover devices on the network. 10 According to AIMS, the computer was assigned to a facility in Oak Park, IL, and the printer was assigned to a facility in Los Angeles, CA. Print 5
7 Highlights Figure 1. Inaccurate Inventory Records RESET Number of Computers and Printers With Incorrect Fields Click on the locations below for records Inaccurate Values in AIMS Boston Processing & Distribution Center (P&DC) Middlesex Essex P&DC Salem Main Post Office Table of Contents Incorrect Facility Incorrect Custodian Total Records Source: AIMS. Findings These vulnerabilities occurred because there are no validation controls for more than 15 data sources uploaded into AIMS, nor a process to verify accuracy and completion of inventory records for hardware assets connected to the network. In addition, management stated that users are not consistently updating inventory records when assets are retired. The lack of validation controls can cause duplicate or incomplete records in the inventory listing. Management needs accurate information to make sound financial and operational decisions. An inaccurate inventory system exposes the Postal Service to the loss or theft of its assets because it can be difficult to identify and physically locate a compromised device Asset Inventory Management System Data Analysis Appendices Recommendations Based on our analysis of extracts from the AIMS database, the Greater Boston District s asset records are incomplete. For example, 933 of 5,269 computers (17.7 percent) were missing serial number information. Table 1 summarizes the number of computers, printers, and network devices with incomplete data records that we identified in AIMS for the Greater Boston District. Print 6
8 Highlights Table 1. Asset Records With Missing Information Greater Boston District Type of Asset (Number of Records Reviewed) Computers (5,269) Printers (2,204) Network Devices11 (5,042) Percentage of All Assets Reviewed12 Table of Contents Field Values Missing in AIMS Serial Number % 0 0.0% 3, % 36.8% Custodian 1, % % 5, % 58.4% Manufacturer 2, % 0 0.0% 3, % 47.3% Make/Model 2, % 0 0.0% 3, % 47.0% Cost 2, % 1, % 5, % 69.2% % % % 3.0% Location Source: AIMS. Findings As a result of our audit, management has re-established an automated process that updates the AIMS with newly discovered network devices. However, these network devices are added to AIMS without verifying the assets are authorized to be connected to the network. The lack of asset accountability prevents responsible personnel from ensuring inventories are accurate and authorized. Consequently, an unauthorized device could be inadvertently added to the AIMS database. Although an asset can be discovered, it can be difficult to determine if the asset is authorized. Appendices Recommendations Inventory Verification and Reconciliation Management did not verify the existence of sensitive property13 against an official asset inventory management system at the district level, as required.14 This is because management only performs asset verification for capital assets and for sensitive property at headquarters facilities. Management has not established a process in the Greater Boston District to verify that all infrastructure components exist, as required by policy.15 Without proper knowledge and control of all the assets connected to the network, IT staff cannot properly secure those assets. In addition, an organization s systems are more vulnerable to loss, theft or attack when it lacks an accurate inventory. If an unauthorized person were to obtain a computer or network device, he or she may be able to access sensitive information, such as configuration files, passwords, or personally identifiable information, and could possibly disrupt mail operations. 11 Network devices include routers and switches connected to the network. 12 We computed this percentage by totaling the number of missing field values per category and dividing that number by the total number of assets (12,515) computers (5,269), printers (2,204), and network devices (5,042) in the Greater Boston District. 13 Property considered especially vulnerable to theft or loss, such as computers, digital cameras, camcorders, projectors, and other valuable portable equipment. 14 Handbook AS-701, Material Management, Section : Verification and Physical Inventory, January Handbook AS-805, Section : Maintaining Network Asset Control, March Print 7
9 Highlights Network Authentication Asset inventory control includes processes and tools to detect and manage all devices accessing the network. Organizations use tools to authenticate and authorize network assets. The Greater Boston District has not employed adequate asset inventory controls to.16 Adequate controls have not been employed because management did not make it a priority to implement network access controls enterprise-wide. Appendices Recommendations Findings Table of Contents Without asset inventory controls, an attacker or trusted user could attach an unauthorized device to the Postal Service network without detection. In addition, management may not be able to promptly address a security event originating from an unauthorized device if asset inventory controls are lacking. 16. Print 8
10 Recommendations We recommend management implement validation controls to the Asset Inventory Management System application to improve data integrity. We also recommend management implement a scheduled inventory verification process for sensitive property and complete plans to prevent unauthorized devices from gaining access to the network. We recommend the vice president, Information Technology, direct the program manager, Asset Inventory Management System, to: 1. Implement validation controls to the Asset Inventory Management System application to improve data integrity. We recommend the vice president, Information Technology, direct the manager, Enterprise Access Infrastructure, to: 2. Implement procedures to verify assets are authorized for network connectivity before Asset Inventory Management System records are added or modified. 3. Complete plans to implement controls to prevent unauthorized network devices from gaining access to the Greater Boston District network. We recommend the vice president, area operations for the Northeast Area, direct the district manager, Greater Boston District, to: 4. Implement a scheduled inventory verification process to verify the existence of sensitive property at regular intervals, as required. Management s Comments Management agreed with recommendations 1, 3, and 4; and partially agreed with recommendation 2. Regarding recommendation 1, management agreed that additional validation controls would provide improved data integrity to the AIMS application. The Postal Service will upgrade existing controls and develop new controls to help ensure the timely delivery of accurate and current tracking data to the AIMS system. Management s target implementation date is July 1, Regarding recommendation 2, management stated that the Postal Service adds computers and printers to AIMS with the required field values via direct feed from the vendor; however, direct vendor feeds to AIMS is not available for telecommunications equipment. Management extracts data on telecommunications equipment from the network based on a point-in-time scan and extract. The Postal Service will develop a process to improve the quality of the data fed into AIMS to ensure that the system updates reflect the best data available about Postal Service assets. Management s target implementation date is July 1, Regarding recommendation 3, management stated that they have already begun the corrective action to prevent access by unauthorized network devices by implementing CISCO ISE (Identity Service Engine). The implementation enables real-time device management on the network, including blocking capability to unauthorized devices. The capability is currently implemented at headquarters and the Raleigh, NC, campus. The last phase of implementation will be at the field sites and will require upgraded equipment. Management s target implementation date is September 30, Regarding recommendation 4, management stated that they will issue a policy regarding inventorying hardware at specific intervals and against the AIMS application. Management s target implementation date is July 1, See Appendix B for management s comments, in their entirety. 9
11 Highlights Evaluation of Management s Comments The OIG considers management s comments responsive to our recommendations and corrective actions should resolve the issues identified in the report. Appendices Recommendations Findings Table of Contents The OIG considers recommendations 2 and 3 significant, and therefore requires OIG concurrence before closure. Consequently, the OIG requests written confirmation when corrective actions are completed. These recommendations should not be closed in the Postal Service s follow-up tracking system until the OIG provides written confirmation that the recommendations can be closed. Print 10
12 Appendices Click on the appendix title to the right to navigate to Appendix A: Additional Information...12 Background...12 Objective, Scope, and Methodology...12 Prior Audit Coverage...13 Appendix B: Management s Comments...14 the section content. 11
13 Appendix A: Additional Information Background Asset management is the process of tracking and managing the physical components of computers and computer networks, from acquisition through disposal. The objectives of inventory control and asset management procedures include maintaining uniform accountability for assets. The primary responsibility for controlling assets rests with the officials to whom equipment is assigned. The material accountability officers are responsible for performing scheduled inventory verification for sensitive property and capital assets at headquarter facilities. The district material accountability officers perform inventory verification for capital assets only. The Postal Service has about 125,000 desktop computers, 17,000 laptops, and 85,000 printers. The Greater Boston District has about 5,000 network devices, 5,000 desktop and laptop computers, and 2,000 printers. With this many devices, keeping an accurate inventory is critical. Objective, Scope, and Methodology Our objective was to determine whether the Greater Boston District has an accurate inventory and processes to manage hardware assets connected to the Postal Service network. To accomplish our objective, we performed enumeration scans at the Boston Processing and Distribution Center (P&DC), the Middlesex Essex P&DC, and the Salem Main Post Office; interviewed personnel; and analyzed and compared our results to the Postal Service inventory. We performed on-site enumeration scans in October 2014 using Nmap 17 to obtain the inventory of devices on the Postal Service network. Our scans identified 1,522 assets connected to the Postal Service s 56.x.x.x network. As a result, we randomly selected 182 assets for our sample. We obtained an inventory listing of assets connected to the network in the Greater Boston District from AIMS, performed physical inventory reviews of select assets between October and November of 2014, and compared our results to the AIMS inventory. We analyzed the results and reported them by network devices, computers, and printers. We conducted this performance audit from September 2014 through March 2015, in accordance with generally accepted government auditing standards and included such tests of internal controls as we considered necessary under the circumstances. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objective. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objective. We discussed our observations and conclusions with management on February 23, 2015, and included their comments where appropriate. We assessed the reliability of AIMS data by performing electronic testing of required data elements, reviewing existing information about the data and the system that produced them, and interviewing agency officials knowledgeable about the data. We determined that the data were sufficiently reliable for the purposes of this report. 17 Scanning tool for network discovery and security auditing. 12
14 Highlights Prior Audit Coverage Report Title Capital District Vulnerability Assessment Report Number Final Report Date Monetary Impact IT-AR /12/2014 None Appendices Recommendations Findings Table of Contents Report Results: Our report determined that security controls in the Capital District did not adequately protect Postal Service infrastructure and data from unauthorized access or corruption. Specifically, we identified configuration vulnerabilities that included areas of non-compliance related to operating systems, intrusion protection, accounts, passwords, and logging. Further, administrators did not install the latest patch updates on systems and allowed remote access to network devices using unsecure communications that weaken network security. We made ten recommendations. Management agreed with nine of the recommendations and partially agreed with the other. Print 13
15 Appendix B: Management s Comments 14
16 Highlights Table of Contents Findings Recommendations Appendices Print 15
17 Highlights Table of Contents improved or developed to improve the quality of the data feeding into A IMS. This action will ensure that AIMS updates reflect the best data available about Postal assets. Target Implementation Date: July 1, 2015 Responsible Management Official: Manager, Enterprise Access Infrastructure Recommendation I 3 J: We recommend the vice president, Information Technology, direct the manager, Enterprise Access Infrastructure, to complete plans to implement controls to prevent unauthorized network devices from gaining access to the Greater Boston District network. Findings Management Response: Management agrees with this finding. The corrective action to prevent access by unauthorized network devices has already begun. The solution centers on the will enable real time device management on the network, including a tiered blocking capability for any devices found to be questionable or unauthorized. This capability is currently implemented in the Raleigh RITSC campus and in USPS Headquarters. Implementation is currently in-progress at the Eagan and San Mateo data centers, with the Merrifield and Bolger sites scheduled. Implementation for Field sites will be the last phase and will include mandatory upgrades of wireless LAN capabilities and switching. Target Implementation Date: September 30, 2017 Recommendations Responsible Management Official: Manager. Enterprise Access Infrastructure Recommendation I 4 J: We recommend the vice president, area operations for the Northeast Area, direct the district manager. Greater Boston District. to implement a scheduled inventory verification process to verify the existence of sensitive property at regular intervals, as required. Management Response: Management agrees with this finding. A policy will be issued regarding inventorying hardware at specific intervals and validating against the Asset Inventory Management System. Appendices Target Implementation Date: July 1, 2015 Responsible Management Official: Manager, Enterprise Access Infrastructure Print 16
18 Highlights Table of Contents Findings Recommendations Appendices Print 17
19 Contact us via our Hotline and FOIA forms, follow us on social networks, or call our Hotline at to report fraud, waste or abuse. Stay informed North Lynn Street Arlington, VA (703)
Software Inventory Management Greater Boston District
Software Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-007 July 13, 2015 Highlights Effective software management practices are not in place to adequately protect and
Capital District Vulnerability Assessment
Capital District Vulnerability Assessment Audit Report Report Number IT-AR-15-1 December 12, 214 These vulnerabilities expose the infrastructure to unauthorized remote access by potential attackers who
Information Security Awareness Training and Phishing
Information Security Awareness Training and Phishing Audit Report Report Number IT-AR-16-001 October 5, 2015 Highlights The Postal Service s information security awareness training related to phishing
ACTING VICE PRESIDENT, INFORMATION TECHNOLOGY. Michael L. Thompson Acting Deputy Assistant Inspector General for Technology, Investment and Cost
July 14, 2015 MEMORANDUM FOR: JUDITH A. ADAMS ACTING VICE PRESIDENT, INFORMATION TECHNOLOGY FROM: SUBJECT: Michael L. Thompson Acting Deputy Assistant Inspector General for Technology, Investment and Cost
Software Development Processes
Software Development Processes Audit Report Report Number IT-AR-15-006 July 13, 2015 Highlights The Postal Service does not consistently manage software development risk. Background Organizations spend
Parcel Readiness Product Tracking and Reporting System Controls
Parcel Readiness Product Tracking and Reporting System Controls Audit Report Report Number IT-AR-5-002 December 6, 204 The Postal Service needs to improve its process for managing and securing the PTR
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
Solution for Enterprise Asset. Management. System Vehicle Maintenance Facility Data. Management. Advisory Report. Report Number DR-MA-15-004
Solution for Enterprise Asset Management System Vehicle Maintenance Facility Data Management Advisory Report Report Number DR-MA-15-004 September 18, 2015 Highlights This management advisory discusses
Software Contract and Compliance Review
Audit Report Report Number IT-AR-15-009 September 18, 2015 Software Contract and Compliance Review The software contract did not comply with all applicable standards and management did not ensure the supplier
Misclassified Training Expenses
Misclassified Training Expenses Management Advisory Report Report Number DP-MA-14-003 September 16, 2014 Highlights The Postal Service overstated the general ledger expense account balances for "Training
Wireless Local Area Network Deployment and Security Practices
HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective
Oversight of Expense Purchase Cards
Oversight of Expense Purchase Cards Audit Report Report Number SM-AR-15-006 August 7, 2015 Background The expense purchase card is the most commonly used purchase card in the U.S. Postal Service. Postal
Monitoring of Government Travel Card Transactions
Monitoring of Government Travel Card Transactions Management Advisory Report Report Number DP-MA-14-002 June 25, 2014 Highlights The Postal Service has eliminated use of the travel card for cash advances
Geo-Fence Technology in Delivery Operations
Geo-Fence Technology in Delivery Operations Management Advisory Report Report Number DR-MA-14-006 August 14, 2014 Highlights The Postal Service s planned use of geo-fence technology in the delivery environment
Professional Services Contract Rates
Professional Services Contract Rates Audit Report Report Number SM-AR-15-001 November 10, 2014 Highlights The Postal Service awarded one supplier an independent accounting services contract at individual
Retail Systems Software Deployment and Functionality
Retail Systems Software Deployment and Functionality Audit Report Report Number MI-AR-15-002 March 13, 2015 Highlights Background The U.S. Postal Service Office of Inspector General (OIG) conducted a self-initiated
Seamless Acceptance Implementation
Seamless Acceptance Implementation Audit Report Report Number MS-AR-15-004 April 7, 2015 Highlights Background Commercial mail accounted for most of the U.S. Postal Service s revenue 70 percent ($47 billion)
Undeliverable as Addressed Mail
Undeliverable as Addressed Mail Audit Report Report Number MS-AR-14-006 July 14, 2014 Highlights The Postal Service has taken action to reduce and recover UAA mail costs by testing whether business mailers
U.S. Postal Service s Delivering Results, Innovation, Value, and Efficiency Initiative 30 Achieve 100 Percent Customer and Revenue Visibility
U.S. Postal Service s Delivering Results, Innovation, Value, and Efficiency Initiative 30 Achieve 100 Percent Customer and Revenue Visibility Audit Report Report Number MI-AR-15-004 June 12, 2015 Highlights
How To Improve The Business Service Network
Business Service Network Customer Service Audit Report July 9, 2014 Highlights Background The U.S. Postal Service s (BSN) of 300 employees supports nearly 23,000 large customers for service issues, information,
for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
August 20, 2014 MEMORANDUM FOR: CHARLES L. MCGANN, JR. MANAGER, CORPORATE INFORMATION SECURITY FROM: for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
ROSS PHILO EXECUTIVE VICE PRESIDENT AND CHIEF INFORMATION OFFICER
March 24, 2010 ROSS PHILO EXECUTIVE VICE PRESIDENT AND CHIEF INFORMATION OFFICER CHARLES L. MCGANN MANAGER, CORPORATE INFORMATION SECURITY SUBJECT: Audit Report Windows Access Controls at the Information
Customer Service Operations Efficiency Chicago District
Customer Service Operations Efficiency Chicago District Audit Report Report Number MS-AR-15-005 April 28, 2015 Highlights During FY 2014, 12 of 13 facilities had actual workhours in excess of estimated
Customer Retention. Audit Report. Report Number MS-AR-14-008. September 25, 2014
Customer Retention Audit Report Report Number MS-AR-14-008 September 25, 2014 Background The U.S. Postal Service has a significant customer base, ranging from residential customers to large commercial
Management of Cloud Computing Contracts and Environment
Management of Cloud Computing Contracts and Environment Audit Report Report Number IT-AR-14-009 September 4, 2014 Cloud computing contracts did not comply with Postal Service standards. Background The
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
SUBJECT: Audit Report Access Controls in the Enterprise Data Warehouse (Report Number IS-AR-09-004)
February 20, 2009 GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION TECHNOLOGY OPERATIONS SUBJECT: Audit Report Access Controls in the Enterprise Data Warehouse (Report Number ) This report presents the results
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
U.S. Postal Service s DRIVE 25 Improve Customer Experience
U.S. Postal Service s DRIVE 25 Improve Customer Experience Audit Report Report Number MI-AR-16-001 November 16, 2015 DRIVE Initiative 25 is suppose to increase customer satisfaction with how complaints
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
INSPECTOR GENERAL. Fiscal Year 2013 Postal Service Financial Statements Audit St. Louis Accounting Services. Audit Report.
OFFICE OF INSPECTOR GENERAL UNITED STATES POSTAL SERVICE Fiscal Year 2013 Postal Service Financial Statements Audit Audit Report March 20, 2014 Report Number March 20, 2014 Fiscal Year 2013 Postal Service
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Patch Management Policy
Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:
Audit Report. Mobile Device Security
Audit Report Mobile Device Security A-14-14-14051 September 2014 MEMORANDUM Date: September 26, 2014 Refer To: To: From: The Commissioner Inspector General Subject: Mobile Device Security (A-14-14-14051)
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Department of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
How To Check For Errors In International Mail Volume Data
Office of Inspector General March 22, 2006 AYODEJI O. SANYAOLU PLANT MANAGER - J.T. WEEKER (CHICAGO) INTERNATIONAL SERVICE CENTER SUBJECT: Audit Report J.T. Weeker (Chicago) International Service Center
Department of Homeland Security
for the Immigration and Customs Enforcement Component of the FY 2013 Department of Homeland Security s Financial Statement Audit OIG-14-85 April 2014 OFFICE OF INSPECTOR GENERAL Department of Homeland
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
VICE PRESIDENT, DELIVERY AND POST OFFICE OPERATIONS MICHAEL J. AMATO VICE PRESIDENT, ENGINEERING
August 6, 2013 MEMORANDUM FOR: EDWARD F. PHELAN, JR. VICE PRESIDENT, DELIVERY AND POST OFFICE OPERATIONS MICHAEL J. AMATO VICE PRESIDENT, ENGINEERING FROM: SUBJECT: Robert J. Batta Deputy Assistant Inspector
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2014 May 19, 2015 14-01820-355 ACRONYMS CRISP
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE
FOR OFFICIAL USE ONLY SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE Department of Transportation Report No. FI-2013-123 Date Issued: September 10,
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
THOMAS G. DAY SENIOR VICE PRESIDENT, INTELLIGENT MAIL AND ADDRESS QUALITY PRITHA N. MEHRA VICE PRESIDENT, BUSINESS MAIL ENTRY AND PAYMENT TECHNOLOGIES
March 31, 2009 THOMAS G. DAY SENIOR VICE PRESIDENT, INTELLIGENT MAIL AND ADDRESS QUALITY PRITHA N. MEHRA VICE PRESIDENT, BUSINESS MAIL ENTRY AND PAYMENT TECHNOLOGIES GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security
Federal Communications Commission Office of Inspector General FY 2003 Follow-up on the Audit of Web Presence Security Audit Report No. 03-AUD-09-21 October 20, 2004 TABLE OF CONTENTS Page EXECUTIVE SUMMARY
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
Information Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED AND MONITORED
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED
INSPECTOR GENERAL. Availability of Critical Applications. Audit Report. September 25, 2013. Report Number IT-AR-13-008 OFFICE OF
OFFICE OF INSPECTOR GENERAL UNITED STATES POSTAL SERVICE Availability of Critical Applications Audit Report September 25, 2013 Report Number September 25, 2013 Availability of Critical Applications Report
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
