Memorandum. Vulnerability Assessment of FAA's Operational Air Traffic Control System Report Number QC-2011-047 JA-20



Similar documents
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE

Office of Inspector General Audit Report

REVIEW OF WEB APPLICATIONS SECURITY AND INTRUSION DETECTION IN AIR TRAFFIC CONTROL SYSTEMS. Federal Aviation Administration

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

AUDIT OF SECURITY AND CONTROLS OVER THE NATIONAL DRIVER REGISTER

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of Inspector General Audit Report

VOLPE CENTER S INFORMATION TECHNOLOGY SECURITY AND RESOURCE MANAGEMENT ACTIVITIES

AUDIT REPORT. The Energy Information Administration s Information Technology Program

OFFICIAL USE ONLY. Department of Energy. DATE: January 31, 2007 Audit Report Number: OAS-L-07-06

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

Audit Report. Management of Naval Reactors' Cyber Security Program

Final Audit Report -- CAUTION --

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System

Evaluation Report. Office of Inspector General

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections

How To Audit The Mint'S Information Technology

Office of Inspector General Audit Report

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Memorandum. Audit Report No.: OAS-L REPLY TO ATTN OF: Chief Financial Officer, CF-1 TO: INTRODUCTION AND OBJECTIVE

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

Figure 1. Number of High-Risk Vulnerability Instances in the JPSS Ground System, by Quarter, FY 2012 to FY nd Quarter

WORKERS COMPENSATION TRAUMATIC INJURY CLAIMS

VA Office of Inspector General

Office of Inspector General

MORE INCURRED-COST AUDITS OF DOT PROCUREMENT CONTRACTS SHOULD BE OBTAINED

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE May 23, 2000.

U.S. Department of the Interior Office of Inspector General AUDIT REPORT

EVALUATION REPORT. The Department of Energy's Unclassified Cybersecurity Program 2014

Federal Information Security Management Act: Fiscal Year 2014 Evaluation

Department of Homeland Security Office of Inspector General

AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks

In Brief. Smithsonian Institution Office of the Inspector General

INTERNATIONAL TRADE ADMINISTRATION Improvements Are Needed to Strengthen ITA s Information Technology Security Program

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

VA Office of Inspector General

Audit of the Department of State Information Security Program

Office of Inspector General Audit Report

Capital District Vulnerability Assessment

Department of Education. Network Security Controls. Information Technology Audit

EPA Could Improve Processes for Managing Contractor Systems and Reporting Incidents

Department of Transportation Chief Information Officer Federal Motor Carrier Safety Administrator

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

Office of Inspector General

March 17, 2015 OIG-15-43

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Examination Report

Department of Transportation Office of Transportation Technology Services

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 22, 20 14

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

TRAINING FAILURES AMONG NEWLY HIRED AIR TRAFFIC CONTROLLERS

Department of Homeland Security

AIR CARRIERS OUTSOURCING OF AIRCRAFT MAINTENANCE. Federal Aviation Administration Report Number: AV Date Issued: September 30, 2008

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

DOT enhanced network firewall security to prevent unauthorized Internet access to DOT's private networks as a result of OIG findings.

AUDIT OF SBA S SYSTEM AUDIT REPORT NUMBER 4-42 SEPTEMBER 10, 2004

NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION Significant IT Security Program Improvements Are Needed to Adequately Secure NTIA s Systems

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

SMITHSONIAN INSTITUTION

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

INFORMATION SECURITY PROGRAM

AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS

Audit of Case Activity Tracking System Security Report No. OIG-AMR

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Office of Inspector General Audit Report

AUDIT REPORT. Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Office of Inspector General Audit Report

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Security Concerns with Federal Emergency Management Agency's egrants Grant Management System

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK

Department of the Interior Privacy Impact Assessment Template

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Improved Security Planning Needed for the Customer Technology Solutions Project

Information Security Series: Security Practices. Integrated Contract Management System

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

STATE OF NORTH CAROLINA

EPA Needs to Improve Its. Information Technology. Audit Follow-Up Processes

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

Audit Report. Management and Security of Office of Budget and Program Analysis Information Technology Resources. U.S. Department of Agriculture

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

THE INFORMATION TECHNOLOGY INFRASTRUCTURE

Audit of Security Controls for DHS Information Technology Systems at San Francisco International Airport

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

TSA audit - How Well Does It Measure Network Security?

Evaluation of DHS' Information Security Program for Fiscal Year 2015

Information Technology Security Review April 16, 2012

STATE OF ARIZONA Department of Revenue

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security

Department of Legislative Services Office of Legislative Audits. Maryland Insurance Administration

ASDI Full Audit Guideline Federal Aviation Administration

EPA Needs to Strengthen Financial Database Security Oversight and Monitor Compliance

AUDIT REPORT. Federal Energy Regulatory Commission's Fiscal Year 2014 Financial Statement Audit

Transcription:

1 U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum Subject: ACTION: Quality Control Review on the Vulnerability Assessment of FAA's Operational Air Traffic Control System Report Number QC-2011-047 Date: April 15, 2011 From: Louis C. King Acting Assistant Inspector General for Financial and Information Technology Audits Reply to Attn. of: JA-20 To: Federal Aviation Administrator This report summarizes the results of our information technology vulnerability assessment of the Federal Aviation Administration's (FAA's) operational Air Traffic Control (ATC) systems. This audit was requested by the now-chairmen of the House Transportation and Infrastructure Committee and the Subcommittee on Aviation. FAA has 21 Air Route Traffic Control Centers (ARTCC) geographically dispersed across the United States. These Centers are the major communication hubs for flight plan routing and the systems that provide radar and communication services to aircraft operating above 18,000 feet. ATC systems communicate with one another via the same technology used for Internet communication. Although not all ATC systems can be accessed from the Internet, FAA has designed some support systems residing within its Mission Support/Administrative System Network (MSSN) with accessibility through the Internet. This audit assessed ATC systems and networks located at two FAA facilities within the continental United States. Clifton Gunderson LLP of Calverton, Maryland, completed the audit under contract to the Office of Inspector General (OIG). Clifton Gunderson's audit approach included developing and executing steps within OIG-approved Rules of Engagement (ROE). ROE establish guidelines that determine how selected security tests are conducted. OIG staff performed a quality control review of Clifton Gunderson's audit

2 work to ensure that it complied with generally accepted government auditing standards. Our review disclosed no instances in which Clifton Gunderson did not comply in all material respects with applicable auditing standards. A detailed report was provided to FAA but will not be released to the public due to the sensitivity of the information it contains. The objective of this audit was to determine whether operational ATC systems can be accessed by unauthorized users from inside ATC facilities through FAA s MSSN. Clifton Gunderson concluded that they were unable to gain access to FAA's operational ATC systems. However, they identified the following weaknesses at the ARTCCs: 1) information disclosure vulnerability; 2) inadequate system patch levels and unsupported operating systems; 3) improper network configurations; and 4) communication system vulnerabilities. 1. Information Disclosure Vulnerability Clifton Gunderson identified an information disclosure vulnerability during testing at one ARTCC that allowed them to view, without using a password, hundreds of pages of sensitive technical information describing network configuration, gateways and other devices. This sensitive information may provide a rogue employee or contractor sufficient understanding to identify and exploit weaknesses in the ATC security structure. 2. Patch Management Vulnerabilities on FAA's MSSN Clifton Gunderson's review of MSSN revealed several critical and high risk Common Vulnerabilities and Exposures (CVE) 1 related to missing or outdated system patches or the running of operating systems no longer supported by their vendors. System patch levels and operating systems that are not kept current not only may result in system unavailability, but may also create a risk of exploitation of security holes for access to ATC systems and data. Any of these systems could be compromised, and allow the attacker to use the system to hide his or her identity in order to launch more attacks. 1 The Mitre Corporation maintains a database of Common Vulnerabilities and Exposures (CVE) and shares it with the world-wide information technology user community at http:cve.mitre.org/about/faqs.html.

3 3. System Configuration Vulnerabilities on FAA's MSSN Clifton Gunderson's review of MSSN also revealed several critical and high risk CVEs related to improper system configurations. An attacker could leverage these vulnerabilities to gain total control of the systems. Furthermore, the systems could be used to compromise other systems that depend on the same network management and configuration services. 4. Communication System Weaknesses Clifton Gunderson's review identified a communication system at one location that does not require complex passwords and is no longer supported by the vendor. This lack of sufficiently complex passwords could lead to an unauthorized manipulation of the communication system, a total system shutdown, or falsification and impersonation of facility communications. Clifton Gunderson's recommendations to correct these and other control deficiencies appear in this report's Exhibit A. ACTIONS REQUIRED Clifton Gunderson provided FAA a draft of the report on February 26, 2011, and received FAA's written comments on April 12, 2011. FAA concurred with all audit findings and recommendations, and has agreed to develop plans to implement corrective actions to remediate all weaknesses. We request that FAA give us a written response that includes specific action taken or planned for each recommendation and target dates for completion. In accordance with DOT Order 8000.1C, the corrective actions taken in response to Clifton Gunderson's recommendations are subject to follow-up. We appreciate the courtesies and cooperation of Department of Transportation's representatives during this audit. If you have any questions concerning this report, please call me at (202) 366-4350, or Nathan Custer, Program Director, at (202) 366-5540. Attachments #

4 cc: Chief Information Officer, DOT Chief Operating Officer, ATO Assistant Administrator for Information Services/CIO, FAA Martin Gertel, M-1 Anthony Williams, AAE-001

5 EXHIBIT A. RECOMMENDATIONS OF CLIFTON GUNDERSON, LLP, INDEPENDENT AUDITOR Clifton Gunderson LLP made the following recommendations during its Vulnerability Assessment of FAA's Operational Air Traffic Control System. OIG agrees that FAA management should implement these recommendations in order to enhance FAA's ATC controls. Information disclosure vulnerability 1. Restrict access to this site by requiring users to enter ID s and passwords, after demonstrating a valid business need or justification to access this data. 2. Review the value of the information available on the site which should be otherwise protected from dissemination. 3. Review and monitor individual accesses to this information to ensure documents accessible are appropriate based on the level of the user s need to know. 4. Monitor (for reasonableness) any distribution or download of any document which provides information otherwise protected from dissemination. Patch management vulnerabilities on the FAA MSSN 5. Apply software patch releases on a timely basis to protect against known vulnerabilities. 6. Ensure the system s Authorizing Official (AO) is promptly informed and a risk acceptance is received for any Critical or High vulnerabilities that are not promptly addressed. If the risk acceptance lapses, or the situation changes, the AO should renew the acceptance of the risk to ensure he/she is kept aware of the unmitigated vulnerabilities present on the system. 7. Upgrade system software and supporting applications to a vendor acceptable supported version.

6 System configuration vulnerabilities on MSSN 8. We recommend FAA management disable unneeded network services where it is determined they are unnecessary or do not serve a valid business purpose. Communications system weaknesses 9. Upgrade the communications operating system to a supported version. 10. Require passwords meet complexity requirements in accordance with DOT/FAA policies.