AUDIT REPORT. Federal Energy Regulatory Commission s Unclassified Cybersecurity Program 2015



Similar documents
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

AUDIT REPORT. The Energy Information Administration s Information Technology Program

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

EVALUATION REPORT. The Department of Energy's Unclassified Cybersecurity Program 2014

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

OFFICIAL USE ONLY. Department of Energy. DATE: January 31, 2007 Audit Report Number: OAS-L-07-06

AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

AUDIT REPORT. Small Business Subcontracting Goals at the East Tennessee Technology Park

AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities

Audit Report. Management of Naval Reactors' Cyber Security Program

U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report

AUDIT REPORT. Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses

Audit Report. The Radioactive Liquid Waste Treatment Facility Replacement Project at Los Alamos National Laboratory

AUDIT REPORT. Materials System Inventory Management Practices at Washington River Protection Solutions

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

AUDIT REPORT. Federal Energy Regulatory Commission's Fiscal Year 2014 Financial Statement Audit

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

AUDIT REPORT. Bonneville Power Administration s Real Property Services

U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Briefing Report: Improvements Needed in EPA s Information Security Program

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Memorandum. Audit Report No.: OAS-L REPLY TO ATTN OF: Chief Financial Officer, CF-1 TO: INTRODUCTION AND OBJECTIVE

Critical Asset Security Enhancementation - A Review

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

March 17, 2015 OIG-15-43

2014 Audit of the CFPB s Information Security Program

Audit Report. The National Nuclear Security Administration's Weapons Dismantlement and Disposition Program

U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report. Security Over Wireless Networking Technologies

INSPECTION REPORT. Alleged Nuclear Material Control and Accountability Weaknesses at the Department of Energy's Portsmouth Project

May 2, 2016 OIG-16-69

OFFICE OF INSPECTOR GENERAL

Audit Report. Implementation of the Recovery Act at the Savannah River Site

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Inspection Report

AUDIT REPORT. The Department of Energy's Improper Payment Reporting in the Fiscal Year 2014 Agency Financial Report

NASA OFFICE OF INSPECTOR GENERAL

2014 Audit of the Board s Information Security Program

AUDIT OF SBA S SYSTEM AUDIT REPORT NUMBER 4-42 SEPTEMBER 10, 2004

UNITED STATES COMMISSION ON CIVIL RIGHTS. Fiscal Year 2012 Federal Information Security Management Act Evaluation

Department of Homeland Security

Office of the Inspector General United States Office of Personnel Management. Statement of Michael R. Esser Assistant Inspector General for Audits

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Department of Energy Human Resources and Administration Home Page

How To Audit The National Security System

Office of Inspector General

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Final Audit Report -- CAUTION --

Review of U.S. Coast Guard's FY 2014 Drug Control Performance Summary Report

Final Audit Report. Report No. 4A-CI-OO

INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK

AUDIT REPORT. The National Nuclear Security Administration s Network Vision Initiative

The Certification and Accreditation of Computer Systems Should Remain in the Computer Security Material Weakness. August 2004

VA Office of Inspector General

How To Check If Nasa Can Protect Itself From Hackers

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

AUDIT REPORT FACILITIES INFORMATION MANAGEMENT SYSTEM DOE/IG-0468 APRIL 2000

Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY Report No. 4A-CI

INFORMATION SECURITY. Evaluation of GAO s Program and Practices for Fiscal Year 2012 OIG-13-2

Office of Financial Management's Management Letter for DHS' FY 2014 Financial Statements Audit

United States Secret Service's Management Letter for DHS' FY 2014 Financial Statements Audit

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections

AUDIT REPORT. Argonne National Laboratory Infrastructure Projects

U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL

STATUS OF RECOMMENDATIONS: INFORMATION SYSTEMS SECURITY EVALUATION OF REGION III LISLE, IL (OIG-09-A-15)

2015 List of Major Management Challenges for the CFPB

U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report. Selected Energy Efficiency and Renewable Energy Projects

U.S. Department of Energy Office of Inspector General Office of Audit Services. Audit Report

VA Office of Inspector General

Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY Report No. 4A-CI Date:

Department of Homeland Security

Evaluation of DHS' Information Security Program for Fiscal Year 2015


Project Delays Prevent EPA from Implementing an Agency-wide Information Security Vulnerability Management Program

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Audit of the Department of State Information Security Program

Improved Security Planning Needed for the Customer Technology Solutions Project

VA Office of Inspector General

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE May 23, 2000.

SYSTEMS AND CONTROLS. Management Assurances FEDERAL MANAGERS FINANCIAL INTEGRITY ACT (FMFIA) ASSURANCE STATEMENT FISCAL YEAR (FY) 2012

Audit of NRC s Network Security Operations Center

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009

Fiscal Year 2007 Federal Information Security Management Act Report

Information Security Series: Security Practices. Integrated Contract Management System

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Department of Homeland Security

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Office of Inspector General

How To Audit The Mint'S Information Technology

POSTAL REGULATORY COMMISSION

Audit of the Board s Information Security Program

How To Audit Telecommunication Services And Enterprise Security

Transcription:

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Federal Energy Regulatory Commission s Unclassified Cybersecurity Program 2015 OAI-L-16-02 October 2015

Department of Energy Washington, DC 20585 October 30, 2015 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: SUBJECT: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General INFORMATION: Audit Report: Federal Energy Regulatory Commission s Unclassified Cybersecurity Program 2015 BACKGROUND The Federal Energy Regulatory Commission (Commission), an independent agency within the Department of Energy, was established to regulate major aspects of the Nation s wholesale electric, natural gas, hydroelectric, and oil pipeline industries. The Commission s information technology infrastructure must be dependable and resilient to support its missions. To that end, officials noted that they received approximately $2.5 million in fiscal year 2015 to secure the Commission s unclassified systems and information. The Federal Information Security Modernization Act of 2014 (FISMA) established requirements for Federal agencies to develop, implement, and manage agency-wide information security programs, including management and oversight of information security risks to ensure that information technology resources are adequately protected. In addition, Federal agencies must provide acceptable levels of security for the information and systems that support their operations and assets. Further, FISMA mandated that agency Offices of Inspector General conduct annual independent evaluations to determine whether agencies unclassified cybersecurity programs adequately protected data and information systems. This report presents the results of our evaluation for the Commission for fiscal year 2015. RESULTS OF AUDIT Our fiscal year 2015 audit work found that the Commission had implemented the tested attributes of its cybersecurity program in a manner that was generally consistent with requirements established by the National Institute of Standards and Technology, the Office of Management and Budget, and the Department of Homeland Security. In particular, as a result of testing on a sample of targets within the Commission s unclassified internal network, including servers and workstations, nothing came to our attention to indicate that management, operating, and technical controls implemented within that environment were not operating effectively.

Based on our testwork, we concluded that the Commission s unclassified cybersecurity program had implemented the main attributes required by the Department of Homeland Security in each of the major topic areas tested. These topic areas included configuration management, identity and access management, incident response and reporting, risk management, security training, plans of action and milestones, remote access management, contingency planning, and contractor-managed systems. In addition, we determined that the Commission had defined and initiated implementation of a continuous monitoring program based on the maturity model developed by the Council of the Inspectors General for Integrity and Efficiency. However, the Commission had not fully implemented its continuous monitoring program. Because nothing came to our attention that would indicate significant control weaknesses in the areas tested, we are not making any recommendations or suggested actions relative to this audit. Attachment cc: Deputy Secretary Chief of Staff 2

Attachment OBJECTIVE, SCOPE, AND METHODOLOGY OBJECTIVE To determine whether the Federal Energy Regulatory Commission (Commission) unclassified cybersecurity program adequately protected data and information systems. SCOPE The audit was performed between June and October 2015 at the Commission s Headquarters in Washington, DC. Specifically, KPMG LLP (KPMG), the Office of Inspector General s contract auditor, performed an assessment of the Commission s unclassified cybersecurity program. This included a review of general and application controls in areas such as security management, access controls, configuration management, segregation of duties, and contingency planning. In addition, KPMG performed a vulnerability assessment on selected portions of the networks and systems managed by the Commission and reviewed the Commission s implementation of the Federal Information Security Modernization Act of 2014 (FISMA). The audit was conducted under Office of Inspector General project number A15TG042. METHODOLOGY To accomplish our objective, we: Reviewed Federal laws and regulations related to cybersecurity, such as FISMA, Office of Management and Budget memoranda, and National Institute of Standards and Technology standards and guidance. Evaluated the Commission in conjunction with its annual audit of the financial statements, utilizing work performed by KPMG. Office of Inspector General and KPMG work included analysis and testing of general and application controls for selected portions of the Commission s network and systems, technical review of the network configuration, and assessment of compliance with the requirements of FISMA, as established by the Office of Management and Budget and the Department of Homeland Security. Held discussions with Commission officials and reviewed relevant documentation. Reviewed prior reports issued by the Office of Inspector General and the Government Accountability Office. We conducted this audit in accordance with generally accepted Government auditing standards. Those standards require that we plan and perform the effort to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our finding and conclusions based on our audit objective. Accordingly, we assessed significant internal controls and the Commission s implementation of the GPRA Modernization Act of 2010 and 3

Attachment determined that it had established a performance measure for its information and unclassified cybersecurity program. Because our audit was limited, it would not have necessarily disclosed all internal control deficiencies that may have existed at the time of our audit. We relied on computer-processed data to satisfy our objective. In particular, computer-assisted audit tools were used to perform probes of various networks and drives. We validated the results of the scans by confirming weaknesses disclosed with responsible on-site personnel and performed other procedures to satisfy ourselves as to the reliability and competence of the data produced by the tests. Management waived an exit conference. 4

FEEDBACK The Office of Inspector General has a continuing interest in improving the usefulness of its products. We aim to make our reports as responsive as possible and ask you to consider sharing your thoughts with us. Please send your comments, suggestions, and feedback to OIG.Reports@hq.doe.gov and include your name, contact information, and the report number. You may also mail comments to us: Office of Inspector General (IG-12) Department of Energy Washington, DC 20585 If you want to discuss this report or your comments with a member of the Office of Inspector General staff, please contact our office at (202) 253-2162.