How To Write A Network Vulnerability Assessment For The Environment Protection Agency



Similar documents
EPA Needs to Improve Security Planning and Remediation of Identified Weaknesses in Systems Used to Protect Human Health and the Environment

Project Delays Prevent EPA from Implementing an Agency-wide Information Security Vulnerability Management Program

Briefing Report: Improvements Needed in EPA s Information Security Program

Controls Over EPA s Compass Financial System Need to Be Improved

EPA Can Better Assure Continued Operations at National Computer Center Through Complete and Up-to-Date Documentation for Contingency Planning

EPA Can Improve Managing of Working Capital Fund Overhead Costs

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Public May Be Making Indoor Mold Cleanup Decisions Based on EPA Tool Developed Only for Research Applications

U.S. Chemical Safety and Hazard Investigation Board Should Determine the Cost Effectiveness of Performing Improper Payment Recovery Audits

EPA Should Improve Its Contractor Performance Evaluation Process for Contractors Receiving Recovery Act Funds

Improvements Needed in EPA s Network Security Monitoring Program

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

The Environmental Careers Organization Reported Outlays for Five EPA Cooperative Agreements

Department of Homeland Security

Management Advisory Postal Service Transformation Plan (Report Number OE-MA )

INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK

AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL

The United States Secret Service Has Adequate Oversight and Management of its Acquisitions (Revised)

Security Concerns with Federal Emergency Management Agency's egrants Grant Management System

EPA Is Not Fully Aware of the Extent of Its Use of Cloud Computing Technologies

ACTING VICE PRESIDENT, INFORMATION TECHNOLOGY. Michael L. Thompson Acting Deputy Assistant Inspector General for Technology, Investment and Cost

March 17, 2015 OIG-15-43

Department of Homeland Security

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System

Time and Attendance Fraud Not Identified for Employees on Extended Absence, But Matters of Concern Brought to EPA s Attention

Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security

Department of Defense INSTRUCTION

Review of U.S. Coast Guard's FY 2014 Drug Control Performance Summary Report

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

2IÀFHRI,QVSHFWRU*HQHUDO

AUDIT OF SBA S SYSTEM AUDIT REPORT NUMBER 4-42 SEPTEMBER 10, 2004

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Monitoring of Government Travel Card Transactions

SECURITY WEAKNESSES IN DOT S COMMON OPERATING ENVIRONMENT EXPOSE ITS SYSTEMS AND DATA TO COMPROMISE

Department of Homeland Security

MANAGEMENT LETTER: ACCURACY OF DEPARTMENT OF VETERANS AFFAIRS PAYROLL DATA FOR FISCAL YEAR 1999

Software Inventory Management Greater Boston District

for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

SOCIAL SECURITY. July 19, 2004

Transcription:

U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Quick Reaction Report Catalyst for Improving the Environment Results of Technical Network Vulnerability Assessment: EPA s Ronald Reagan Building Report No. 10-P-01 September 7, 010

Report Contributors: Rudolph M. Brevard Charles Dade Cheryl Reid Michael Goode, Jr. Vincent Campbell

U.S. Environmental Protection Agency Office of Inspector General At a Glance 10-P-01 September 7, 010 Catalyst for Improving the Environment Why We Did This Review As part of the annual audit of the U.S. Environmental Protection Agency s (EPA s) compliance with the Federal Information Security Management Act, the Office of Inspector General (OIG) conducted network vulnerability testing of the Agency s network devices in EPA s Ronald Reagan Building located in Washington, DC. Background Network vulnerability testing was conducted to identify any network risk vulnerabilities and to present the results to the appropriate EPA officials, who can then promptly remediate or document planned actions to resolve the vulnerability. Results of Technical Network Vulnerability Assessment: EPA s Ronald Reagan Building What We Found Vulnerability testing of EPA s Ronald Reagan Building network conducted in June 010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities. The OIG met with EPA information security personnel to discuss the findings. If not resolved, these vulnerabilities could expose EPA s assets to unauthorized access and potentially harm the Agency s network. What We Recommend We recommend that the Director, Enterprise Desktop Solutions Division, Office of Environmental Information: Provide the OIG a status update for all identified high-risk and medium-risk vulnerability findings contained in this report. Create plans of action and milestones in the Agency s Automated Security Self-Evaluation and Remediation Tracking system for all vulnerabilities that cannot be corrected within 30 days of this report. Perform a technical vulnerability assessment test of assigned network resources within 60 days to confirm completion of remediation activities. Due to the sensitive nature of the report s technical findings, the attachments are not available to the public. For further information, contact our Office of Congressional, Public Affairs and Management at (0) 566-391. To view the full report, click on the following link: www.epa.gov/oig/reports/010/ 0100907-10-P-01.pdf

UNITED STATES ENVIRONMENTAL PROTECTION AGENCY WASHINGTON, D.C. 0460 THE INSPECTOR GENERAL September 7, 010 MEMORANDUM SUBJECT: Results of Technical Network Vulnerability Assessment: EPA s Ronald Reagan Building Report No. 10-P-01 FROM: TO: Arthur A. Elkins, Jr. Inspector General Johnny Davis, Jr. Director, Enterprise Desktop Solutions Division Office of Environmental Information Attached is the final technical network vulnerability assessment report prepared by the Office of Inspector General (OIG) of the U.S. Environmental Protection Agency (EPA). 1 The site assessment was conducted in conjunction with the Fiscal Year 010 Federal Information Security Management Act audit. Vulnerability testing of EPA s Ronald Reagan Building network conducted in June 010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities. We performed this audit from May through August 010 at EPA s Ronald Reagan Building in Washington, DC. We performed this audit in accordance with generally accepted government auditing standards. These standards require that we plan and perform the audit to obtain sufficient and appropriate evidence to provide a reasonable basis for our findings and conclusions based on the audit objectives. We believe the evidence obtained provides a reasonable basis for our findings and conclusions. We conducted testing to identify the existence of commonly known vulnerabilities using a commercially available network vulnerability assessment tool recognized by the National Institute of Standards and Technology. We tested Internet Protocol addresses provided by Agency representatives and identified as being associated with network resources controlled by your office. We used the risk ratings provided by the vulnerability software to determine the 1 A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a tested information system. A vulnerability assessment does not include a penetration test which would attempt to use the identified vulnerabilities to gain further access into the tested information system. 1

10-P-01 level of harm a vulnerability could cause to a network resource. We accepted the results from the software tool. The vulnerabilities identified by the software are disclosed in the attachments. The estimated cost for performing these tests and compiling this report is $7,68. Recommendations We recommend that the Director, Enterprise Desktop Solutions Division, Office of Environmental Information: 1. Provide the OIG a status update for all identified high-risk and medium-risk vulnerability findings contained in this report.. Create plans of action and milestones in the Agency s Automated Security Self- Evaluation and Remediation Tracking system for all vulnerabilities that cannot be corrected within 30 days of this report. 3. Perform a technical vulnerability assessment test of assigned network resources within 60 days to confirm completion of remediation activities. Action Required In accordance with EPA Manual 750, you are required to provide a written response to this report within 30 calendar days. You should include a corrective actions plan for agreed-upon actions, including milestone dates. Due to the sensitive nature of the report s technical findings, the full report will not be made available to the public. However, the OIG plans to publish the unrestricted version of this report, your response, and any corrective action plans on OIG s Website, which is available to the public. Therefore, we request that you provide your response to Recommendation 1 in a separate document. If you or your staff have any questions regarding this report, please contact Rudy Brevard at (0) 566-0893 or brevard.rudy@epa.gov.

10-P-01 Status of Recommendations and Potential Monetary Benefits RECOMMENDATIONS POTENTIAL MONETARY BENEFITS (in $000s) Rec. No. Page No. Subject Status 1 Action Official Planned Completion Date Claimed Amount Agreed To Amount 1 Provide the OIG a status update for all identified high-risk and medium-risk vulnerability findings contained in this report. U Director, Enterprise Desktop Solutions Division, Office of Environmental Information Create plans of action and milestones in the Agency s Automated Security Self-Evaluation and Remediation Tracking system for all vulnerabilities that cannot be corrected within 30 days of this report. U Director, Enterprise Desktop Solutions Division, Office of Environmental Information 3 Perform a technical vulnerability assessment test of assigned network resources within 60 days to confirm completion of remediation activities. U Director, Enterprise Desktop Solutions Division, Office of Environmental Information 1 O = recommendation is open with agreed-to corrective actions pending C = recommendation is closed with all agreed-to actions completed U = recommendation is undecided with resolution efforts in progress 3

10-P-01 Appendix A Distribution Office of the Administrator Assistant Administrator for Environmental Information and Chief Information Officer Director, Enterprise Desktop Solutions Division, Office of Environmental Information Acting Senior Agency Information Security Officer Acting Director, Technology and Information Security Staff Agency Follow-up Official (the CFO) Agency Follow-up Coordinator General Counsel Associate Administrator for Congressional and Intergovernmental Relations Associate Administrator for External Affairs and Environmental Education Audit Follow-up Coordinator, Office of Environmental Information Inspector General 4