Defense Acquisitions
Knowledge of Software Suppliers Needed to Manage Risks
Gao ID: GAO-04-678 May 25, 2004
The Department of Defense (DOD) is increasingly reliant on software and information systems for its weapon capabilities, and DOD prime contractors are subcontracting more of their software development. The increased reliance on software and a greater number of suppliers results in more opportunities to exploit vulnerabilities in defense software. In addition, DOD has reported that countries hostile to the United States are focusing resources on information warfare strategies. Therefore, software security, including the need for protection of software code from malicious activity, is an area of concern for many DOD programs. GAO was asked to examine DOD's efforts to (1) identify software development suppliers and (2) manage risks related to foreign involvement in software development on weapon systems.
DOD acquisition and software security policies do not fully address the risk of using foreign suppliers to develop weapon system software. The current acquisition guidance allows program officials discretion in managing foreign involvement in software development, without requiring them to identify and mitigate such risks. Moreover, other policies intended to mitigate information system vulnerabilities focus mostly on operational software security threats, such as external hacking and unauthorized access to information systems, but not on insider threats, such as the insertion of malicious code by software developers. Recent DOD initiatives may provide greater focus on these risks, but to date have not been adopted as practice within DOD. While DOD has begun to recognize potential risks from foreign software content, this is not always the case within the weapon programs where software is developed or acquired. Program officials for the systems in this review did not make foreign involvement in software development a specific element of their risk identification and mitigation efforts. As a result, program officials' knowledge of the foreign developed software included in their weapon systems varied. In addition, risk mitigation efforts emphasized program level risks, such as meeting program cost and schedule goals, instead of software security risks. Further, program officials often delegated risk mitigation and source selection to contractors who are primarily concerned with software functionality and quality assurance, rather than specifically addressing software security for development risks associated with foreign suppliers. Unless program officials provide specific guidance, contractors may favor business considerations over potential software development security risks associated with using foreign suppliers. As the amount of software on weapon systems increases, it becomes more difficult and costly to test every line of code. Further, DOD cannot afford to monitor all worldwide software development facilities or provide clearances for all potential software developers. Therefore, the program manager must know more about who is developing software and where early in the software acquisition process, so that it can be included as part of software source selection and risk mitigation decisions.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-04-678, Defense Acquisitions: Knowledge of Software Suppliers Needed to Manage Risks
This is the accessible text file for GAO report number GAO-04-678
entitled 'Defense Acquisitions: Knowledge of Software Suppliers Needed
to Manage Risks' which was released on May 25, 2004.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States General Accounting Office:
GAO:
May 2004:
DEFENSE ACQUISITIONS:
Knowledge of Software Suppliers Needed to Manage Risks:
GAO-04-678:
GAO Highlights:
Highlights of GAO-04-678, a report to congressional requesters
Why GAO Did This Study:
The Department of Defense (DOD) is increasingly reliant on software and
information systems for its weapon capabilities, and DOD prime
contractors are subcontracting more of their software development. The
increased reliance on software and a greater number of suppliers
results in more opportunities to exploit vulnerabilities in defense
software. In addition, DOD has reported that countries hostile to the
United States are focusing resources on information warfare strategies.
Therefore, software security, including the need for protection of
software code from malicious activity, is an area of concern for many
DOD programs.
GAO was asked to examine DOD‘s efforts to (1) identify software
development suppliers and (2) manage risks related to foreign
involvement in software development on weapon systems.
What GAO Found:
DOD acquisition and software security policies do not fully address the
risk of using foreign suppliers to develop weapon system software. The
current acquisition guidance allows program officials discretion in
managing foreign involvement in software development, without requiring
them to identify and mitigate such risks. Moreover, other policies
intended to mitigate information system vulnerabilities focus mostly on
operational software security threats, such as external hacking and
unauthorized access to information systems, but not on insider threats,
such as the insertion of malicious code by software developers. Recent
DOD initiatives may provide greater focus on these risks, but to date
have not been adopted as practice within DOD.
While DOD has begun to recognize potential risks from foreign software
content, this is not always the case within the weapon programs where
software is developed or acquired. Program officials for the systems in
this review did not make foreign involvement in software development a
specific element of their risk identification and mitigation efforts.
As a result, program officials‘ knowledge of the foreign developed
software included in their weapon systems varied. In addition, risk
mitigation efforts emphasized program level risks, such as meeting
program cost and schedule goals, instead of software security risks.
Further, program officials often delegated risk mitigation and source
selection to contractors who are primarily concerned with software
functionality and quality assurance, rather than specifically
addressing software security for development risks associated with
foreign suppliers. Unless program officials provide specific guidance,
contractors may favor business considerations over potential software
development security risks associated with using foreign suppliers.
As the amount of software on weapon systems increases, it becomes more
difficult and costly to test every line of code. Further, DOD cannot
afford to monitor all worldwide software development facilities or
provide clearances for all potential software developers. Therefore,
the program manager must know more about who is developing software and
where early in the software acquisition process, so that it can be
included as part of software source selection and risk mitigation
decisions.
What GAO Recommends:
To address software vulnerabilities and threats, GAO recommends that
DOD better define software security requirements and require program
managers to mitigate associated risks accordingly.
DOD agreed with the findings but only partially concurred with the
recommendations over concerns that they place too much responsibility
for risk mitigation with program managers. GAO has broadened the
recommendations to address DOD‘s concerns.
www.gao.gov/cgi-bin/getrpt?GAO-04-678.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Katherine Schinasi at
(202) 512-4841 or schinasik@gao.gov.
[End of section]
Contents:
Letter1:
Results in Brief:
Background:
DOD's Approach to Software Security Does Not Fully Address Risks from
Foreign Suppliers:
Program Officials Generally Did Not Manage Risks from Foreign-Developed
Software:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Scope and Methodology:
Appendix II: Comments from the Department of Defense:
Appendix III: Staff Acknowledgments:
Abbreviations:
COTS: commercial-off-the-shelf:
DITSCAP: Defense Information Technology Security Certification and
Accreditation Process:
DOD: Department of Defense:
DSS: Defense Security Service:
ITAR: International Traffic in Arms Regulations:
SEI: Software Engineering Institute:
United States General Accounting Office:
Washington, DC 20548:
May 25, 2004:
The Honorable Christopher Shays:
Chairman, Subcommittee on National Security, Emerging Threats and
International Relations:
Committee on Government Reform:
House of Representatives:
The Honorable Adam Putnam:
Chairman, Subcommittee on Technology, Information Policy,
Intergovernmental Relations and the Census:
Committee on Government Reform:
House of Representatives:
The Department of Defense (DOD) is experiencing significant and
increasing reliance on software and information systems for its weapon
capabilities, while at the same time traditional DOD prime contractors
are subcontracting more of their software development to lower tier and
sometimes nontraditional defense suppliers. Because of economic
incentives and business relationships, these suppliers are using
offshore locations and foreign companies to complete various software
development and support tasks. DOD is also using more commercial-off-
the-shelf (COTS) software[Footnote 1] to reduce development costs and
allow for frequent technology updates, which further increases the
number of software developers with either direct or indirect access to
weapon system software. The increased dependence on software
capability, combined with an exposure to a greater variety of
suppliers, results in more opportunities to exploit vulnerabilities in
defense software. Software security, including the protection of
software code from hacking and other malicious tampering, is therefore
an area of concern for many DOD systems.
As DOD's need for software increases, knowledge about foreign
suppliers[Footnote 2] in software development is critical for
identifying and mitigating risks. Multiple national security policies
and other guidance recognize the inherent risks associated with foreign
access to sensitive information and technology. For 2001, the Defense
Security Service (DSS) reported a significant increase in suspicious
attempts by foreign entities to access U.S. technology and information,
with one-third of that activity coming from foreign government-
sponsored or affiliated entities. While both U. S.-and foreign-
developed software are vulnerable to malicious tampering, DSS
specifically noted a concern with the potential exploitation of
software developed in foreign research facilities and software
companies located outside the United States working on commercial
projects related to classified or sensitive programs. As foreign
companies and individuals play a more significant role in software
development activities, the need for knowledge to manage associated
risks also increases. At your request, we (1) examined DOD's efforts to
identify and address risks associated with foreign involvement in
software development in weapon systems and (2) determined how weapon
system program offices manage these risks in individual programs.
To perform our work, we collected information from various DOD
officials and software development experts and reviewed relevant
guidance and procedures for software development security. We
identified 16 DOD weapon systems of varying age and software capability
and solicited information from system program offices and prime
contractors. Complete details of our scope and methodology are located
in appendix I. We performed our work from April 2003 to May 2004 in
accordance with generally accepted government auditing standards.
Results in Brief:
DOD acquisition and software security policies do not require program
managers to identify and manage the risks of using foreign suppliers to
develop weapon system software. The primary focus of the acquisition
policies is to acquire weapon systems to improve military capability in
a timely and cost-effective manner. Despite the inherent risks
associated with foreign access to sensitive information and technology,
the guidance allows program officials discretion in managing risks
related to foreign involvement in software development. Other
requirements and policies intended to mitigate information system
vulnerabilities focus primarily on operational software security
threats, such as external hacking and unauthorized access to
information systems, but not on insider threats such as the insertion
of malicious code by software developers. While recent DOD initiatives,
such as the establishment of working groups to evaluate software
products and security processes, may help to increase DOD's focus on
software security and may lead to the development and identification of
several potential software security best practices, they have yet to be
implemented in weapon acquisition programs.
Given broad discretion, program officials for 11 of the 16 software
intensive weapon systems we reviewed did not make foreign involvement
in software development a specific element of their risk management
efforts. As a result, the program offices had varying levels of
awareness of the extent of software developed by foreign suppliers on
their systems. Program officials generally did not consider the risks
associated with foreign suppliers substantial enough to justify
specific attention, and instead focused their resources on meeting
software development cost and schedule goals while ensuring software
functionality and quality. In addition, most of the program offices
relied on their defense contractors to select software subcontractors
and ensure that best available software development practices were
being used, such as peer review and software testing. Without specific
guidance from program officials, contractors primarily focused their
software development efforts on meeting stated performance
requirements, such as software quality and functionality, rather than
mitigating potential software development security risks associated
with using foreign suppliers. Contractors that excluded foreign
suppliers from their programs' software development did so to avoid the
additional costs and resources needed to mitigate the risks of using
such suppliers.
As the amount of software on weapon systems increases, it becomes more
difficult and costly to test every line of code, and DOD cannot afford
to monitor all worldwide software development facilities or provide
clearances for all potential software developers. Program managers who
know more about potential software development suppliers early in the
software acquisition process will be better equipped to include
software security as part of source selection and risk mitigation
decisions. Therefore, we are making three recommendations to the
Secretary of Defense to ensure such knowledge is available to address
risks attributable to software vulnerabilities and threats. In written
comments on a draft of this report, DOD agreed with our findings that
malicious code is a threat that is not adequately addressed in current
acquisition policies and security procedures and stated that the
department is working to strengthen software related risk management
activities. However, DOD only partially agreed with our recommendations
over concerns that responsibility for mitigating risks would be placed
on program managers and software assurance experts alone. We made
adjustments to our recommendations to acknowledge the value of having
other DOD organizations involved in software security risk management.
Background:
To protect the security of the United States, DOD relies on a complex
array of computer-dependent and mutually supportive organizational
components, including the military services and defense agencies. It
also relies on a broad array of computer systems, including weapon
systems, command and control systems, financial systems, personnel
systems, payment systems, and others. These systems are, in turn,
connected with other systems operated by contractors, other government
agencies, and international organizations. In addition, performance
requirements for weapon systems have become increasingly demanding, and
breakthroughs in software capability have led to a greater reliance on
software to provide more weapon capability when hardware limitations
are reached. As such, DOD weapon systems are subject to many risks that
arise from exploitable software vulnerabilities. Software code that is
poorly developed or purposely injected with malicious code could be
used to disrupt these and other DOD information systems, and
potentially others connected to the DOD systems.
DOD has reported that countries hostile to the United States are
focusing resources on developing information warfare strategies. For
example, a DSS report noted that in 2001 there was a significant
increase in suspicious attempts by foreign entities to access U.S.
technology and information and that trend is expected to continue.
Information systems technology was the most sought after militarily
critical technology by these entities. Forty-four countries were
associated with attempts at accessing U.S. information technology, with
33 percent of the activity coming from foreign government-sponsored or
affiliated entities. Because the U.S. defense industry is at the
forefront of advanced design and development of weapon systems that
include militarily critical technologies, access is sought after for
industrial and financial purposes. Access to these technologies by
potential adversaries could enhance the performance of their military
systems and may be used to counter U.S. capabilities. DSS specifically
noted a concern with exploitation or insertion of malicious code with
the use of foreign research facilities and software development
companies located outside the United States working on commercial
projects related to classified or sensitive programs.
Multiple requirements and guidance are in place to ensure the
protection of U.S. national security interests. They generally
acknowledge the inherent risk associated with foreign access to
classified and export-controlled information and technology by
establishing procedures to manage such access. For example, the
National Industrial Security Program Operation Manual[Footnote 3]
establishes mandatory procedures for the safeguarding of classified
information that is released to U.S. government contractors. It
generally limits access to U.S. citizens with appropriate security
clearances and establishes eligibility policies for U.S. contractors
determined to have foreign ownership, control, or influence. Further,
an additional DOD directive requires programs containing classified
military information to have controls to prevent the unauthorized
release of this information to foreign recipients.[Footnote 4] In
addition, the International Traffic in Arms Regulations (ITAR) controls
foreign access to defense articles and services through the
establishment of the export license and authorization process. U.S.
entities, including defense contractors, may apply to the Department of
State for authorization to export controlled information and technology
to qualified foreign recipients, which is determined through the
approval or denial of license requests.
DOD estimates that it spends about 40 percent of its Research,
Development, Test, and Evaluation budget on software--$21 billion for
fiscal year 2003. Furthermore, DOD and industry experience indicates
that about $8 billion of that amount may be spent on reworking software
because of quality-related issues. Carnegie Mellon University's
Software Engineering Institute (SEI), recognized for its expertise in
developing best practices for software processes, has developed models
and methods that define and determine organizations' software process
maturity. Better software development practices are seen as a way to
reduce the number of software defects and therefore improve overall
software quality, but alone the practices cannot be expected to address
malicious software development activities intended to breach security.
To underscore the importance of securing software-related products, the
Office of the Assistant Secretary of Defense (Networks and Information
Integration) and the Federal Aviation Administration Chief Information
Office are co-sponsoring, with the involvement of the Department of
Energy, the National Aeronautics and Space Administration, and SEI, a
project aimed at developing ways to provide safety and security
assurance extensions to integrated software maturity models.
DOD's Approach to Software Security Does Not Fully Address Risks from
Foreign Suppliers:
DOD's approach to software development and acquisition generally
focuses on improving overall quality, leaving decision making on
software suppliers and security with individual program managers.
Despite the risks associated with foreign access to defense systems,
DOD acquisition policy does not require program managers to identify
and manage the amount of foreign involvement for software development
in weapon systems. DOD information system security requirements focus
on operational software threats, rather than potential threats posed by
software developers. While recent DOD initiatives could increase DOD's
focus on software security, efforts to date have not translated into
greater knowledge for program managers about foreign software
development activities.
DOD Acquisition Policy Allows Discretion in Managing Foreign Software
Suppliers:
DOD acquisition policy[Footnote 5] allows program managers discretion
in managing foreign suppliers used for software development. This
policy consists of general guidance for meeting overall acquisition
management principles and instructs program managers to use systems
engineering practices, when applicable, that focus on cost, schedule,
and performance of the system. For software acquisition, program
managers are encouraged to develop open software systems architectures,
use COTS computer system products, and allow incremental improvements
based on reusable software. All of these practices, while having the
potential to benefit cost and schedule for weapon programs, could
result in greater software vulnerabilities by introducing potentially
malicious code from unknown software development sources. While DOD
acquisition policy requires major weapon programs to maintain
information about the software project's size, effort, schedule, and
quality to track the cost-related implications of software development,
it does not require program managers to identify and manage suppliers
or the potential security risks from foreign suppliers.
On October 30, 2002, DOD issued the Interim Defense Acquisition
Guidebook, which contained the following security considerations to be
used when foreign nationals participate in software development.
* The change control process[Footnote 6] shall indicate whether foreign
nationals, in any way, participated in software development,
modification, or remediation.
* Foreign nationals employed by contractors or subcontractors to
develop, modify, or remediate software code specifically for DOD shall
each have a security clearance commensurate with the level of the
program in which the software is being used.
* Primary vendors on DOD contracts may have subcontractors who employ
cleared foreign nationals that work only in a certified or accredited
environment.
* DOD software with coding done in foreign environments or by foreign
nationals shall be reviewed by software quality assurance personnel for
malicious code.
* Vendors of COTS software that demonstrate efforts to minimize the
security risks associated with foreign nationals that have developed,
modified, or remediated the COTS software being offered shall be given
preference during the contracting process in product selection or
evaluation.
* Software quality assurance personnel shall check software sent to
locations not directly controlled by DOD or its contractors for
malicious code when returned to the DOD contractors' facilities.
While this guidance acknowledges the additional risks from using
foreign nationals in software development, it is not mandatory and,
according to the Guidebook, is to be used at the discretion of
acquisition program managers as best practices or lessons learned. Even
if the suggested guidance was implemented, the procedures for
addressing software security are generally for use after software
suppliers have been selected, and do not provide the program manager
the opportunity to evaluate whether the risks associated with using
those suppliers for software development are acceptable. Further,
several of these procedures would not apply when contractors use
foreign nationals to develop unclassified portions of software
programs. In support of DOD guidance, Air Force, Army, and Navy
regulations implement DOD-wide acquisition policies. As such, they
defer to DOD guidance and do not specifically address software security
issues and related risks that may be inherent with foreign software
development.
Information Assurance Focuses on Mitigating Operational Software
Security Risks, Leaving Internal Software Development Vulnerable:
Laws, requirements, and policies that are intended to provide
information assurance for operational security do not fully address
risks during software development. Under the Federal Information
Security Management Act of 2002, all executive agencies, including DOD,
are required to ensure that information security policies, procedures,
and practices are adequate.[Footnote 7] In this regard, DOD is required
to carry out an information assurance program that includes the
development of essential information assurances technologies and
programs.[Footnote 8] Generally, this includes a review of security
features and information technology system safeguards. For example,
DOD's information assurance policy establishes procedures to maintain
the integrity of DOD information systems.[Footnote 9] It sets out a
process for all DOD information systems to achieve, among other things,
an appropriate level of confidentiality, integrity, knowledge of
threats and vulnerabilities, trustworthiness of users and
interconnecting systems, and cost effectiveness. These procedures are
intended to mitigate system vulnerabilities from operational threats,
such as external hacking and unauthorized access to information
systems. However, they do not apply to internal threats that could
affect the integrity of the software, such as the insertion of
malicious code during software development. In implementing its
information assurance policy, DOD also relies on other governmentwide
policies and standards. For example, DOD requires the evaluation and
validation of information assurance software products, such as
firewalls and intrusion detection systems, in accordance with National
Security Telecommunications and Information Systems Security Policy No.
11.[Footnote 10] This policy requires the use of one of three
nationally recognized evaluation and validation standards.[Footnote
11] However, these policies and standards do not include criteria to
specifically identify and manage the use of foreign software suppliers.
To assist systems in meeting information assurance requirements, DOD
has developed the Defense Information Technology Security Certification
and Accreditation Process (DITSCAP) as a standardized evaluation
process.[Footnote 12] This process includes a review by a designated
approving official who certifies that the security features and
information technology system safeguards will maintain information
assurance through the life cycle of a system. The process results in an
agreement between the program manager, the intended user of the system
being certified, and the approval authorities that defines critical
schedule, budget, security, functionality, and performance issues. The
process includes a requirement for a threat assessment, but does not
articulate how this information should be developed or reported. As
such, it does not direct program managers to consider foreign
involvement in software development as a risk or threat that needs to
be addressed for information system security. In addition, while the
process is mandatory, the implementation details may be tailored and,
in some cases, integrated with other acquisition activities and
documentation. According to DOD Software Assurance Program officials,
the DITSCAP approving authority is not expected to evaluate whether the
risks have been identified appropriately, only that the process will
mitigate the risks identified. If the program manager has not
identified risks from foreign suppliers, the process cannot be expected
to mitigate them.
DOD also requires weapon programs to protect certain types of
information during transfer of technology to foreign entities. For
example, documents such as the Technology Assessment/Control Plan and
the Program Protection Plan address the risks associated with the
potential release of information to foreign governments through
cooperative programs and foreign military sales, but the documents do
not provide information on specific suppliers who will be performing
work, such as software developers. The Technology Assessment/Control
Plan establishes planning requirements for the potential release of
sensitive information to foreign entities involved in cooperative
programs or purchasing military equipment. It evaluates the risk of
releasing critical military capability or sensitive information and
technology against the benefit of the sale to the United States. The
plan also outlines the security requirements to prevent compromise. The
purpose of the Program Protection Plan is to identify measures to
protect Critical Program Information[Footnote 13] from hostile
collection efforts and unauthorized disclosure during the acquisition
process.
Initiatives to Address Software Concerns Have Yet to be Implemented:
While DOD has taken steps to strengthen software acquisition practices,
it has yet to implement practices to better manage software development
security risks in weapon programs. Currently, each of the military
services is developing plans for improving software acquisition. The
improvement plans are each at varying stages of development and include
practices such as pilot programs for providing information on software
metrics, additional training programs, and teaming arrangements with
SEI for improved overall software management. DOD has also begun
policy-level initiatives focused on better software management and on
identifying and specifying software security processes and technologies
to protect systems and network capabilities from various internal and
external threats. Specific initiatives include the following:
* The Tri-Service Assessment Initiative began in 1999 to strengthen
software acquisition and development as well as address repeated
performance shortfalls attributed to software. Task forces conducted
detailed assessments of software-intensive programs to identity
potential improvements in overall software acquisition processes.
* A source selection criteria working group is tasked with clarifying
the policy on source selection criteria for software intensive systems
and the application of software product maturity measures. Another
working group is tasked with developing a proposal for a centralized
clearinghouse of software best practices, but DOD has not approved any
proposals.
* In October 2003, the Office of the Assistant Secretary of Defense
(Networks and Information Integration) established the position of
Deputy Director for Software Assurance that is, as part of its
function, to coordinate software security efforts with other existing
initiatives concerning software protection, antitamper technologies,
and software producibility. In addition, since its inception, the
office has initiated working groups intended to focus on mitigating
software risks and improving software security. To date, while these
initiatives have presented top level findings and recommendations
within DOD and in public forums, they have not externally published
reports or obtained funding for implementing the recommendations.
While these plans and initiatives may help to increase DOD's focus on
software security and may lead to the development and identification of
several potential software security best practices, DOD software
assurance officials acknowledge that significant effort remains to
adequately mitigate software risks to weapon systems.
Program Officials Generally Did Not Manage Risks from Foreign-Developed
Software:
While DOD initiatives have begun to recognize potential risks from
foreign software suppliers, this is not always the case within the
weapon programs where software is developed or acquired. Program
officials for most of the systems we reviewed did not make foreign
involvement in software development a specific element of their risk
identification and mitigation efforts. As a result, program officials'
knowledge of the foreign-developed software included in their weapon
systems varied. In addition, risk mitigation efforts emphasized program
level risks, such as meeting program cost and schedule goals, instead
of software security risks. Further, program managers often delegated
risk mitigation and source selection to their prime contractors who
tended to be concerned with software functionality and quality
assurance, rather than specifically addressing software development
risks associated with foreign suppliers.
Program Office Knowledge of Software Suppliers Varied Across Weapon
Systems:
Knowledge of the extent of foreign involvement in software development
varied greatly for the 16 weapon system programs we reviewed. Overall,
the knowledge program managers had was based on the function of the
software being developed, the manner in which it was acquired, and the
specific handling requirements. While none of these programs could
fully identify all foreign-developed software for their systems, six
program offices had significant knowledge of foreign software
developers.
Knowledge of software developed for weapon systems can vary based on
the different functions needed to meet mission requirements. Program
offices were most knowledgeable about the foreign-developed software
for the onboard portions of their programs, with 4 program offices able
to identify all the software produced by foreign suppliers, and 11
program offices able to identify at least some of the software produced
by foreign suppliers. Onboard software is that which actually runs the
weapon system, even if that software is not located on the main
component (aircraft, missile, satellite, etc). For example, onboard
software for a missile system could include software located on a
remote platform used to guide the missile toward its target. Because
onboard software is the most critical for meeting mission requirements
and other program goals, program managers placed greater emphasis on
the quality, functionality, and usually, the security of this software.
In 9 of the systems we reviewed, either prime contractors or major
subcontractors conducted software development for the onboard systems.
However, in meeting with prime contractors, we found that while this
increased their knowledge about foreign software suppliers, the
information was not always shared with government program managers, and
therefore was not available for them to use to make risk management
decisions to address software security.
Program offices and contractors reported very little knowledge about
the level of foreign involvement for offboard software. This software,
sometimes referred to as ground based, interacts with the onboard
system to provide updated information in support of operational
activity. For example, one program uses standard mission planning
software that interacts with the onboard flight software to provide
information used for navigation and targeting. In addition, offboard
software is often used to check for errors or malicious code and to
produce, maintain, or verify onboard software. Program officials from
10 of the programs we reviewed indicated they had very little knowledge
of the developers for their offboard software, including those portions
that may have been developed by foreign suppliers.
As DOD is attempting to find new ways of reducing the time and money it
takes to develop software code, the increased use of COTS software may
introduce additional risks and further limit visibility into the
existence of foreign-developed software. Officials for 13 of the
programs reviewed had almost no insight into the use of foreign
developers for any COTS software placed on their systems. Even when
procured directly from a known supplier, program officials could not
guarantee whether additional subcontractors were used for software
development. According to DOD and program officials, visibility into
COTS software is limited by the willingness of the producers of that
software to share information on how the code was developed. For one
program we reviewed, a substantial portion of the system was a
commercial acquisition. As such, the software product was not
originally developed for DOD and therefore the program office had no
knowledge of software development suppliers because it did not purchase
the rights to the software. Further, officials from five programs told
us that the cost of identifying and managing foreign software
suppliers, especially for COTS software, could be substantial.
Officials from two programs said that even if available, this
information would not offer significant software security improvements
in light of the cost required for identifying foreign suppliers of COTS
software. DOD and program officials have indicated that commercial
software producers often demand a cost premium to share software and
source code information that would be required to determine this
information.
Similar to COTS, software from other applications and embedded software
is often accepted without full knowledge of the source of development.
Legacy, or reused code, is most prevalent when software programs are
updated into newer versions or when software just requires editing and
enhancing the older code rather than developing new code. When asked to
produce software similar to what they have developed previously,
manufacturers can use all or part of the legacy code as a basis for
developing or modifying the new code. Ten of the programs reviewed
accepted legacy software without fully identifying the sources of
development. Software is also developed as part of the hardware
components it is tasked with managing. This embedded software is used
to control other electronic hardware products, either onboard or
offboard the weapon system, and is often purchased from lower tier
subcontractors. While we did not specifically ask for information on
foreign suppliers responsible for embedded software, officials for two
of the programs reviewed stated that this software tends to include
more reused and COTS software. These officials indicated that this
could limit the visibility of the software suppliers because acceptance
testing was usually only performed to prove functionality and the
software was not further evaluated to determine the actual source that
developed the software code. Further, DOD and prime contractor
officials told us that it is sometimes difficult to determine whether
the actual hardware subcontractor developed embedded software, or if it
was done by a software developer hired by that subcontractor, thus
further reducing visibility of software suppliers.
While most of the program offices we reviewed did not specifically
track foreign software suppliers for security purposes, almost all of
the programs had opportunities to gain such knowledge through practices
designed to collect other information. One way program offices obtained
information on software suppliers was through requirements in their
prime contracts. Many of the program offices in our review were able to
obtain some information on software suppliers, either directly or
indirectly, because it was contractually required. In some cases, this
information was available early in the proposal process when bidders
were required to identify suppliers they intended to use in the
development and manufacturing phases, including potential foreign
suppliers and components they were expected to provide. For example,
officials from one program office said they were effective in
determining software suppliers at the prime and subcontractor levels
because they were intimately involved with source selection and
contract negotiation. However, only five of the prime contractors
reported that they were required to notify the program office
concerning their decisions on software subcontracting. Once a winning
bidder is selected, more information is often available to the program
manager. For example, contracts for 12 programs contained a requirement
that the contractors provide a software development plan that included
information on some of their planned suppliers, development risks, and
action plans for the contract period. In at least two cases, program
software managers became aware of foreign software suppliers while
collecting information requested for this review.
Program officials also said that some knowledge of foreign software
development was available as a result of procedures in place because
their programs contained classified or technical program information.
For example, of the six programs that had significant knowledge of
foreign software suppliers, four reported they had very few foreign
suppliers because handling restrictions for classified information
precluded the involvement of such suppliers, not because they were
specifically managing software development risks. Similarly,
contractors for 12 programs had information available from the export
license process. While limited information on the supplier and location
of foreign entities performing software work was available from export
licenses, contractors request approval directly from the State
Department, which may not refer the application to DOD or the
individual program offices. Consequently, program managers likely did
not have this information available for use in software risk management
decisions.
Program Risk Mitigation Efforts Are Focused on Meeting Performance
Requirements and Are Often Delegated to Contractors:
The relative importance of software security in risk mitigation efforts
also varied greatly across the systems we reviewed. For 11 of the 16
systems, program managers have not identified foreign supplier
involvement in software development as a significant risk to the
security of their weapon systems. Instead, program managers concerned
with completing their programs on budget and on schedule generally
focused risk mitigation efforts on program level risks associated with
the performance of system components, not on internal software
development security risks. When specifically identified, software
risks are usually defined by their impact when integrated with these
system level risks and do not specifically focus on foreign suppliers
used in software development. Software generally only becomes a concern
for program managers as it begins to affect the cost or schedule of the
program. For example, one of the programs we reviewed lists "software
executibility" as a program level risk. The risk is based on potential
cost and schedule overruns should the software not function as needed
to allow related system components to meet mission requirements, rather
than potential vulnerabilities from foreign suppliers. For these
programs, security risks have generally been implemented to prevent
unauthorized access to classified or technical program information,
provide security at contractor facilities, and limit access to export-
controlled technical information in accordance with ITAR license
requirements, rather than specifically for software security. In
addition, 12 of the programs used the Technology Assessment/Control
Plan and the Program Protection Plan to ensure that risks associated
with foreign participation on the program were addressed.
Programs that identified software security as a risk focused on
limiting foreign access to software development facilities and denying
foreign access to software code. In addition, these programs employed
various measures to address software security consistent with
information assurance requirements. These measures included the use of
password protection, firewalls, or encrypted software, but they did not
always focus on risks from foreign involvement in software development.
Further, 11 programs mentioned using DITSCAP as a means for addressing
general software security. However, interpretation and implementation
of this requirement can vary across programs. For example, according to
officials from two programs, the current DITSCAP requirements do not
govern contractors in cases where the requirements were not included as
part of the original contract. Representatives from two of the programs
we reviewed noted that guidance for implementing DITSCAP was confusing
and that they were uncertain whether the process applied to their
programs. Program officials responsible for software development on one
other program indicated that they had no knowledge of this process. In
cases where DITSCAP is being implemented, the certification and
accreditation process requirements are determined based on the program
manager's assessment of risks. If the program manager has not
identified foreign software development as a program risk or threat, it
will not be addressed by the process.
Because security and software risks are generally defined in terms of
programmatic elements, program managers often delegate the
identification and mitigation responsibility to the contractors who are
developing the system and are therefore more knowledgeable about what
functions are needed from the software. Officials from eight of the
programs we reviewed said they expect contractors to ensure quality and
security on their systems because their software development processes
are more mature than those required by DOD, and that such practices
could indirectly address foreign software risks. For example,
contractors for these eight programs were presumed to be addressing
software security because they were employing practices such as peer
review [Footnote 14] and software testing consistent with SEI
development models.[Footnote 15] Peer review is recognized as a best
practice for improving software development and is generally performed
to improve the quality and functionality of software code. In terms of
security, peer review can reduce the likelihood that an individual
programmer can insert malicious or other harmful code. Through
dedicated software testing, teams assess the quality of the software to
uncover gaps and make it as defect-free as possible. However, on eight
of the programs we reviewed, decisions on the amount of software code
to test were made based upon the risks and benefits to the
functionality of the system to be tested, not on the benefits to
security. DOD and SEI officials said that the amount of effort needed
to comprehensively test every line of code to ensure complete security
could be physically impossible and would require immense resources.
Because contractors for the weapon systems we reviewed had not received
specific direction from program managers to address risks from foreign
suppliers in software development, they tended to focus on development
efforts aimed at meeting stated requirements, such as software quality
and functionality. In fact, officials from the 15 contractors that
responded to our review indicated this was the focus of their software
development activities. While SEI representatives told us that rigorous
software development could help improve the quality and functionality
of software by decreasing the number of errors in software code, they
also said that alone their models should never be expected to
completely address software security risks. Officials from one
contractor we interviewed that employs practices consistent with SEI's
highest level indicated that unless software security is a specific
contract requirement, they would not modify their practices to address
associated risks. SEI experts confirmed that the models they have
developed do not include a security element and are not intended to
certify that improved processes will address risks related to software
security. In fact, it is possible that using software development
practices to increase efficiency could lead to an increase in security
vulnerability by encouraging the use of legacy and COTS software,
unless risks are managed appropriately.
For several programs we reviewed, contractors made risk identification
and mitigation decisions for business reasons and to avoid additional
resource burdens (i.e., cost and access) associated with incorporating
foreign suppliers necessary for software development, as opposed to
being done for security reasons. For example, prime contractors for two
programs did not use foreign subcontractors for economic reasons;
namely the company wanted to maintain the software expertise within the
company. While restricting foreign access solely for economic reasons
could result in a decrease in software development security risks, it
might also preclude foreign suppliers that could offer new capability
or lower costs to the government. For example, contractor officials for
three weapon systems told us that they restrict foreign involvement in
software development because it costs too much to develop and monitor
security procedures to separate foreign nationals from classified and
sensitive information, not because they feel their involvement is a
risk to the program. In yet another case, the contractor did not want
to create dedicated partitions, such as firewalls, required to prevent
employees from a foreign subcontractor from accessing unauthorized
information in the system design database and instead contracted with a
domestic supplier. Finally, software managers for one program told us
that when foreign nationals modify or update software they had
developed, it was necessary to isolate test facilities to meet security
requirements, which resulted in increased cost and delays to other test
activities. The officials said that, in similar cases, contracting
decisions might sometimes be made in favor of U.S. suppliers to avoid
costs and delays.
Conclusions:
Because software is increasingly responsible for advances in weapon
system capabilities, it is essential that DOD and program managers take
appropriate steps to identify and manage software-related risks. While
DOD has made improvements to system engineering and software
development practices that can reduce the likelihood of defects in
software code, current methods of testing focus on the quality of
software and related functionality and failures, which will not
necessarily uncover malicious intent. As the amount of software on
weapon systems increases, it becomes more difficult and costly to test
every line of code. Further, DOD cannot afford to monitor all worldwide
software development facilities or provide clearances for all potential
software developers, especially for COTS software. Given the global
nature of the software industry, which offers benefits to software cost
and functionality needed by weapon systems, DOD also cannot afford to
exclude all foreign suppliers from its programs. While program managers
should be allowed discretion in managing their acquisitions, they are
responsible for knowing more about who is developing software and where
and for working with DOD's software assurance resources, and other
organizations as necessary, so that risks can be identified and
assessed accordingly. Unless this is done early in the software
acquisition process, it cannot be included as part of software source
selection and risk mitigation decisions and could result in increased
cost and less effective security measures if risks have to be addressed
later in the acquisition process.
Recommendations for Executive Action:
We have previously made recommendations to DOD to adopt more effective
software development practices and to increase oversight of software
intensive systems to improve acquisition outcomes. While DOD attempts
to better its software acquisition policies and implement new
initiatives, it must take steps to ensure that security is an integral
element in decision making and that program managers mitigate risks
accordingly. We recommend that the Secretary of Defense take the
following three actions to address risks attributable to software
vulnerabilities and threats:
* Require program managers, working with software assurance experts,
acquisition personnel, and other organizations as necessary, to
specifically define software security requirements, including those for
identifying and managing software suppliers. These requirements should
then be communicated as part of the prime development contract, to be
used as part of the criteria to select software suppliers.
* Based on defined software security requirements, require program
managers to collect and maintain information on software suppliers,
including software from foreign suppliers. This information should be
evaluated periodically to assess changes in the status of suppliers and
adjustments to program security requirements.
* Require the Office of the Assistant Secretary of Defense for Networks
and Information Integration and the Office of the Undersecretary of
Defense for Acquisition Technology and Logistics, as part of their role
to review, oversee, and formulate security and acquisition practices,
to work with other organizations as necessary to ensure that weapon
program risk assessments include specific attention to software
development risks and threats, including those from foreign suppliers.
For example, certification and accreditation processes, such as
DITSCAP, should include verification that software development
practices contain adequate security measures to address identified
risks and threats.
Agency Comments and Our Evaluation:
In written comments on a draft of this report, DOD agreed with our
findings that malicious code is a threat that is not adequately
addressed in current acquisition policies and security procedures and
stated that the department is working to strengthen software related
risk management activities. DOD also noted the need to enhance its risk
management processes to factor in vulnerabilities analysis of proposed
software products, security risks of suppliers' processes, and
counterintelligence threat information. DOD partially concurred with
our three recommendations based on the concern that they place too much
responsibility for risk mitigation on program managers. Although the
draft report recognized that software assurance experts from the Office
of the Assistant Secretary of Defense for Networks and Information
Integration were necessary to support program managers in risk
mitigation efforts, we broadened two of our recommendations to include
acquisition and other organizations to address this concern. DOD also
provided separate technical comments that we incorporated into the
report as appropriate. DOD's letter is reprinted in appendix II.
DOD agreed that software security risks should be defined for DOD
weapon programs, but noted that program managers should not be solely
responsible for defining security requirements, including those for
identifying and managing software suppliers. Instead, DOD stated that
program managers should be able to rely on external resources to gain
threat information on suppliers and that formulation and oversight of
security practices should be a collaborative function among several
offices within DOD. While we continue to believe that program managers
and software assurance experts play a critical role in defining
software security requirements, we do see the value of involving other
DOD resources to provide coordinated evaluation of broader security
concerns. As such, we modified our recommendation to reflect the
inclusion of acquisition personnel and other organizations as
necessary.
DOD also agreed that information on software suppliers, including
foreign suppliers, should be collected and that this information should
be periodically assessed to determine if adjustments to security
requirements are needed. However, DOD indicated that centralized
information on software suppliers is necessary because the cost of
collecting and maintaining this information would require resources and
assets beyond those of individual program managers. DOD indicated its
intent to develop a database to identify, track, and maintain
information on security risks from specific software suppliers, which
could be used by program managers across various weapon and other
programs for developing acquisition strategies, plans, requests for
proposals, and contracts. While we agree that such a database would be
helpful to program managers in collecting and maintaining information
on software suppliers, we made no change to the recommendation because
the program managers should be responsible for collecting this
information until such a database is developed and for directing the
collection of information from the database once it is completed.
Finally, DOD agreed that it should ensure that program risk assessments
include specific attention to software development risks, including
those from foreign suppliers. However, DOD suggested that this might be
best accomplished through collaboration between the Office of the
Assistant Secretary of Defense for Networks and Information
Integration, the Office of the Undersecretary of Defense for
Acquisition Technology and Logistics, and the Office of the
Undersecretary of Defense for Intelligence. This seemed reasonable, and
we adjusted our recommendation to reflect the inclusion of other
organizations. Further, DOD agreed certification activities such as
DITSCAP can assist in addressing insider threats in software
development, but that additional guidance is necessary to ensure that
software security risks are addressed during system design and
development or when selecting software sources.
We are sending copies of this report to interested congressional
committees; the Secretary of Defense; the Secretaries of the Air Force,
Army, and Navy; the Commandant of the Marine Corps; and the Director,
Office of Management and Budget. We will also make copies available to
others upon request. In addition, this report will be available at no
charge on the GAO Web site at http://www.gao.gov.
If you or your staff have any questions about this report, please
contact me at (202) 512-4841. Staff acknowledgments are listed in
appendix III.
Signed by:
Katherine V. Schinasi,
Managing Director,
Acquisition and Sourcing Management:
[End of section]
Appendix I: Scope and Methodology:
To determine how the Department of Defense (DOD) measures the extent of
foreign involvement in software development in weapon systems and how
risks associated with using foreign suppliers for software development
are measured and mitigated, we reviewed relevant DOD guidance,
policies, regulations, and procedures. In addition, we spoke with DOD
officials from the Office of the Under Secretary of Defense
(Acquisition Technology & Logistics), the National Security Agency, the
Defense Information Systems Agency, the Defense Advanced Research
Projects Agency, the Office of the Assistant Secretary of Defense
(Networks and Information Integration), the Department of the Army, the
Department of the Air Force, and the Department of the Navy. We met
with software experts at the Software Engineering Institute of Carnegie
Mellon University to obtain information on software development
practices and risk identification and mitigation techniques used by the
software industry. Additionally, we met with the Association of Old
Crows (The Electronic Warfare and Information Operations Association)
whose membership includes individuals and companies involved in the
design and development of software used in DOD weapon programs.
To document and analyze how programs specifically measure and manage
their use of foreign-developed software, we identified 16 DOD weapon
systems and solicited information from each program office and prime
contractor. We selected these weapon systems based on recommendations
from DOD officials and on our internal knowledge of the systems. While
our selection of programs cannot be generalized to the population of
all DOD systems, the systems selected varied by product type,
represented each of the military services, and represented a range of
DOD contractors. The systems reviewed were the Abrams System
Enhancement Package, AH-64D Apache, Bradley Upgrade, C-130 Avionics
Modernization Program, C-130 J Hercules, C-17 Globe Master, Comanche
Reconnaissance Attack Helicopter (RAH-66), F/A-18 Super Hornet, F/A-22
Raptor, Future Combat Systems, Global Hawk Unmanned Aerial Vehicle,
Joint Helmet Mounted Cueing System, Joint Strike Fighter, Patriot
Missile System, Tactical Tomahawk Missile, and Wideband Gapfiller
Satellites.
Using their respective command liaisons to initially contact each
office, we distributed a structured set of questions to solicit
information from software managers designated by individual program
managers to respond to our inquiry. To further determine how programs
manage and mitigate their use of foreign-developed software, we then
tailored follow-up questions to solicit information and documentation
in areas such as program risk identification and management practices,
security policies and procedures, and software contracting management
practices. To learn more about program practices for managing and
mitigating the use of foreign-developed software, we solicited
information and documentation from the prime contractor for each system
using contacts provided by program office officials. Information
requested from contractors included government guidance for software
practices, company software development and security practices,
software risk mitigation efforts, software testing procedures, and
software sourcing decision processes. We received information from 15
of the prime contractors through written responses, on-site interviews,
and other means such as telephone conversations. We also obtained
several security and software related documents such as the Program
Protection Plan, the Software Development Plan, and other program
specific documents, such as the contract, for the systems we reviewed.
[End of section]
Appendix II: Comments from the Department of Defense:
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE
6000 DEFENSE PENTAGON:
WASHINGTON, DC 20301-6000:
May 17, 2004:
NETWORKS AND INFORMATION INTEGRATION:
Ms. Katherine V. Schinasi:
Director, Acquisition and Sourcing Management
U.S. General Accounting Office:
Washington, D.C. 20548:
Dear Ms. Schinasi,
This is the Department of Defense (DoD) response to the GAO draft
report, "DEFENSE ACQUISITIONS: Knowledge of Software Suppliers Needed
to Manage Risks," dated May, 2004, (GAO Code 120221/GAO-04-678). We
have reviewed the report and appreciate the findings on the risks of
malicious code in weapons systems software acquisition activities,
particularly from foreign suppliers. We note that risks attributable to
software vulnerabilities are not limited to foreign suppliers.
We agree in principle with the findings that malicious code is a threat
not adequately addressed in current acquisition policy and software
security procedures; however, we disagree with the recommendations as
stated relative to organizational roles. Individual program managers
should be able to rely on external expert resources to gain threat
information on suppliers. As such, formulation and oversight of
security practices will continue to be a collaborative function among
several offices within the DoD best suited to meet the threat analysis
needs of DoD programs.
The DoD continues to strengthen risk management activities to better
focus on mitigating risks attributable to software through software
acquisition process improvement programs, software assurance
initiatives, and systems engineering initiatives. DoD has identified
mechanisms to enhance our acquisition risk management processes to
factor in vulnerability analysis of proposed products, security risks
of suppliers' processes, and counterintelligence threat information.
For critical assets requiring high assurance, this entails more
comprehensive product diagnostic capabilities to discover malicious
code and vulnerabilities, process capability evaluations of suppliers
using security criteria within the framework of process standards or
capability maturity models, and counter-intelligence threat
assessments of prospective suppliers.
DoD will continue to strengthen threat analysis activities and security
practices within our acquisition process, including source selection,
contract process monitoring, and certification activities similar to
DITSCAP, to address insider threats related to the software development
environment. Managing risks associated with such threats should be
reviewed as part of program oversight activities.
Detailed comments to the recommendations are provided at TAB A.
Technical comments have been forwarded to your staff to correct and
clarify information in selected sections of the report.
The DoD Point of Contact for this action is Mr. Stanley J. Jarzombek,
703-602-1489, ext154.
Signed by:
Robert G. Gorrie,
Director, DIAP:
Enclosure: As stated:
GAO DRAFT REPORT - MAY, 2004 GAO CODE 120221/GAO-04-678:
"DEFENSE ACQUISITIONS: KNOWLEDGE OF SOFTWARE SUPPLIERS NEEDED TO MANAGE
RISKS":
DEPARTMENT OF DEFENSE COMMENTS TO THE RECOMMENDATIONS:
GENERAL COMMENT:
The DoD agrees with the report findings that malicious code is a
threat, and that it is not adequately addressed in current acquisition
policies and software security procedures. However, we disagree with
the recommendations' suggestions regarding what organizations are best
suited to address these issues. The formulation and oversight of
security practices will continue to be a collaborative function among
several offices within the DoD. Individual program managers should be
able to rely on external resources to gain threat information on
suppliers. They should not be expected to individually provide threat
assessment resources or expertise on threats posed by foreign
suppliers.
The DoD continues to strengthen risk management to better focus on
mitigating risks attributable to software through software acquisition
process improvement programs, software assurance initiatives, and
systems engineering initiatives. DoD has identified mechanisms to
enhance our acquisition risk management processes factoring in
vulnerability analysis of proposed products, security risks of
suppliers' processes, and counterintelligence threat information. For
critical assets requiring high assurance, the enhanced risk management
process should include counterintelligence threat assessments of
prospective suppliers, more comprehensive product diagnostic
capabilities to discover malicious code and vulnerabilities, and
process capability evaluations of suppliers using security criteria
within the framework of process standards or capability maturity
models. DoD will continue to strengthen threat analysis activities and
security practices within our acquisition process, including source
selection, contract process monitoring, and certification activities
similar to DITSCAP, to address insider threats related to the software
development environment. We believe the management of risk associated
with such threats should be reviewed as part of program oversight
activities.
The DoD recognizes that these software risks are applicable to more
than just weapons systems, and the risks must be mitigated throughout
the lifecycle. We believe that the intent of all three recommendations
within the GAO report could be addressed by enhancing our acquisition
risk management processes. We are seeking to improve our current threat
analysis processes to include threats relevant to the acquisition,
development and use of software components.
Threat analysis drives the development of security requirements, and it
should be carried out at the subsystem, system, and system of system
levels, and not be limited to the scope, expertise and resources of
individual program managers. It is only at the broadest levels that the
threat context (including network connectivity) can fully be
appreciated. By improving threat analysis,
and blending it into an enhanced acquisition risk management process,
DoD will provide the requisite oversight and traceability. We also
believe that there are limits to the availability of developer
identification information at the lowest level of software components,
especially in commercial and open source environments, and that risk
analysis should determine when the threat is sufficiently high to
warrant traceability at those levels.
Risks attributable to malicious code are applicable to other federal
agencies. We believe there should be increased cooperation and support
for gathering this type of information between intelligence
organizations and acquisition organizations.
RECOMMENDATION 1: The GAO recommended that the Secretary of Defense
require program managers, working with DOD's software assurance
experts, to specifically define software security requirements,
including those for identifying and managing software suppliers. These
requirements should then be communicated as part of the prime
development contract, to be used as part of the criteria to select
software suppliers. (p. 19/GAO Draft Report):
DOD RESPONSE 1: Partially concur. Due to resource constraints, this
could not be done for all systems at present. By identifying assets
that require high assurance, DoD intends to require specified programs,
or categories of programs, to employ the use of enhanced acquisition
risk management practices to factor in counterintelligence threat
information on suppliers, vulnerability analysis of proposed products,
and security risks of suppliers' processes. This would require that
program managers specifically define software security requirements,
including those for identifying and managing software suppliers. These
requirements would then be communicated as part of the prime
development contract, to be used as part of the criteria to select
software suppliers. The Office of the Under Secretary of Defense
(Acquisition, Technology, and Logistics) and the Office of the
Assistant Secretary of Defense (Networks and Information Integration)
will jointly lead the effort, in conjunction with other DoD
organizations, to define generic "software security requirements" and
criteria by which to judge risks associated with foreign software
suppliers. As pointed out in the GAO report, software is a global
industry where program managers have little or no insight into security
risks associated with foreign suppliers. Domestic suppliers often
depend on foreign sources for products and development. Individuals
within the DoD need to work with appropriate intelligence agencies to
bound the security risk problem and provide requisite policy and
guidance to DoD acquisition communities. DoD will identify security
risks associated with software from foreign suppliers and develop
recommended security requirements for solicitation and acquisition
security guides. Program managers would be expected to include guidance
in acquisition programs once security requirements and criteria are
defined and approved by OSD. We believe the management of risk
associated with such threats should be reviewed as part of program
oversight activities.
RECOMMENDATION 2: The GAO recommended that the Secretary of Defense,
based on defined software security requirements, require program
managers to collect and maintain information on software suppliers,
including software from foreign suppliers. This information should be
evaluated periodically to assess changes in the status of suppliers and
adjustments to program security requirements. (p. 19/GAO Draft Report):
DOD RESPONSE 2: Partially concur. The DoD, not necessarily individual
program managers, will collect and maintain information on software
suppliers, including software from foreign suppliers. Identifying,
tracking and maintaining intelligence on security risks of software
suppliers is best done at the DoD level. DoD is seeking ways to enhance
its risk management processes to factor in counterintelligence threat
information, vulnerabilities analyses of proposed products, and
security risks of suppliers' processes. For those critical assets that
require high assurance, this would include more comprehensive product
diagnostic capabilities than are presently available (to discover
malicious code and vulnerabilities), process capability evaluations of
suppliers using security criteria, and counterintelligence threat
assessments of prospective suppliers. The evaluations and threat
assessment would be requested by the program and most likely
independently conducted by other organizations. Based on defined
software security requirements, program managers would be required to
direct the collection of information on software suppliers, including
software from foreign suppliers. This information would be evaluated
periodically to assess changes in the status of suppliers and
adjustments to program security requirements. Collecting and
maintaining information on software suppliers, including software from
foreign suppliers, will require resources and assets beyond those of
individual program managers. Program managers should use software
security risk information on domestic and foreign software suppliers in
acquisition strategies, plans, requests for proposal (RFPs), and
contracts. . Services and agencies developing software should have
access to a suppliers' risk database that is under the purview of an
organization providing support to DoD acquisition programs.
RECOMMENDATION 3: The GAO recommended that the Secretary of Defense
require the Office of the Assistant Secretary of Defense for Networks
and Information Integration, as part of its role to review, oversee,
and formulate security practices, to ensure that weapons program risk
assessments include specific attention to software development risks,
including those from foreign suppliers. For example, certification and
accreditation processes, such as the DTTSCAP, should include
verification that software development practices contain adequate
security measures to address identified risks. (p. 19/GAO Draft
Report):
DOD RESPONSE 3: Partially concur. This will require collateral
responsibilities between OUSD(AT&L) and OASD(NII) with participation by
OUSD(Intelligence). As part of their established roles and
responsibilities, to review, oversee, and formulate security practices,
OUSD(AT&L) and OASD(NII) will ensure that program risk assessments
include specific attention to software development risks, including
those from foreign suppliers, in their program solicitations and
suppliers' capability evaluations using security criteria. Evaluation
and certification processes, such as the DITSCAP, do not provide
appropriate guidance for system design and development, or selection of
sources. Part of the needed guidance must address software security
risks and risk management. Program managers have the responsibility to
address software supplier security risks within their program risk
management plans.
[End of section]
Appendix III: Staff Acknowledgments:
Acknowledgments:
John Neumann, Brian Mullins, Delores Cohen, Shelby S. Oakley,
Christopher Miller, Gary Middleton, and Marie Ahearn made key
contributions to this report.
FOOTNOTES
[1] COTS software is that which is not specifically developed for
military use and instead purchased "as-is" from an outside vendor.
[2] For the purposes of this report, a foreign supplier is defined as
any foreign company or foreign national working for companies either in
the United States or abroad. It encompasses both prime contractors and
subcontractors performing work under those contracts.
[3] The National Industrial Security Program Operating Manual, DOD
5220.22-M, prescribes specific requirements, restrictions, and other
safeguards necessary to prevent unauthorized disclosure of classified
information to U.S. contractors.
[4] DOD Directive 5230.11, "Disclosure of Classified Military
Information to Foreign Governments and International Organizations,"
June 16, 1992.
[5] The DOD 5000 series includes the mandatory DOD Directive 5000.1
"The Defense Acquisition System," DOD Instruction 5000.2 "Operation of
the Defense Acquisition System," and a nonmandatory Interim Defense
Acquisition Guidebook.
[6] This process tracks changes and documents updates to a software
baseline.
[7] Federal Information Security Management Act, Title III, E-
Government Act of 2002, P.L. 107-347, Dec. 17, 2002.
[8] Enacted in the National Defense Authorization Act for Fiscal Year
2000, P.L. 106-65, Oct. 5, 1999, subsequently amended in various
statutes, and currently at 10 U.S.C. § 2224.
[9] Information assurance is defined as measures that protect and
defend information and information systems by ensuring their
availability, integrity, authentication, confidentiality, and
nonrepudiation, which includes software certification for
functionality and quality. DOD Directive 8500.1, "Information
Assurance", Encl. 2, § E2.1.17 (Oct. 24, 2002). DOD's Information
Assurance policy is implemented in DOD Instruction 8500.2, "Information
Assurance Implementation" (Feb. 6, 2003).
[10] The National Security Telecommunications and Information Systems
Security Policy No. 11 is a national policy to ensure that COTS
information assurance and information assurance-enabled products that
provide security services as an associated feature and are purchased by
the U.S. government to be used in national security systems perform as
prescribed by the software developer. The policy requires use of
preapproved products to meet information assurance needs.
[11] The standards are the (1) Common Criteria for Information Security
Technology Evaluation, (2) the National Security Agency/National
Institute of Standards and Technology National Information Assurance
Partnership Evaluation and Validation Program, and (3) the National
Institute of Standards and Technology Federal Information Processing
Standard Validation Program.
[12] DOD Instruction 5200.40 (Dec. 30, 1997).
[13] Critical Program Information is defined as program information,
technologies, or systems that, if compromised, would degrade combat
effectiveness, shorten the expected combat effective life of the
system, or significantly alter program direction. This includes
classified military information or unclassified controlled information
about such critical programs, technologies, or systems.
[14] Peer reviews and inspections of software, documentation, and
hardware are used extensively during the requirements, design, and
coding phases to identify any integration problems that must be
corrected.
[15] The Software Engineering Institute has identified specific
processes and practices that have proven successful in fostering
quality software development. The Capability Maturity Model for
SoftwareŽ (registered in the U.S. Patent and Trademark Office by
Carnegie Mellon University), for example, focuses on improving software
development processes. The model rates software maturity according to
five levels of maturity: (1) Initial: The software process is
characterized as ad hoc. Success depends on individual effort; (2)
Repeatable: The basic process is in place to track cost, schedule, and
functionality. Some aspects of the process can be applied to projects
with similar applications; (3) Defined: There is a standardized
software process for the organization. All projects use some approved
version of this process to develop and maintain software; (4) Managed:
The organization uses and collects detailed data to manage and evaluate
progress and quality; (5) Optimizing: Quantitative feedback about
performance and innovative ideas and technologies contribute to
continuous process improvement.
GAO's Mission:
The General Accounting Office, the investigative arm of Congress,
exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. General Accounting Office
441 G Street NW,
Room LM Washington,
D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S.
General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C.
20548: