Information Security

Department of Health and Human Services Needs to Fully Implement Its Program Gao ID: GAO-06-267 February 24, 2006

The Department of Health and Human Services (HHS) is the nation's largest health insurer and the largest grant-making agency in the federal government. HHS programs impact all Americans, whether through direct services, scientific advances, or information that helps them choose medical care, medicine, or even food. For example, the Centers for Medicare & Medicaid Services (CMS), a major operating division within HHS, is responsible for the Medicare and Medicaid programs that provide care to about one in every four Americans. In carrying out their responsibilities, both HHS and CMS rely extensively on networked information systems containing sensitive medical and financial information. GAO was asked to assess the effectiveness of HHS's information security program, with emphasis on CMS, in protecting the confidentiality, integrity, and availability of its information and information systems.

HHS and CMS have significant weaknesses in controls designed to protect the confidentiality, integrity, and availability of their sensitive information and information systems. HHS computer networks and systems have numerous electronic access control vulnerabilities related to network management, user accounts and passwords, user rights and file permissions, and auditing and monitoring of security-related events. In addition, weaknesses exist in other types of controls designed to physically secure computer resources, conduct suitable background investigations, segregate duties appropriately, and prevent unauthorized changes to application software. All of these weaknesses increase the risk that unauthorized individuals can gain access to HHS information systems and inadvertently or deliberately disclose, modify, or destroy the sensitive data that the department relies on to deliver its vital services. A key reason for these control weaknesses is that the department has not yet fully implemented a departmentwide information security program. While HHS has laid the foundation for such a program by developing and documenting policies and procedures, the department has not yet fully implemented key elements of its information security program at all of its operating divisions. Specifically, HHS and its operating divisions have not fully implemented elements related to (1) risk assessments, (2) policies and procedures, (3) security plans, (4) security awareness and training, (5) tests and evaluations of control effectiveness, (6) remedial actions, (7) incident handling, and (8) continuity of operations plans. Until HHS fully implements a comprehensive information security program, security controls may remain inadequate; responsibilities may be unclear, misunderstood, and improperly implemented; and controls may be inconsistently applied. Such conditions may lead to insufficient protection of sensitive or critical resources and disproportionately high expenditures for controls over low-risk resources.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-06-267, Information Security: Department of Health and Human Services Needs to Fully Implement Its Program This is the accessible text file for GAO report number GAO-06-267 entitled 'Information Security: Department of Health and Human Services Needs to Fully Implement Its Program' which was released on March 23, 2006. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Chairman, Committee on Finance, U.S. Senate: February 2006: Information Security: Department of Health and Human Services Needs to Fully Implement Its Program: GAO-06-267: GAO Highlights: Highlights of GAO-06-267, a report to the Chairman, Committee on Finance, U.S. Senate: Why GAO Did This Study: The Department of Health and Human Services (HHS) is the nation‘s largest health insurer and the largest grant-making agency in the federal government. HHS programs impact all Americans, whether through direct services, scientific advances, or information that helps them choose medical care, medicine, or even food. For example, the Centers for Medicare & Medicaid Services (CMS), a major operating division within HHS, is responsible for the Medicare and Medicaid programs that provide care to about one in every four Americans. In carrying out their responsibilities, both HHS and CMS rely extensively on networked information systems containing sensitive medical and financial information. GAO was asked to assess the effectiveness of HHS‘s information security program, with emphasis on CMS, in protecting the confidentiality, integrity, and availability of its information and information systems. What GAO Found: HHS and CMS have significant weaknesses in controls designed to protect the confidentiality, integrity, and availability of their sensitive information and information systems. HHS computer networks and systems have numerous electronic access control vulnerabilities related to network management, user accounts and passwords, user rights and file permissions, and auditing and monitoring of security-related events. In addition, weaknesses exist in other types of controls designed to physically secure computer resources, conduct suitable background investigations, segregate duties appropriately, and prevent unauthorized changes to application software. All of these weaknesses increase the risk that unauthorized individuals can gain access to HHS information systems and inadvertently or deliberately disclose, modify, or destroy the sensitive data that the department relies on to deliver its vital services. A key reason for these control weaknesses is that the department has not yet fully implemented a departmentwide information security program. While HHS has laid the foundation for such a program by developing and documenting policies and procedures, the department has not yet fully implemented key elements of its information security program at all of its operating divisions. Specifically, HHS and its operating divisions have not fully implemented elements related to (1) risk assessments, (2) policies and procedures, (3) security plans, (4) security awareness and training, (5) tests and evaluations of control effectiveness, (6) remedial actions, (7) incident handling, and (8) continuity of operations plans. Until HHS fully implements a comprehensive information security program, security controls may remain inadequate; responsibilities may be unclear, misunderstood, and improperly implemented; and controls may be inconsistently applied. Such conditions may lead to insufficient protection of sensitive or critical resources and disproportionately high expenditures for controls over low-risk resources. What GAO Recommends: GAO recommends that the Secretary of HHS direct the Chief Information Officer to take steps to fully implement key elements of the department‘s information security program at all operating divisions. In commenting on a draft of this report, HHS supported GAO‘s emphasis on improvements to its security program, but did not believe the report sufficiently reflected progress made. www.gao.gov/cgi-bin/getrpt?GAO-06-267. To view the full product, including the scope and methodology, click on the link above. For more information, contact Gregory C. Wilshusen at (202) 512-6244 or Wilshuseng@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Weak Controls and Incomplete Implementation Compromise Effectiveness of HHS's Information Security Program: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendixes: Appendix I: Objective, Scope, and Methodology: Appendix II: Comments from the Department of Health and Human Services: Appendix III: HHS Operating Divisions: Appendix IV: GAO Contact and Staff Acknowledgments: Table: Table 1: Reported Incidents among HHS Operating Divisions: Figure: Figure 1: HHS Fiscal Year 2005 Budget: Abbreviations: CMS: Centers for Medicare & Medicaid Services: FISMA: Federal Information Security Management Act: HHS: Department of Health and Human Services: NIST: National Institute of Standards and Technology: OIG: Office of the Inspector General: OMB: Office of Management and Budget: Letter February 24, 2006: The Honorable Charles E. Grassley: Chairman: Committee on Finance: United States Senate: Dear Mr. Chairman: The Department of Health and Human Services (HHS) is the nation's largest health insurer and the largest grant-making agency in the federal government. The department protects and promotes the health and well-being of all Americans and provides world leadership in biomedical and public health sciences. The programs of the department impact all Americans, whether through direct services, scientific advances, or information that helps them choose medical care, medicine, or even food. For example, the Centers for Medicare & Medicaid Services (CMS), a major operating division within HHS responsible for the Medicare and Medicaid programs, oversees the nation's largest health insurance programs, which provide care to about one in every four Americans. HHS relies on automated information systems and interconnected networks to process and pay medical claims; conduct medical research; manage its wide spectrum of health, disease prevention, and food and safety programs; and support its departmentwide financial and management functions. Effective information security controls are essential for ensuring that information technology resources are adequately protected from inadvertent or deliberate misuse, fraudulent use, or destruction. Interruptions in HHS's financial and information management systems could have a significant adverse affect on the health, welfare, and mental well-being of millions of American citizens who depend on its services. At your request, we assessed the effectiveness of the HHS information security program, particularly at CMS, in protecting the confidentiality, integrity, and availability of its information and information systems. To accomplish this objective, we evaluated the effectiveness of HHS's information security controls, and whether HHS had developed, documented, and implemented a departmentwide information security program consistent with federal laws and policies. To supplement our work, we analyzed 74 information security-related reports issued during 2004 and 2005 by HHS, its Office of the Inspector General (OIG), and independent auditors. This review was performed from June through December 2005 in accordance with generally accepted government auditing standards. For further information about our objective, scope, and methodology, refer to appendix I. Results in Brief: Significant weaknesses in information security controls at HHS and at CMS in particular put at risk the confidentiality, integrity, and availability of their sensitive information and information systems. HHS has not consistently implemented effective electronic access controls designed to prevent, limit, and detect unauthorized access to sensitive financial and medical information at its operating divisions and contractor-owned facilities. Numerous electronic access control vulnerabilities related to network management, user accounts and passwords, user rights and file permissions, and auditing and monitoring of security-related events exist in its computer networks and systems. In addition, weaknesses exist in controls designed to physically secure computer resources, conduct suitable background investigations, segregate duties appropriately, and prevent unauthorized changes to application software. These weaknesses increase the risk that unauthorized individuals can gain access to HHS information systems and inadvertently or deliberately disclose, modify, or destroy the sensitive medical and financial data that the department relies on to deliver its vital services. A key reason for these weaknesses is that the department has not yet fully implemented its information security program. HHS has laid the foundation for an effective information security program by developing written policies and guiding procedures that designate responsibility for implementation throughout the department. However, it has not yet fully implemented key elements of the program. Specifically, its operating divisions have not fully implemented elements related to (1) risk assessments, (2) policies and procedures, (3) security plans, (4) security awareness and training, (5) tests and evaluations of control effectiveness, (6) remedial actions, (7) incident handling, and (8) continuity of operations plans. Without a fully implemented program, security controls may remain inadequate or inconsistently applied and responsibilities may be unclear, misunderstood, or improperly implemented. This may lead to insufficient protection of sensitive or critical resources, and disproportionately high expenditures on controls over low-risk resources. In reports by the HHS OIG and other independent auditors, specific recommendations were made to the department to remedy identified information security control weaknesses. In this report, we are recommending that the Secretary of Health and Human Services direct the HHS Chief Information Officer (CIO) to take steps to ensure full implementation of its information security program across all HHS operating divisions. In commenting on a draft of this report, HHS supported our emphasis on improvements needed in key information security program elements, but did not believe that the report sufficiently reflected the progress that the department has made in addressing information security. We acknowledge in the report that HHS has made progress in correcting its information security control weaknesses and has begun to implement the foundation for an effective information security program. HHS also provided specific technical comments, which we have incorporated, as appropriate, in the report. Background: HHS is the federal government's principal agency responsible for protecting the health of all Americans and providing essential human services, especially for those who are least able to help themselves. The department manages more than 300 programs covering a wide spectrum of activities that include health and social science research, disease prevention, food and drug safety, health information technology, health insurance for elderly and disabled Americans (Medicare), health insurance for low-income people (Medicaid), and comprehensive health services for Native Americans. Other services provided by the department include financial assistance to low-income families, pre- school education programs such as Head Start, child abuse and domestic violence programs, substance abuse treatment and prevention programs, and programs to help older Americans, such as providing home-delivered meals. HHS has 14 operating divisions (see app. III for a description of each division) to manage its programs and administered more grant dollars than all other federal agencies combined. HHS employs about 67,000 employees and is responsible for managing a fiscal year 2005 budget of approximately $581 billion. Each year HHS handles more than a billion health care claims, supports over 38,000 research projects focusing on diseases, provides funding to treat more than 650,000 persons with serious substance abuse or mental health problems, and serves more than 900,000 pre-school children. The Centers for Medicare & Medicaid Services (CMS) is an HHS operating division responsible for administering two major health programs. It administers the Medicare program, the nation's largest health insurance program, which covers more than 42 million Americans. This program was enacted to extend affordable health insurance coverage to the elderly and was later expanded to cover the disabled. In partnership with the states, CMS also administers Medicaid, a means-tested health care program for low-income Americans. Medicaid is the primary source of health care for a large population of medically vulnerable Americans, including poor families, the disabled, and persons with developmental disabilities requiring long-term care. In coordination with the Medicaid program, the State Children's Health Insurance Program provides health care coverage for children. CMS employs about 4,900 employees and has a fiscal year 2005 budget of approximately $480 billion or 83 percent of the HHS budget, as shown in figure 1. Figure 1: HHS Fiscal Year 2005 Budget: [See PDF for image] [End of figure] HHS relies extensively on computerized systems to support its mission critical operations and store the sensitive information it collects. It uses these systems to support the department's financial and management functions, maintain sensitive employee personnel information, and process financial and medical data for millions of health care recipients. Its local and wide area networks interconnect these systems. In addition, HHS relies on contractor-owned systems to process departmental information and support its mission. For fiscal year 2005, HHS planned to spend nearly $5 billion on information technology--more than any other federal agency except the Department of Defense. A significant amount of these funds will be spent to facilitate the processing and payment of Medicare claims processed by CMS or its Medicare contractors. Information system controls are a critical consideration for any organization that depends on computerized systems and networks to carry out its mission or business. Without proper safeguards, there is risk that individuals and groups with malicious intent may intrude into inadequately protected systems and use this access to obtain sensitive information, commit fraud, disrupt operations, or launch attacks against other computer systems and networks. In December 2002, Congress enacted the Federal Information Security Management Act of 2002 (FISMA)[Footnote 1] to strengthen security of information and information systems within federal agencies. FISMA requires each agency to develop, document, and implement an agencywide information security program to provide information security for the information and systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source. In addition, FISMA provides that the Secretary of HHS is responsible for, among other things, (1) providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of the agency's information systems and information; (2) ensuring that senior agency officials provide information security for the information and information systems that support the operations and assets under their control; and (3) delegating to the agency CIO the authority to ensure compliance with the requirements imposed on the agency under the act. HHS's CIO is responsible for developing, promoting, and coordinating the departmentwide information security program; developing, promulgating, and enforcing department information resource management policies, standards, and guidelines; and appointing the HHS chief information security officer. Each operating division, including CMS, is responsible for complying with the requirements of FISMA and departmentwide security-related policies, procedures, and standards; reporting on the effectiveness of its information security program; and ensuring that information systems operated by or on its behalf by contractors provide adequate risk-based security safeguards. Weak Controls and Incomplete Implementation Compromise Effectiveness of HHS's Information Security Program: HHS and CMS in particular have significant weaknesses in electronic access controls and other information system controls designed to protect the confidentiality, integrity, and availability of information and information systems. A key reason for these weaknesses is that the department has not yet fully implemented a departmentwide information security program. As a result, HHS's medical and financial information systems are vulnerable to unauthorized access, use, modification, and destruction that could disrupt the department's operations. Electronic Access Controls Are Inadequate: A basic management objective for any organization is to protect the resources that support its critical operations from unauthorized access. Organizations accomplish this objective by designing and implementing electronic controls that are intended to prevent, limit, and detect unauthorized access to computing resources, programs, and information. Inadequate electronic access controls diminish the reliability of computerized information and increase the risk of unauthorized disclosure, modification, and destruction of sensitive information and disruption of service. Electronic access controls include those related to network management, user accounts and passwords, user rights and file permissions, and auditing and monitoring of security-related events. Our analysis of reports issued by the OIG and independent auditors disclosed that HHS did not consistently implement effective electronic access controls in each of these areas. Network Management: Networks are collections of interconnected computer systems and devices that allow individuals to share resources such as computer programs and information. Because sensitive programs and information are stored on or transmitted along networks, effectively securing networks is essential to protecting computing resources and data from unauthorized access, manipulation, and use. Organizations secure their networks, in part, by installing and configuring network devices that permit authorized network service requests, deny unauthorized requests, and limit the services that are available on the network. Devices used to secure networks include (1) firewalls that prevent unauthorized access to the network, (2) routers that filter and forward data along the network, (3) switches that forward information among segments of a network, and (4) servers that host applications and data. Network services consist of protocols for transmitting data between network devices. Insecurely configured network services and devices, including those without current software patches, can make a system vulnerable to internal or external threats, such as denial-of-service attacks.[Footnote 2] Because networks often include both external and internal access points for electronic information assets, failure to adequately secure these access points increases the risk of unauthorized disclosure and modification of sensitive information or disruption of service. HHS policy requires that all incoming and outgoing connections from departmental systems and networks to the Internet, intranets,[Footnote 3] and extranets[Footnote 4] be made through a firewall and that effective technical controls be implemented to protect computing resources connected to the network. Our analysis found that HHS did not consistently configure network services and devices securely to prevent unauthorized access to and ensure the integrity of computer systems operating on its networks. The reports we reviewed identified weaknesses in the way that HHS operating divisions and contractors restricted network access, managed antivirus software, configured network devices, and protected information traversing the HHS networks. For example, * System administrative access was not always adequately restricted, and unnecessary services were available on several network devices, increasing the risk that unauthorized individuals could gain access to the operating system. * Antivirus software was not always installed or up-to-date on the operating divisions' and contractors' workstations, increasing the risk that viruses could infect HHS systems and potentially disable or disrupt system operations. * Key network devices were not securely configured to prevent unauthorized individuals from gaining access to sensitive system configuration files and router access control lists. These weaknesses could allow an external attacker to circumvent network controls and thereby gain unauthorized access to the internal network. * HHS did not encrypt certain information traversing its networks. Instead, it used clear text protocols that make network traffic susceptible to eavesdropping. * HHS's operating divisions and contractors did not consistently patch their computer systems and network devices in a timely manner. For example, the OIG reported that approximately 25 percent (287 of 1,129) of the systems tested at one operating division did not have up-to-date patches installed on them. Thirty of the machines tested were missing nine or more software patches that had been rated as critical by the vendor. At another operating division, over 90 high-risk software patch management vulnerabilities were outstanding from June 1999 through April 2005. Failure to keep system patches up-to-date could lead to denial-of-service attacks or to individuals gaining unauthorized access to network resources. According to the HHS chief information security officer, a patch management subcommittee was formed to address this issue and has formulated and published an approach to the department's patch management problems. User Accounts and Passwords: A computer system must be able to identify and differentiate among users so that activities on the system can be linked to specific individuals. When an organization assigns unique user accounts to specific users, the system is able to distinguish one user from another--a process called identification. The system must also establish the validity of a user's claimed identity by requesting some kind of information, such as a password, that is known only by the user--a process known as authentication. The combination of identification and authentication--such as user account and password combinations--provides the basis for establishing individual accountability and for controlling access to the system. Accordingly, agencies (1) establish password parameters, such as number of characters, type of characters, and the frequency with which users should change their passwords, in order to strengthen the effectiveness of passwords for authenticating the identity of users; (2) require encryption for passwords to prevent their disclosure to unauthorized individuals; and (3) implement procedures to control the use of user accounts. HHS policy requires that all operating divisions implement and enforce logical password controls for all departmental systems and networks. Our analysis of reported weaknesses showed that HHS did not adequately control user accounts and passwords to ensure that only authorized individuals were granted access to its systems. For example, the department and its contractors did not always implement strong passwords--using vendor-default or easy to guess passwords. Additionally, * One CMS Medicare contractor set passwords to never expire for 28 service accounts with powerful administrative privileges. As a result, an unauthorized individual could use a compromised user identification and password for an indefinite period to gain unauthorized access to server resources. * Firewall administrators for another CMS Medicare contractor used a shared administrative account. As a result, the actions taken by these individuals cannot be traced back to the responsible individual. * The minimum password length on one operating division's local area network was set to zero. Consequently, users could create short passwords. Short passwords tend to be easier to guess or crack than longer passwords. In addition, passwords on this local area network were not required to be changed at initial logon. Such weaknesses increase the risk that passwords may be disclosed to unauthorized users and used to gain access to the system. They also diminish the effectiveness of these controls for attributing system activity to individuals. As a result, HHS may not be able to hold these users individually accountable for system activity. User Rights and File Permissions: The concept of "least privilege" is a basic underlying principle for securing computer systems and data. It means that users are granted only those access privileges needed to perform their official duties. To restrict legitimate users' access to only those programs and files that they need to do their work, organizations establish access rights and permissions. "User rights" are allowable actions that can be assigned to users or to groups of users. File and directory permissions are rules that are associated with a particular file or directory and regulate which users can access them and the extent of that access. To avoid unintentionally giving users unnecessary access to sensitive files and directories, an organization must give careful consideration to its assignment of rights and permissions. HHS policy requires that access privileges be granted to users at the minimum level required to perform their job-related duties. Our analysis of OIG reports showed that HHS granted access rights and permissions that gave some users more access to departmental information and medical systems than they needed to perform their jobs. For example, the following vulnerabilities were identified: * All users could access world-readable start up scripts and files on several Medicare contractor systems. A malicious user could use this information to increase their system privileges. * Members of the "Everyone" group were granted access to sensitive Windows directories, files, and registry settings, even though some did not have a legitimate business need for this access. * Twenty-two groups or users without a legitimate need could access and update mainframe production data at one CMS Medicare contractor facility. * Six of 15 employees reviewed at one operating division retained access privileges to the local area network after their separation from the department. Inappropriate access to sensitive files and directories provides opportunities for individuals to circumvent security controls to deliberately or inadvertently read, modify, or delete critical or sensitive information and computer programs. Auditing and Monitoring of Security-Related Events: To establish individual accountability, monitor compliance with security policies, and investigate security violations, it is crucial to determine what, when, and by whom specific actions have been taken on a system. Organizations accomplish this by implementing system or security software that provides an audit trail that they can use to determine the source of a transaction or attempted transaction and to monitor users' activities. The way in which organizations configure system or security software determines the nature and extent of information that can be provided by the audit trail. To be effective, organizations should configure their software to collect and maintain audit trails that are sufficient to track security-related events. HHS policy requires that audit logging be enabled for all departmental systems and networks so that security-related events--the manipulation, modification, or deletion of data--can be monitored and analyzed for unauthorized activity. HHS has not consistently audited and monitored security-related system activity on their systems. For example, the OIG reported that logging on some UNIX systems was either disabled or configured to overwrite these events, firewall and router logs were not routinely monitored, and procedures for classifying and investigating security-related events had not been documented at several HHS operating divisions and CMS Medicare contractors. As a result, if a system was modified or disrupted, the department's ability to trace or recreate events could be diminished. In addition, these weaknesses could allow unauthorized access to go undetected. In response to weaknesses identified in electronic access controls, the HHS chief information security officer indicated that significant progress has been made in correcting these weaknesses and that preliminary results of fiscal year 2005 audits, by independent auditors, show a reduction in the number of weaknesses. In addition, the independent auditor of HHS's financial statements for fiscal year 2005 reported that HHS had made significant progress in strengthening system controls, although it continued to identify general controls issues that represent significant deficiencies in the design and operation of electronic access controls. Other Information System Controls Are Ineffective: In addition to electronic access controls, other important controls should be in place to ensure the confidentiality, integrity, and availability of an organization's information and systems. These controls include policies, procedures, and techniques to physically secure computer resources, conduct appropriate background investigations, provide sufficient segregation of duties, and prevent unauthorized changes to application software. Our analysis of reports issued by the OIG and independent auditors disclosed significant weaknesses in each of these areas. These weaknesses increase the risk that unauthorized individuals can gain access to HHS information systems and inadvertently or deliberately disclose, modify, or destroy the sensitive medical and financial data that the department relies on to deliver its vital services. Physical Security: Physical security controls are important for protecting computer facilities and resources from espionage, sabotage, damage, and theft. These controls restrict physical access to computer resources, usually by limiting access to the buildings and rooms in which the resources are housed and by periodically reviewing the access granted, in order to ensure that access continues to be appropriate. HHS policy requires that physical access to rooms, work areas and spaces, and facilities containing departmental systems, networks, and data be limited to authorized personnel; controls be in place for deterring, detecting, monitoring, restricting, and regulating access to sensitive areas at all times; and controls be commensurate with the level of risk and sufficient to safeguard these resources against possible loss, theft, destruction, accidental damage, hazardous conditions, fire, malicious actions, and natural disasters. Our analysis showed that HHS did not effectively implement physical controls as the following examples illustrate: * One CMS Medicare contractor used a privately owned vehicle and an unlocked container to transport approximately 25,000 Medicare check payments over a 1-year period. * Four hundred forty individuals were granted unrestricted access to an entire data center, including a sensitive area within the data center- -although their jobs functions did not require them to have such access. * Surveillance cameras used for monitoring a facility were not functioning, leading to blind spots in the data center's perimeter security. * Three individuals with access to an operating division's data center did not have management approval for such access. These weaknesses in physical security increase the risk that unauthorized individuals could gain access to sensitive computing resources and data and inadvertently or deliberately misuse or destroy them. Background Investigations: According to Office of Management and Budget (OMB) Circular A- 130,[Footnote 5] it has long been recognized that the greatest harm to computing resources has been done by authorized individuals engaged in improper activities--whether intentionally or accidentally. Personnel security controls (such as screening individuals in positions of trust) are particularly important where the risk and magnitude of potential harm is high. The National Institute of Standards and Technology (NIST) guidelines suggest that agencies determine the sensitivity of particular positions, based on such factors as the type and degree of harm that the individual could cause by misusing the computer system and on more traditional factors, such as access to classified information and fiduciary responsibilities. Background investigations help an organization to determine whether a particular individual is suitable for a given position by attempting to ascertain the person's trustworthiness and appropriateness for the position. The exact type of screening that takes place depends on the sensitivity of the position and any applicable regulations by which the agency is bound. HHS policy requires that all information security employees and contractor personnel be designated with position-sensitivity levels that are commensurate with the responsibilities and risks associated with their position. In addition, it requires suitability background investigations to be completed and favorably adjudicated for all personnel assigned to these positions prior to allowing them access to sensitive HHS systems and networks. Our analysis of prior reports showed that background investigations were not always performed. For example, 13 CMS Medicare contractors had weaknesses in their background investigation policies and procedures. Six of the contractors reviewed were not adhering to established policies, while the remaining seven were not performing background investigations in a consistent manner. In addition, one operating division was unable to provide the background investigation status for any of the 49 contractor personnel working at its data center or for any of the 28 contractor personnel supporting one of its general support systems. Additionally, background investigations at three operating divisions were considered inadequate because they were not performed at the appropriate sensitivity level. Granting people access to sensitive data without appropriate background investigations increases the risk that unsuitable individuals could gain access to sensitive information, use it inappropriately, or destroy it. Segregation of Duties: Segregation of duties refers to the policies, procedures, and organizational structure that help ensure that no single individual can independently control all key aspects of a process or computer-related operation and thereby gain unauthorized access to assets or records. Often segregation of duties is achieved by dividing responsibilities among two or more individuals or organizational groups. This diminishes the likelihood that errors and wrongful acts will go undetected, because the activities of one individual or group will serve as a check on the activities of the other. Inadequate segregation of duties increases the risk that erroneous or fraudulent transactions could be processed, improper program changes be implemented, and computer resources could be damaged or destroyed. HHS policy requires operating divisions to ensure that responsibilities with a security impact be shared among multiple staff by enforcing the concept of separation of duties, which requires that individuals do not have control of the entirety of a critical process. Our analysis of OIG reports showed that HHS did not always sufficiently segregate computer functions. For example, some software developers had full access to both development and production software libraries. To illustrate, UNIX developers at one facility used a shared user account to promote development changes into the production environment. In another instance, two individuals with full access to development source code also had update capabilities to production libraries. Consequently, increased risk exists that these individuals could introduce software errors into production or perform unauthorized system activities without being detected. Application Change Controls: It is important to ensure that only authorized and fully tested application programs are placed into operation. To ensure that changes to application programs are necessary, work as intended, and do not result in the loss of data or program integrity, such changes should be documented, authorized, tested, and independently reviewed. In addition, test procedures should be established to ensure that only authorized changes are made to the application's program code. HHS policy requires that operating divisions establish, implement, and enforce change management and configuration management controls on all departmental systems and networks that process, store, or communicate sensitive information. However, our analysis showed that HHS did not always document or control changes to application programs as the following examples demonstrate: * Authorization forms did not exist for each of the 21 application control changes reviewed at one Medicare contractor facility. In addition, change control procedures were out-of-date and did not reflect current process and practice. * Testing documentation at one operating division was not maintained for 4 of 15 change requests reviewed. Without adequately documented or controlled application change control procedures, changes may be implemented that are not authorized, tested, or approved. Further, the lack of adequate controls place HHS at greater risk that software supporting its missions will not produce reliable data or effectively meet its business needs. In response to weaknesses identified in other information security controls, the HHS chief information security officer indicated that significant progress has been made in correcting these weaknesses and that preliminary results of fiscal year 2005 audits, by independent auditors, show a reduction in the number of weaknesses. In addition, the independent auditor of HHS's financial statements for fiscal year 2005 reported that HHS had made significant progress in strengthening system controls, although it continued to identify general controls issues that represent significant deficiencies in the design and operation of key controls such as physical access, system software, and application development and program change controls. Information Security Program Is Not Yet Fully Implemented: A key reason for the information security weaknesses identified at HHS was that the department had not yet fully implemented its information security program. A departmentwide security program provides a framework and continuing cycle of activity for managing risk, developing security policies, assigning responsibilities, and monitoring the adequacy of the entity's computer-related controls. Without such a program, security controls may be inadequate; responsibilities may be unclear, misunderstood, and improperly implemented; and controls may be inconsistently applied. Such conditions may lead to insufficient protection of sensitive or critical resources and disproportionately high expenditures for controls over low-risk resources. FISMA[Footnote 6] requires each agency to develop, document, and implement an information security program that includes the following key elements: * periodic assessments of the risk and the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems; * policies and procedures that (1) are risk-based, (2) cost-effectively reduce risks, (3) ensure that information security is addressed throughout the life cycle of each system, and (4) ensure compliance with applicable requirements; * plans for providing adequate information security for networks, facilities, and systems; * security awareness training to inform personnel--including contractors and other users of information systems--of information security risks and of their responsibilities in complying with agency policies and procedures; * at least annual testing and evaluation of the effectiveness of information security policies, procedures, and practices relating to management, operational, and technical controls of every information system identified in the agency's inventory; * a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in its information security policies, procedures, or practices; * procedures for detecting, reporting, and responding to security incidents; and: * plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the agency. FISMA also requires each agency to (1) annually report to OMB, selected congressional committees, and the Comptroller General on the adequacy of information security policies, procedures, and practices and compliance with requirements, and (2) its OIG or independent external auditor perform an independent annual evaluation of the agency's information security program and practices. HHS has begun to implement the foundation for an effective information security program through its Secure One initiative by developing and documenting policies and procedures that designate implementation responsibilities. For example, HHS information security program provides baseline security policies and standards for the department. Operating divisions are required to comply with departmental standards or develop specific standards that exceed them. In addition, HHS uses an automated security management tool to collect, analyze, and report FISMA data. Similarly, CMS has made progress in developing and documenting its information security policies and procedures. Although HHS has made progress in developing and documenting a departmentwide information security program, it has not fully implemented the following key elements: risk assessments, policies and procedures, system security planning, security and awareness training, periodic testing and evaluation of controls, remedial action plans, incident handling, and continuity of operations. These weaknesses limit HHS's ability to protect the confidentiality, integrity, and availability of its information and information systems. Risk Assessments: Identifying and assessing information security risks are essential to determining what controls are required. By increasing awareness of risks, these assessments can generate support for the policies and controls that are adopted. OMB Circular A-130, appendix III, prescribes that risk be reassessed when significant changes are made to computerized systems--or at least every 3 years, as does HHS policy. Consistent with NIST guidance, HHS requires that risk assessments characterize the system, identify information sensitivity and threats, determine the risk level of those threats and corresponding vulnerabilities, and analyze the potential business impact of exploited vulnerabilities. HHS's performance in conducting risk assessments has varied across the department. Our review of 10 CMS risk assessments found that they generally complied with applicable federal and departmental guidance. By contrast, two of the three Office of the Secretary risk assessments reviewed did not fully address key elements. For example, the risk assessments did not identify threat sources, threat actions, or risk levels, as described in NIST SP 800-30.[Footnote 7] Nor did they detail whether or not a business impact analysis had been completed. HHS's OIG also identified weaknesses in the department's risk assessments. In its 2005 FISMA evaluation, the OIG reported that risk assessments had not been performed on two major systems--one at the Administration for Children and Families, and one at the Administration on Aging. In response to these weaknesses identified in the department's information security program, the HHS chief information security officer stated that risk assessments are currently being tracked using the department's FISMA data management tool, which compiles information security management data for monitoring and review. All operating divisions are required to enter their FISMA data into this automated tool so that it can be reviewed and validated by the Secure One program staff. The combination of this tool and feedback from the Secure One program is designed to improve the completion rate and quality of risk assessments. The lack of or incomplete risk assessments could result in HHS's systems having inadequate or inappropriate security controls that might not address those systems' true risk, and result in costly efforts to subsequently implement effective controls. Policies and Procedures: Another key task in implementing an effective information security program is to develop and document risk-based policies, procedures, and technical standards that govern security over an agency's computing environment. If properly implemented, policies and procedures should help to cost-effectively reduce the risk of unauthorized access, modification, and destruction of information and systems. Technical security standards should provide consistent implementing guidance for each computing environment. Because security policies are the primary mechanism by which management communicates its views and requirements, it is important to develop and document them. FISMA requires each agency to develop minimally acceptable system configuration requirements and ensure compliance with them. Systems with secure configurations have less vulnerabilities and are better able to thwart network attacks. HHS has not developed departmentwide policies regarding minimally acceptable configuration requirements. According to HHS's chief information security officer, HHS has neither developed nor documented such configuration requirements for its operating systems. The OIG reported in its fiscal year 2005 FISMA evaluation that these requirements were being maintained at the operating division level. In addition, the OIG found that three of the six operating divisions had not implemented minimum acceptable configuration requirements for their operating systems. Without departmentwide policies for developing minimally acceptable configuration requirements for its information systems, HHS may not be able to cost-effectively reduce information security risks to an acceptable level. Security Plans: The objective of system security planning is to improve the protection of information technology resources. A system security plan is to provide a complete and up-to-date overview of the system's security requirements and describe the controls that are in place or planned to meet those requirements. FISMA requires that agency information security programs include subordinate plans for providing adequate information security for networks, facilities, and systems or groups of information systems, as appropriate. OMB Circular A-130 specifies that agencies develop and implement system security plans for major applications and for general support systems and that these plans address policies and procedures for providing management, operational, and technical controls. According to NIST, security plans should include existing or planned security controls, the individual responsible for the security of the system, a description of the system and its interconnected environment, and rules of behavior. HHS policy requires all of its operating divisions to develop and document system security plans for all departmental systems and networks in accordance with NIST guidance[Footnote 8] and to update such plans at least once every 3 years or when significant changes occur to the system. Our review found that HHS and CMS system security plans generally complied with applicable federal and departmental guidance. We examined seven plans and determined that they were up-to-date, addressed existing controls, identified responsible security personnel, described the system and its interconnections, and included rules of behavior. However, our analysis of OIG reports found that security plans had not been completed for two major systems--one at the Administration for Children and Families, and one at the Administration on Aging. Until its operating divisions complete security plans for all systems, HHS cannot ensure that appropriate controls are in place to protect its systems and critical information. Awareness and Security Training: Computer intrusions and security breakdowns often occur because computer users fail to take appropriate security measures. For this reason, it is vital that employees and contractors who use computer resources in their day-to-day operations be made aware of the importance and sensitivity of the information they handle, as well as the business and legal reasons for maintaining its confidentiality, integrity, and availability. FISMA requires that an information security program promote awareness and provide training for users (federal employees and contractors) so that they can understand the system security risks and their role in implementing related policies and controls to mitigate those risks. HHS policy requires the establishment of an annual security awareness training program for all employees and contractors. In the event that a security breach occurs, amply trained security personnel are vital to a timely and appropriate response. Depending on an employee's specific security role, specialized training could include training in incident detection response, physical security, or firewall configuration. FISMA requires agency chief information officers to ensure that personnel with significant information security responsibilities receive specialized security training. HHS policy also require specialized security education and awareness training for all individuals with significant security responsibilities. Although the department has made progress in security awareness training, the department had not provided adequate security training to employees with significant security related responsibilities. In fiscal year 2005, HHS reported that 98 percent of its employees, including contractors, had received security awareness training. However, it reported that 32 percent of its employees with significant security related responsibilities had not received specialized security training. Conversely, CMS reported that 100 percent of its employees with significant security related responsibilities had received such training. Without sufficiently trained security personnel, security lapses are more likely to occur and could contribute to information security weaknesses at HHS. Tests and Evaluations: Another key element of an information security program is testing and evaluating system controls to ensure that they are appropriate, effective, and comply with policies. An effective program of ongoing tests and evaluations can be used to identify and correct information security weaknesses. This type of oversight demonstrates management's commitment to the security program, reminds employees of their roles and responsibilities, and identifies and mitigates areas of noncompliance and ineffectiveness. Although control tests may encourage compliance with security policies, the full benefits of testing are not achieved unless the test results are analyzed by security specialists and business managers and used as a means of identifying new problem areas, reassessing the appropriateness of existing controls, and identifying the need for new controls. FISMA requires that agencies test and evaluate the information security controls of their systems, and that the frequency of such tests be based on risk, but occur no less than annually. HHS requires systems and networks that contain sensitive or mission critical information to undergo vulnerability scanning and/or penetration testing to identify security threats at least annually or when significant changes are made to the system or network. HHS also requires that a self-assessment be conducted of all departmental systems and networks at least annually in accordance with NIST SP 800-26.[Footnote 9] Consistent with FISMA provisions and HHS guidance, CMS policy also requires periodic testing and evaluation of its information systems' security controls. Although HHS has initiatives under way to improve its testing and evaluation of controls, it has not fully implemented an ongoing program of tests and evaluations. Our analysis of the OIG's fiscal year 2005 FISMA report found that several operating divisions had not tested and evaluated security controls for all their systems. For example, three systems at three different operating divisions had not undergone system testing and evaluation. At another operating division, system tests and evaluations for three of its six major applications had not been completed. Without comprehensive tests and evaluations of security controls, HHS cannot be assured that employees and contractors are complying with established policies or those policies and controls are appropriate and working as intended. Remedial Actions: Remedial action plans, also known as plans of actions and milestones, can assist agencies in identifying, assessing, prioritizing, and monitoring progress in correcting security weaknesses in information systems. According to OMB Circular A-123, agencies should take timely and effective action to correct deficiencies that they have identified through a variety of information sources. To accomplish this, remedial action plans should be developed for each deficiency, and progress should be tracked for each. In compliance with OMB policy, HHS requires the capture of all information security program and system control weaknesses that require mitigation in remedial action plans. In addition, HHS has provided information security managers and system owners guidance for developing, maintaining, and reporting their remedial action plans. Our review of OIG reports on selected operating divisions identified shortcomings in the HHS remedial action process. For example, the remedial action plans for three operating divisions did not include weaknesses previously identified in the operating divisions' risk assessments, OIG audits, or other independent audits. Moreover, the remedial action plans for four operating divisions contained overdue corrective action items and lacked key corrective action information, such as the risk level assigned to weaknesses, resources needed to remedy the weaknesses, and adequate support to demonstrate closed weaknesses. Our review of CMS remedial action plans yielded similar results. Specifically, we found 20 percent of the corrective actions did not identify the resources needed to correct those weaknesses. Without a sound remediation process, HHS cannot be assured that weaknesses in its information security program will be efficiently and effectively corrected. Incident Handling: Even strong controls may not block all intrusions and misuse, but organizations can reduce the risks associated with such events if they take steps to promptly detect and respond to them before significant damage is done. In addition, analyzing security incidents allows organizations to gain a better understanding of the threats to their information and the costs of their security-related problems. Such analyses can pinpoint vulnerabilities that need to be eliminated so that they will not be exploited again. Incident reports can be used to provide valuable input for risk assessments, help in prioritizing security improvement efforts, and illustrate risks and related trends for senior management. FISMA requires that agency information security programs include procedures for detecting and reporting security incidents. To ensure effective handling of incidents, HHS policy requires the establishment and maintenance of an incident response capability that includes preparation, identification, containment, eradication, recovery, and follow-up capabilities. HHS operating divisions did not always employ adequate incident detection capabilities. Our analysis of OIG reports found, for example, that 13 CMS Medicare contractors had weaknesses in their intrusion detection policies and procedures. Five of the contractors did not have intrusion detection systems in place, while six were cited for either not reporting incidents in accordance with FISMA guidance or not reporting incidents to CMS. The remaining two contractors exhibited weaknesses in their incident monitoring process and procedures. Finally, one operating division used router and firewall logs for troubleshooting instead of for intrusion detection. The wide disparity in the reporting of security incidents[Footnote 10] and events[Footnote 11] at HHS and its operating divisions also raises concern. For example, the Food and Drug Administration reported over 16 million events while the Centers for Medicare & Medicaid Services and the Centers for Disease Control and Prevention combined reported less than 1,600, as indicated in table 1. Table 1: Reported Incidents among HHS Operating Divisions: September 2005 Event Summary: Operating division: Food and Drug Administration; Number of events: 16,515,911; Number of incidents: 1. Operating division: National Institutes of Health; Number of events: 1,142,424; Number of incidents: 0. Operating division: Health Resources and Services Administration; Number of events: 348,346; Number of incidents: 0. Operating division: Office of the Secretary; Number of events: 162,197; Number of incidents: 1. Operating division: Indian Health Service; Number of events: 79,911; Number of incidents: 2. Operating division: Program Support Center; Number of events: 9,125; Number of incidents: 0. Operating division: Office of the Inspector General; Number of events: 8,839; Number of incidents: 0. Operating division: Agency for Healthcare Research and Quality; Number of events: 1,682; Number of incidents: 0. Operating division: Administration for Children and Families; Number of events: 1,560; Number of incidents: 0. Operating division: Centers for Disease Control and Prevention; Number of events: 1,074; Number of incidents: 0. Operating division: Centers for Medicare & Medicaid Services; Number of events: 429; Number of incidents: 1. Operating division: Administration on Aging; Number of events: 244; Number of incidents: 0. Operating division: Substance Abuse and Mental Health Services Administration; Number of events: 0; Number of incidents: 0. Source: HHS. Notes: Incidents were reported to the U.S. Computer Emergency Response Team. No data were available for the Agency for Toxic Substances and Disease Registry. [End of table] HHS operating divisions collectively reported over 18 million events during September 2005 but less than 10 incidents. We did not attempt to assess the accuracy of the reported events and incidents. However, the disparity in the number of reported events among the operating divisions of relatively similar size raises concerns. This disparity may be an indication of inconsistency among criteria settings and configuration requirements for the respective intrusion detection systems. The reporting disparities may also be influenced by the type and location of the intrusion detection systems. For example, an intrusion detection system located behind a firewall detects fewer events than one located on the perimeter in front of a firewall because of the firewall's ability to block certain network traffic. Intrusion detection systems' visibility to the Internet also increases the potential exposure to security events. Without consistent detection and reporting, HHS cannot be assured that it is handling incidents in an effective manner. Continuity of Operations: Continuity of operations controls can enable systems to be recovered quickly and effectively following a service disruption or disaster. Such controls include plans and procedures designed to protect information resources and minimize the risk of unplanned interruptions, along with a plan to recover critical operations should interruptions occur. These controls should be designed to ensure that when unexpected events occur, key operations continue without interruption or are promptly resumed, and critical and sensitive data are protected. They should also be tested annually or as significant changes are made. It is important that these plans be clearly documented, communicated to potentially affected staff, and updated to reflect current operations. Consistent with federal guidance, HHS policy requires operating divisions to identify, prioritize, and document disaster recovery planning requirements for all critical departmental systems, networks, data, and facilities. CMS's information security policy complies with the departmentwide policy. CMS's Information Security Handbook provides additional guidance as to what key elements should be included in contingency plans. These elements are further detailed in its guidance to CMS contractors. HHS has various efforts underway to address continuity of operations. In its fiscal year 2005 FISMA report, the OIG noted the elimination of the department's significant deficiency relating to contingency planning and disaster recovery. However, shortcomings in continuity of operations still exist. In its FISMA report to OMB for fiscal year 2005, HHS reported that 19.2 percent of its FISMA inventoried systems (34 out of 177) did not have tested contingency plans. Furthermore, the OIG also identified deficiencies in continuity of operations plans developed at HHS's operating divisions. For example, * contingency plans for four major applications at one operating division were not application specific, but were actually the same plan originally developed for the server recovery; * contingency plans did not exist for the local area networks of four operating divisions; * another operating division did not prioritize the recovery of its systems in the divisionwide contingency plan; and: * inadequate documentation existed to determine whether testing had been performed for one of another division's contingency plans. As a result of these weaknesses, the department has limited assurance that operating divisions will be able to protect critical and sensitive information and information systems and resume operations promptly when unexpected events or unplanned interruptions occur. If continuity of operations controls are inadequate, even a relatively minor interruption could result in significant adverse impact on HHS operating divisions' ability to recover and resume operations. Conclusions: Given the size and significance of HHS's information technology investments, and the sensitivity of the medical, personal, and financial data it maintains through these investments, it is imperative that the department develops strong information security controls and implements a comprehensive information security program. While HHS has made progress toward developing and documenting a departmentwide information security program, significant weaknesses in information security controls could lead to the unauthorized disclosure, modification, or destruction of the sensitive data that HHS relies on to accomplish its vital mission. A key reason for these weaknesses is that HHS has not yet fully implemented a departmentwide information security program that can establish and maintain effective controls. Full implementation of such a program would provide for periodically assessing risks, establishing appropriate policies and procedures, developing and implementing security plans, promoting security awareness training, testing and evaluating the effectiveness of controls, implementing corrective actions, responding to incidents, and ensuring continuity of operations. Implementing such a program across all operating divisions requires effective management oversight and monitoring, especially at a department as diverse as HHS. Until HHS strengthens information security controls and fully implements its information security program, it will have limited assurance that its operations and assets are adequately protected. Recommendations for Executive Action: To help HHS fully implement its departmentwide information security program, we recommend that the Secretary of HHS direct the Chief Information Officer to develop and implement policies and procedures to ensure the establishment of minimum acceptable configuration requirements. In addition, we recommend that the Secretary direct the Chief Information Officer to take the following seven steps to ensure that operating divisions: * develop comprehensive risk assessments that address key elements; * complete system security plans for all systems; * provide specialized training to all individuals with significant security responsibilities; * conduct tests and evaluations of the effectiveness of controls on operational systems, and document results; * review remedial action plans to ensure that they address all previously identified weaknesses and key corrective action information; * implement intrusion detection systems and configure them to use consistent criteria for the detection and reporting of security incidents and events; and: * develop and test continuity of operations plans for all of their systems. Agency Comments and Our Evaluation: The Department of Health and Human Services's Inspector General transmitted the department's written comments on a draft of this report (reprinted in app. II). In these comments, HHS supported our emphasis on improvements needed in key information security program elements, but stated that our report did not appropriately reflect the progress that the department has made in addressing information security. Specifically, HHS expressed concerns that our evaluation approach did not provide an accurate or complete appraisal of the department's information security program, in that the report does not mention the department's defense-in-depth strategy or accomplishment of two major goals--the department's campaign to mitigate its deficiency pertaining to contingency planning and reduce its number of reportable conditions by 25 percent. According to HHS, it employs a defense-in-depth strategy to ensure threats are effectively addressed and mitigated. We acknowledge HHS's statement on its defense-in-depth strategy, but note that the significant control weaknesses identified in this report and by independent auditors indicate that this strategy is not fully working as intended. With regard to the two major goals, we have revised the report to reflect the elimination of the contingency planning deficiency. Regarding the department's reduction in: the number of reportable conditions, in its report on internal controls,[Footnote 12] the OIG's independent auditor reported progress made in strengthening security controls; however, it still reported weaknesses in several information security areas, including the entitywide security program, access controls, application development and program change controls, system software, and service continuity. HHS also noted that our report did not mention recent improvements or progress made in information security until a brief statement in the conclusion of the report, and that the report was predicated on findings originally documented by the HHS OIG in fiscal year 2005. However, throughout the report we acknowledge HHS's improvements and progress made in correcting information security weaknesses and have added additional statements based on these comments. In addition, as noted in our scope and methodology, our evaluation included the most recent reports issued at the time of our review. In its comments, HHS also expressed concern over our use of the word "significant" to describe the reported weaknesses. In their most recent report on internal controls, the OIG's independent auditor reported information security as a "reportable condition"[Footnote 13] at the department. The auditors concluded that "the cumulative effect of these weaknesses represents significant deficiencies in the overall design and operation of internal controls." Based on the findings in our report, the definition of "reportable condition," and the comments of the independent auditors, we believe the use of the word "significant" is appropriate to describe these weaknesses. HHS also took exception to our conclusion that it had not fully implemented a departmentwide information security program, and stated that our findings instead indicate that the full integration or maturity of the program has not been achieved. FISMA requires that agencies develop, document, and implement an information security program. As stated in our report, we acknowledged that HHS has made progress in developing and documenting its program. However, elements of the program have not been fully or consistently implemented. For example, three systems at three different operating divisions had not undergone system testing and evaluation. As a result, we believe that the use of the phrase "not fully implemented" is appropriate for describing HHS's shortcomings in its information security program. Additionally, the department stated that our assessment of its security program was based on a small percentage of HHS systems. However, as noted in our scope and methodology, we selected applications and general support systems because they support HHS's departmentwide financial reporting and communications, or Medicare payment and communication functions at CMS and its contractors--operations that are critical to the department. These included the Medicare Claims Processing Systems that processed over one billion claims and $294 billion in claims payments in 2004; the CMS Communication Network that provides connectivity between CMS and its business-related entities; and the HHS Enterprise Services Network that provides a shared network backbone for several HHS operating divisions. The department also noted that our statement that HHS had not developed departmentwide policies regarding minimally acceptable configuration requirements was inaccurate. In its comments, HHS states that "plans are in place" to standardize implementation in fiscal year 2006 and that the divisional chief information security officers formed a subcommittee to develop configuration standards. Although these are positive efforts, we believe that such statements support our conclusion that such policies have not yet been developed. In addition, the department noted that we did not acknowledge progress made relating to contingency planning. HHS stated that it had completed and tested contingency plans for 100 percent of its high-risk FISMA systems. However, the HHS OIG did not concur with this statement, reporting that one of the seven high-risk systems that they evaluated did not have tested contingency plans. As mentioned previously, the department also stated that we did not acknowledge the elimination of their sole existing significant deficiency relating to contingency planning and disaster recovery. We have revised the report to reflect the elimination of this deficiency. Finally, the department noted additional improvements specific to CMS that were not included in our report. The department cited the elimination of a long standing CMS material weakness in Medicare electronic access controls. However, this material weakness was downgraded to a reportable condition, indicating that significant deficiencies still exist. The department also stated that we did not acknowledge significant progress in FISMA compliance made by its fiscal intermediaries and carriers and that they provided these results to the HHS OIG in early December 2005. However, these reports were not available for release to us at that time. Additionally, the department stated that we did not acknowledge CMS's significant achievements in meeting it statutory responsibilities under FISMA, as reported by the HHS OIG. We acknowledge in the report that HHS, which includes CMS, has begun to implement the foundation for an effective information security program. While the HHS OIG FISMA report cited some achievements made by CMS, the HHS OIG also noted 28 exceptions in the CMS information security program. HHS also provided specific technical comments, which we have incorporated, as appropriate, in the report. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time we will send copies of this report to the Secretary of Health and Human Services. We will also make copies available to others upon request. In addition, this report will be available at no charge on the GAO Web site at [Hyperlink, http://www.gao.gov]. If you have any questions regarding this report, please contact me at (202) 512-6244 or by e-mail at [Hyperlink, wilshuseng@gao.gov]. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. Sincerely yours, Signed by: Gregory C. Wilshusen: Director, Information Security Issues: [End of section] Appendixes: Appendix I: Objective, Scope, and Methodology: The objective of our review was to assess the effectiveness of the HHS information security program, particularly at CMS, in protecting the confidentiality, integrity, and availability of its information and information systems. To accomplish this objective, we evaluated the effectiveness of HHS's information security controls, and whether HHS had developed, documented, and implemented a departmentwide information security program consistent with federal laws and policies. To evaluate the effectiveness of HHS's information security controls, we examined 74 management and audit reports pertaining to information security practices and controls at 13 operating divisions issued by the department, its Office of the Inspector General (OIG), and independent auditors during 2004 and 2005. These reports identified information security control weaknesses at HHS, the operating divisions, and contractor-owned facilities, which we then classified according to the general control categories specified in our Federal Information System Controls Audit Manual (FISCAM).[Footnote 14] Further, these reports contained specific recommendations to the department to remedy identified information security control weaknesses. To evaluate whether HHS had developed and documented a departmentwide information security program consistent with federal laws and policies, we examined related documents, such as policies and procedures, handbooks, various types of security-related reports, and HHS's information systems inventory. We assessed whether its program was consistent with the requirements of FISMA, as well as applicable Office of Management and Budget policies and National Institute of Standards and Technology guidance related to risk assessments, risk-based policies and procedures, information security plans, security awareness training, testing and evaluating security controls, remedial action plans, handling security incidents, and continuity of operations for information systems. We also held discussions with CMS and contractor officials responsible for information security management and with the HHS Inspector General staff regarding any related prior, ongoing, or planned work in these areas. To evaluate whether HHS had implemented an information security program consistent with federal laws and policies, we focused our review on CMS--the operating division with the largest budget in the department- -as well as the Office of the Secretary, an operating division with a departmentwide perspective. We compared their documented practices and controls to the departmentwide information security program as well as applicable FISMA requirements, OMB policy, and NIST guidance. To determine how well the operating divisions were implementing their own policies and procedures, we evaluated available risk assessments, security plans, security and awareness training, system tests and evaluations, remedial actions, and continuity of operations for the following major applications and general support systems: * Automated Financial Statement System--a system to collect operating divisions' financial statement data to generate the departmentwide year- end and quarterly statements. * Information Collection Review and Approval System--a web-based database application used by HHS, the Securities and Exchange Commission and OMB to help federal agencies electronically administer and manage its information collection clearance responsibilities under the Paperwork Reduction Act. * HHS's Enterprise Services Network--the enterprise network for the department. It is comprised of a combination of very high performance network services provided by a public communications carrier. * Medicare Claims Processing Systems--a CMS contractor operated group of systems used to process Medicare claims--including inpatient hospital care, nursing facilities, home health care, and other health care services. * CMS communications network--a private network that provides connectivity between CMS and its business-related entities that provide Medicare services. We selected these applications and systems because they support either (1) HHS's enterprisewide financial reporting and communication functions, or (2) CMS's and its contractors' Medicare payments and communication functions. We performed our work at HHS headquarters in Washington, D.C., and the CMS Central Office, located in Baltimore, Maryland. This review was performed from June through December 2005 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Comments from the Department of Health and Human Services: DEPARTMENT OF HEALTH & HUMAN SERVICES: Office of Inspector General: Washington, D.C. 20201: FEB 14 2006: Mr. Gregory C. Wilshusen: Director, Information Security Issues: U.S. Government Accountability Office: Washington, DC 20548: Dear Mr. Wilshusen: Enclosed are the Department's comments on the U.S. Government Accountability Office's (GAO) draft report entitled, "INFORMATION SECURITY: Department of Health and Human Services Needs to Fully Implement Its Program" (GAO-06-267). These comments represent the tentative position of the Department and are subject to reevaluation when the final version of this report is received. The Department provided several technical comments directly to your staff. The Department appreciates the opportunity to comment on this draft report before its publication. Sincerely, Signed by: Daniel R. Levinson: Inspector General: Enclosure: The Office of Inspector General (OIG) is transmitting the Department's response to this draft report in our capacity as the Department's designated focal point and coordinator for U.S. Government Accountability Office reports. OIG has not conducted an independent assessment of these comments and therefore expresses no opinion on them. COMMENTS OF THE DEPARTMENT OF HEALTH AND HUMAN SERVICES ON THE U.S. GOVERNMENT ACCOUNTABILITY OFFICE'S DRAFT REPORT ENTITLED, "INFORMATION SECURITY: DEPARTMENT (IF HEALTH AND HUMAN SERVICES NEEDS TO FULIN IMPLEMENT ITS PROGRAM" (GAO-06-267): The Department of Health and Human Services (HHS) appreciates the opportunity to comment on the draft report. We appreciate the efforts GAO undertook to examine HHS's information security program. The comments that follow represent HHS's responses to the draft report. The evaluation approach utilized by GAO does not provide an accurate or complete appraisal of the HHS enterprise-wide information security program. The GAO "Results in Brief" section and the majority of the remaining document focus exclusively on security control weaknesses that could place the confidentiality, integrity, and availability of sensitive information and information systems at risk. Yet, there is no mention of HHS's defense-in-depth strategy which is employed throughout the enterprise and results in layering of safeguards to ensure threats to confidentiality, integrity, and availability are effectively addressed and mitigated, thereby reducing the probability of single points of failure. Nor is there recognition of the ambitious campaign HHS launched in fiscal year (FY) 2005 to accomplish two major goals - address and mitigate its sole existing significant deficiency pertaining to contingency planning and disaster recovery and reduce its number of reportable conditions by 25 percent. In fact, HHS exceeded this goal, eliminating its sole significant deficiency and reducing the number of reportable conditions by 57 percent from FY 2004 to FY 2005. These accomplishments were documented in the FY 2005 Office of Inspector General (OIG) Federal Information Security Management Act (FISMA) Executive Summary, but not recorded in this draft GAO report. We request that these successes be noted in the GAO report. There is no mention of HHS's information security improvements or progress until the brief statement in the conclusion of the report. The majority of the GAO report is predicated on the findings originally documented by HHS OIG in FY 2005, (between January and June 2005) and is representative of activities carried out in support of the information security program throughout 2004 and 2005. This GAO assessment is scheduled for publication in February 2006, but will not reflect at least seven additional months of progress and maturity in HHS's security posture. Please consider including the additional points and evidence provided in this draft GAO assessment response as confirmation of further strides made in support of HHS's information security program implementation in the months following the FY 2005 OIG evaluation. The frequent use of the word "significant" to describe control weaknesses documented throughout this GAO assessment evokes a negative connotation that is not reflective of the progress or current state of HHS's information security program. In light of HHS's successful elimination of its sole significant deficiency, HHS requests the removal of the word "significant" to describe the depth of control weaknesses in this assessment. Alternatively, we recommend use of "noteworthy" or "important" to describe these weaknesses. HHS, consistent with the National Institute of Standards and Technology (KIST), defines implementation as observed consistency with policies and procedures. Evidence of general compliance with policy and procedures exists at the enterprise and OPDIV levels. In 2003, HHS formally established the foundation of its information security program to ensure the confidentiality, integrity, and availability of the information it collects, stores, and processes to meet its strategic missions on behalf of the American citizenry. Since 2003, the HHS information security program has continued to evolve, resulting in standard, repeatable security processes disseminated throughout its 14 Operating Divisions (OPDIVs). HHS, as acknowledged in the FY 2005 OIG FISMA Executive Summary, issued an overarching information security policy, an information security program handbook, and numerous guides. HHS initiated a variety of analysis and oversight activities, continuously monitoring and improving current security practices. The observations in this GAO assessment identify information security areas in which improvements can be made but, when considered collectively, do not equate to HHS having "not fully implemented a Department wide information security program." [NOTE 1] Instead, these findings indicate that full integration, or maturity, has not yet been achieved. Integration represents a level of growth beyond implementation in which HHS tests security practices and controls for compliance and mitigates the results of these tests to demonstrate continued improvement. HHS, through its increasing oversight activities, strives towards such integration. Therefore, HHS agrees that full integration has not yet been achieved, but requests that the implementation of the security program be recognized in this report. The HHS information security program addresses each of the key elements required by FISMA. HHS assesses risk periodically; disseminates necessary policies and procedures; develops security plans; delivers security awareness and training; tests and evaluates system controls at least annually; detects, responds to and reports incidents; plans continuity of operations; and maintains reliable monitoring and reporting capabilities. This programmatic structure, as mandated by law and proven in practice, led to the development of sound security practices and continuous improvement in HHS's overall security posture. On page 17, the GAO assessment implies that the HHS information security program is not "well-designed." The program, however, adheres to law and is acknowledged in the FY 2005 OIG FISMA Executive Summary as a program intended to "improve the Department's overall IT security posture, ensure adequate enterprise-wide security standards, support integration of IT security into lines of business, and promote an environment in which employee actions reflect the importance of IT security." [NOTE 2] HHS requests that the terms "well-designed" and "fully implemented" be revised to read "fully integrated" to more accurately describe the HHS information security program posture. NOTES: [1] Report GAO-06-267, Department of Health and Human Services Needs to Fully Implement Its Program, page 6. [2] FY 2005 OIG Annual FISMA Executive Summary, page 10. The HHS Information Security Program Policy, signed by the HHS Chief Information Officer (CIO) and released to the HHS OPDIVs on January 26, 2004, articulates the roles and responsibilities for each category of security personnel and addresses each information program area required by FISMA. Compliance with this policy is mandatory. HHS developed an information security program handbook to complement this overarching security policy and to recommend procedures for implementation of policy stipulations. Therefore, the statement on page 19 asserting that "Operating divisions are expected to comply with departmental standards or develop specific standards that exceed them" is not accurate and should be revised. As stated on page v of the Information Security Program Policy, "compliance with this document is mandatory. It is HHS policy that Department personnel abide by or exceed the requirements outlined in this document." HHS requests that the word "expected" be replaced with "required" to reinforce the stringency of HHS's policy compliance. In some instances, determinations were made regarding enterprise-wide weaknesses based on small percentages of HHS FISMA systems. Documentation pertaining to six or fewer percent of HHS's total FISMA systems is not evidence of incomplete implementation of an enterprise- wide security program. Nor does it indicate systematic problems in HHS's certification and accreditation (C&A) processes. The GAO assessment references four OPDIV risk assessments that lacked information or had not been completed. These four systems' risk assessments represent only two percent of HHS's 177 total FISMA systems. Two incomplete security plans were cited to constitute an overarching system security plan finding, although these two plans represent a mere one percent of the 177 HHS's FISMA systems. The GAO assessment identified six OPDIV systems for which annual system security control tests and evaluations were not completed, equaling only three percent of HHS's FISMA systems. The FY 2005 OIG FISMA findings document that 83.3 percent of the OPDIV system sample reviewed had completed C&A packages, including satisfactory risk assessments, system security plans, and annual security control tests and evaluations. In addition, in FY 2005, OIG deemed the Department's C&A process "satisfactory" for the first time. We believe that the statistics cited above more accurately reflect the current state of HHS's information security and that the related GAO findings should be excluded from the report. The HHS Information Security Program Policy documents the following policy pertaining to change management and configuration management controls, "3.6 Change Management Control: Establish, implement, and enforce change management and configuration management controls on all Departmental systems and networks that process, store, or communicate sensitive information, to include the preparation of configuration control plans for all Departmental systems and networks." [NOTE 3] The GAO assessment, on page 21, stating "HHS has not developed Department wide policies regarding minimally acceptable configuration requirements" is inaccurate and should be revised. Plans are in place to standardize, monitor, and enforce the extent of implementation according to OMB standards in FY 2006. OPDIV Chief Information Security Officers (CISO) also formed a configuration management subcommittee to develop configuration standards specific to the most predominant operating systems in the HHS security environment. NOTE: [3] HHS Information Security Program Policy, January 26, 2004, page 18. HHS, as noted in the FY 2005 OIG FISMA Executive Summary and above, "initiated procedures that resulted in the elimination of a previously identified significant deficiency." The Department established and completed contingency plans and performance testing at system levels, thereby eliminating this deficiency, related to Department level contingency planning and disaster recovery. HHS's role as the lead agency for public health services - including prevention, surveillance, laboratory services, and personal health services - made the elimination of this significant deficiency vital. Additionally, HHS completed and tested contingency plans for 100 percent of its high-risk FISMA systems, or those systems that would result in a catastrophic loss of confidentiality, integrity, and availability should their security be compromised. These accomplishments and their significance to the overall HHS mission should be noted in the GAO assessment. In addition to our comments pertaining to the HHS enterprise-wide information security program, there are three additional points pertaining to the Centers for Medicare & Medicaid Services (CMS): In FY 2005, CMS initiated an aggressive initiative to rid itself of a material weakness attributable to Medicare Electronic Data Processing (EDP) based on Federal Information System Controls Audit Manual (FISCAM) audits performed in FY 2004. Our progress toward this goal was tracked monthly as a part of the HHS Risk Management and Financial Oversight Committee. The Medicare Claims Processing System (MCPS) was the primary focus of the GAO review. The FY 2005 Report of the Independent Auditors on Internal Control, also focused primarily on the MCPS, found that CMS had made improvements in its entity-wide security program, systems software, and service continuity planning and testing. There was a significant 63 percent reduction in high-risk findings in FY 2005 over FY 2004. The progress was such that the long-standing material weakness in Medicare EDP controls based on FISCAM was eliminated. The progress noted in the FY 2005 Report of the Independent Auditors on Internal Control was provided and discussed with the GAO auditors. In FY 2005, CMS also made significant progress in its compliance with the requirements of FISMA. Under section 912 of the Medicare Prescription Drug, Improvement, and Modernization Act of 2003 CMS is required to evaluate our fiscal intermediaries and carriers for compliance with FISMA. Similar to the FISCAM findings, GAO based its conclusions, at least in part, on evaluations that were a year old. Again, CMS made significant strides in FY 2005. In fact, the FY 2005 evaluation results, provided to OIG in early December 2005, and offered to GAO, reflect a 70 percent reduction in high-risk findings over FY 2004, with significant improvement in the areas of Policies and Procedures, Systems Security Plans, Incident Handling, and Continuity of Operations. The FY 2005 OIG report of CMS's FISMA compliance also noted that CMS had made "significant achievements in meeting its statutory responsibilities under FISMA." Accomplishments in security policy, contingency plans, and training were cited by OIG. Again, this documented improvement in CMS' FISMA compliance was not acknowledged in the GAO report, although the report was made available. In summary, HHS is proud of its information security program and the progress it has made over the last fiscal year, specifically in its improved satisfaction of FISMA requirements. HHS proactively measures and tests compliance with information security policies, processes, Federal standards, and requirements. Testing indicates consistent improvements throughout the enterprise, but given such rigorous and aggressive testing, there will invariably be findings. HHS's emphasizes risk management and the strong remediation of discrepancies once identified. HHS places great importance on achieved progress and positive results. The Department utilizes such successes to build momentum within the program itself. HHS's proactive approach to security program implementation and management resulted in a substantial reduction in findings and risks, both at odds with the GAO report. We regret the GAO report did not consider the more recent data available. HHS supports the GAO's emphasis on improvements in the eight areas of FISMA, since continuous improvement in system security exemplified through the system development lifecycle is a must for all government agencies. HHS endeavors to farther improve its information security program, staying in step with existing and emerging Federal requirements and industry best practices. [End of section] Appendix III: HHS Operating Divisions: Administration for Children and Families--responsible for some 60 programs that promote the economic and social well being of children, families and communities. Administration on Aging--supports a nationwide network providing services to the elderly, especially to enable them to remain independent. Agency for Healthcare Research and Quality--supports research on health care systems, health care quality and cost issues, access to health care, and effectiveness of medical treatments. It provides evidence- based information on health care outcomes and quality of care. Agency for Toxic Substances and Disease Registry--responsible for preventing exposure to hazardous substances from waste sites on the U.S. Environmental Protection Agency's National Priorities List and develops toxicological profiles of chemicals at these sites. Centers for Disease Control and Prevention--provides a system of health surveillance to monitor and prevent disease outbreaks, implements disease prevention strategies, and maintains national health statistics. The centers also provide for immunization services, workplace safety, and environmental disease prevention. In addition, the centers guard against international disease transmission, with personnel stationed in more than 25 foreign countries. Centers for Medicare & Medicaid Services--administers the Medicare and Medicaid programs, which provide health care to about one in every four Americans. Medicare provides health insurance for more than 42.1 million elderly and disabled Americans. Medicaid, a joint federal-state program, provides health coverage for some 44.7 million low-income persons, including 21.9 million children, and nursing home coverage for low-income elderly. CMS also administers the State Children's Health Insurance Program that covers more than 4.2 million children. Food and Drug Administration--responsible for assuring the safety of foods and cosmetics, and the safety and efficacy of pharmaceuticals, biological products, and medical devices--products that represent almost 25 cents of every dollar in U.S. consumer spending. Health Resources and Services Administration--provides access to essential health care services for people who are low-income, uninsured or who live in rural areas or urban neighborhoods where health care is scarce. The agency helps prepare the nation's health care system and providers to respond to bioterrorism and other public health emergencies, maintains the National Health Service Corps, and helps build the health care workforce through training and education programs. Indian Health Service--provides health services to 1.6 million American Indians and Alaska Natives of more than 550 federally recognized tribes. The Indian health system includes 49 hospitals, 247 health centers, 348 health stations, satellite clinics, residential substance abuse treatment centers, Alaska Native village clinics, and 34 urban Indian health programs. National Institutes of Health--a medical research organization, supporting over 38,000 research projects nationwide in diseases including cancer, Alzheimer's, diabetes, arthritis, heart ailments, and AIDS. Office of Inspector General--The OIG is responsible for protecting the integrity of HHS programs, as well as the health and welfare of the beneficiaries of those programs. It is also responsible for reporting program and management problems and recommendations to correct them to both the Secretary of HHS and to Congress. The OIG's duties are carried out through a nationwide network of audits, investigations, inspections, and other mission-related functions performed by OIG components. Office of the Secretary--provides counsel to the secretary on such issues as public affairs, legislation, budget, technology, and finance. Program Support Center--The Program Support Center was created in 1995 to provide a wide range of administrative support within the Department of Health and Human Services, allowing the department operating divisions to concentrate on their core functional and operational objectives. Substance Abuse and Mental Health Services Administration--works to improve the quality and availability of substance abuse prevention, addiction treatment, and mental health services. [End of section] Appendix IV: GAO Contact and Staff Acknowledgments: GAO Contact: Gregory C. Wilshusen (202) 512-6244: Acknowledgments: In addition to the person named above, Idris Adjerid, Larry Crosland, Jeffrey Knott, Carol Langelier, Ronald Parker, Amos Tevelow, and William Thompson made key contributions to this report. (310559): FOOTNOTES [1] Title III, E-Government Act of 2002, P.L. 107-347 (Dec. 17, 2002). [2] A denial-of-service attack is an attack on a network that sends a flood of useless traffic that prevents legitimate use of the network. [3] An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. [4] An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of an organization's information or operations with suppliers, vendors, partners, customers, or other businesses. [5] Office of Management and Budget, Circular A-130, appendix III, Security of Federal Automated Information Resources (Nov. 28, 2000). [6] FISMA requires each agency to develop, document, and implement an agencywide information security program to provide information security for the information and systems that support the operations and assets of the agency, including those operated or maintained by contractors or others on behalf of the agency, using a risk-based approach to information security management. 44 USC § 3544(b). [7] NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems, July 2002. [8] NIST Special Publication 800-18, Guide for Developing Security Plans for Information Technology Systems, December 1998. [9] NIST Special Publication 800-26, Security Self-Assessment Guide for Information Technology Services, July 2002. [10] HHS defines a security incident as the violation of an explicit or implied security policy in a computing or telecommunications system or network. [11] HHS defines an event as a notable occurrence in a network or system. [12] Included in HHS's Fiscal Year 2005 Performance and Accountability Report, section III. [13] The American Institute of Certified Public Accountants' standards define "reportable conditions" as significant deficiencies in the design or operation of internal control that could adversely affect the entity's ability to record, process, summarize, and report financial data consistent with the assertions of management in the financial statements. [14] GAO/AIMD-12.19.6 (Washington, D.C.: January 1999). FISCAM contains guidance for reviewing information system controls that affect the security of computerized data. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.