Information Security
Department of Health and Human Services Needs to Fully Implement Its Program
Gao ID: GAO-06-267 February 24, 2006
The Department of Health and Human Services (HHS) is the nation's largest health insurer and the largest grant-making agency in the federal government. HHS programs impact all Americans, whether through direct services, scientific advances, or information that helps them choose medical care, medicine, or even food. For example, the Centers for Medicare & Medicaid Services (CMS), a major operating division within HHS, is responsible for the Medicare and Medicaid programs that provide care to about one in every four Americans. In carrying out their responsibilities, both HHS and CMS rely extensively on networked information systems containing sensitive medical and financial information. GAO was asked to assess the effectiveness of HHS's information security program, with emphasis on CMS, in protecting the confidentiality, integrity, and availability of its information and information systems.
HHS and CMS have significant weaknesses in controls designed to protect the confidentiality, integrity, and availability of their sensitive information and information systems. HHS computer networks and systems have numerous electronic access control vulnerabilities related to network management, user accounts and passwords, user rights and file permissions, and auditing and monitoring of security-related events. In addition, weaknesses exist in other types of controls designed to physically secure computer resources, conduct suitable background investigations, segregate duties appropriately, and prevent unauthorized changes to application software. All of these weaknesses increase the risk that unauthorized individuals can gain access to HHS information systems and inadvertently or deliberately disclose, modify, or destroy the sensitive data that the department relies on to deliver its vital services. A key reason for these control weaknesses is that the department has not yet fully implemented a departmentwide information security program. While HHS has laid the foundation for such a program by developing and documenting policies and procedures, the department has not yet fully implemented key elements of its information security program at all of its operating divisions. Specifically, HHS and its operating divisions have not fully implemented elements related to (1) risk assessments, (2) policies and procedures, (3) security plans, (4) security awareness and training, (5) tests and evaluations of control effectiveness, (6) remedial actions, (7) incident handling, and (8) continuity of operations plans. Until HHS fully implements a comprehensive information security program, security controls may remain inadequate; responsibilities may be unclear, misunderstood, and improperly implemented; and controls may be inconsistently applied. Such conditions may lead to insufficient protection of sensitive or critical resources and disproportionately high expenditures for controls over low-risk resources.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-06-267, Information Security: Department of Health and Human Services Needs to Fully Implement Its Program
This is the accessible text file for GAO report number GAO-06-267
entitled 'Information Security: Department of Health and Human Services
Needs to Fully Implement Its Program' which was released on March 23,
2006.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Chairman, Committee on Finance, U.S. Senate:
February 2006:
Information Security:
Department of Health and Human Services Needs to Fully Implement Its
Program:
GAO-06-267:
GAO Highlights:
Highlights of GAO-06-267, a report to the Chairman, Committee on
Finance, U.S. Senate:
Why GAO Did This Study:
The Department of Health and Human Services (HHS) is the nation‘s
largest health insurer and the largest grant-making agency in the
federal government. HHS programs impact all Americans, whether through
direct services, scientific advances, or information that helps them
choose medical care, medicine, or even food. For example, the Centers
for Medicare & Medicaid Services (CMS), a major operating division
within HHS, is responsible for the Medicare and Medicaid programs that
provide care to about one in every four Americans. In carrying out
their responsibilities, both HHS and CMS rely extensively on networked
information systems containing sensitive medical and financial
information.
GAO was asked to assess the effectiveness of HHS‘s information security
program, with emphasis on CMS, in protecting the confidentiality,
integrity, and availability of its information and information systems.
What GAO Found:
HHS and CMS have significant weaknesses in controls designed to protect
the confidentiality, integrity, and availability of their sensitive
information and information systems. HHS computer networks and systems
have numerous electronic access control vulnerabilities related to
network management, user accounts and passwords, user rights and file
permissions, and auditing and monitoring of security-related events. In
addition, weaknesses exist in other types of controls designed to
physically secure computer resources, conduct suitable background
investigations, segregate duties appropriately, and prevent
unauthorized changes to application software. All of these weaknesses
increase the risk that unauthorized individuals can gain access to HHS
information systems and inadvertently or deliberately disclose, modify,
or destroy the sensitive data that the department relies on to deliver
its vital services.
A key reason for these control weaknesses is that the department has
not yet fully implemented a departmentwide information security
program. While HHS has laid the foundation for such a program by
developing and documenting policies and procedures, the department has
not yet fully implemented key elements of its information security
program at all of its operating divisions. Specifically, HHS and its
operating divisions have not fully implemented elements related to (1)
risk assessments, (2) policies and procedures, (3) security plans, (4)
security awareness and training, (5) tests and evaluations of control
effectiveness, (6) remedial actions, (7) incident handling, and (8)
continuity of operations plans. Until HHS fully implements a
comprehensive information security program, security controls may
remain inadequate; responsibilities may be unclear, misunderstood, and
improperly implemented; and controls may be inconsistently applied.
Such conditions may lead to insufficient protection of sensitive or
critical resources and disproportionately high expenditures for
controls over low-risk resources.
What GAO Recommends:
GAO recommends that the Secretary of HHS direct the Chief Information
Officer to take steps to fully implement key elements of the
department‘s information security program at all operating divisions.
In commenting on a draft of this report, HHS supported GAO‘s emphasis
on improvements to its security program, but did not believe the report
sufficiently reflected progress made.
www.gao.gov/cgi-bin/getrpt?GAO-06-267.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Gregory C. Wilshusen at
(202) 512-6244 or Wilshuseng@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
Weak Controls and Incomplete Implementation Compromise Effectiveness of
HHS's Information Security Program:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendixes:
Appendix I: Objective, Scope, and Methodology:
Appendix II: Comments from the Department of Health and Human Services:
Appendix III: HHS Operating Divisions:
Appendix IV: GAO Contact and Staff Acknowledgments:
Table:
Table 1: Reported Incidents among HHS Operating Divisions:
Figure:
Figure 1: HHS Fiscal Year 2005 Budget:
Abbreviations:
CMS: Centers for Medicare & Medicaid Services:
FISMA: Federal Information Security Management Act:
HHS: Department of Health and Human Services:
NIST: National Institute of Standards and Technology:
OIG: Office of the Inspector General:
OMB: Office of Management and Budget:
Letter February 24, 2006:
The Honorable Charles E. Grassley:
Chairman:
Committee on Finance:
United States Senate:
Dear Mr. Chairman:
The Department of Health and Human Services (HHS) is the nation's
largest health insurer and the largest grant-making agency in the
federal government. The department protects and promotes the health and
well-being of all Americans and provides world leadership in biomedical
and public health sciences. The programs of the department impact all
Americans, whether through direct services, scientific advances, or
information that helps them choose medical care, medicine, or even
food. For example, the Centers for Medicare & Medicaid Services (CMS),
a major operating division within HHS responsible for the Medicare and
Medicaid programs, oversees the nation's largest health insurance
programs, which provide care to about one in every four Americans.
HHS relies on automated information systems and interconnected networks
to process and pay medical claims; conduct medical research; manage its
wide spectrum of health, disease prevention, and food and safety
programs; and support its departmentwide financial and management
functions. Effective information security controls are essential for
ensuring that information technology resources are adequately protected
from inadvertent or deliberate misuse, fraudulent use, or destruction.
Interruptions in HHS's financial and information management systems
could have a significant adverse affect on the health, welfare, and
mental well-being of millions of American citizens who depend on its
services.
At your request, we assessed the effectiveness of the HHS information
security program, particularly at CMS, in protecting the
confidentiality, integrity, and availability of its information and
information systems. To accomplish this objective, we evaluated the
effectiveness of HHS's information security controls, and whether HHS
had developed, documented, and implemented a departmentwide information
security program consistent with federal laws and policies. To
supplement our work, we analyzed 74 information security-related
reports issued during 2004 and 2005 by HHS, its Office of the Inspector
General (OIG), and independent auditors. This review was performed from
June through December 2005 in accordance with generally accepted
government auditing standards. For further information about our
objective, scope, and methodology, refer to appendix I.
Results in Brief:
Significant weaknesses in information security controls at HHS and at
CMS in particular put at risk the confidentiality, integrity, and
availability of their sensitive information and information systems.
HHS has not consistently implemented effective electronic access
controls designed to prevent, limit, and detect unauthorized access to
sensitive financial and medical information at its operating divisions
and contractor-owned facilities. Numerous electronic access control
vulnerabilities related to network management, user accounts and
passwords, user rights and file permissions, and auditing and
monitoring of security-related events exist in its computer networks
and systems. In addition, weaknesses exist in controls designed to
physically secure computer resources, conduct suitable background
investigations, segregate duties appropriately, and prevent
unauthorized changes to application software. These weaknesses increase
the risk that unauthorized individuals can gain access to HHS
information systems and inadvertently or deliberately disclose, modify,
or destroy the sensitive medical and financial data that the department
relies on to deliver its vital services.
A key reason for these weaknesses is that the department has not yet
fully implemented its information security program. HHS has laid the
foundation for an effective information security program by developing
written policies and guiding procedures that designate responsibility
for implementation throughout the department. However, it has not yet
fully implemented key elements of the program. Specifically, its
operating divisions have not fully implemented elements related to (1)
risk assessments, (2) policies and procedures, (3) security plans, (4)
security awareness and training, (5) tests and evaluations of control
effectiveness, (6) remedial actions, (7) incident handling, and (8)
continuity of operations plans. Without a fully implemented program,
security controls may remain inadequate or inconsistently applied and
responsibilities may be unclear, misunderstood, or improperly
implemented. This may lead to insufficient protection of sensitive or
critical resources, and disproportionately high expenditures on
controls over low-risk resources.
In reports by the HHS OIG and other independent auditors, specific
recommendations were made to the department to remedy identified
information security control weaknesses. In this report, we are
recommending that the Secretary of Health and Human Services direct the
HHS Chief Information Officer (CIO) to take steps to ensure full
implementation of its information security program across all HHS
operating divisions.
In commenting on a draft of this report, HHS supported our emphasis on
improvements needed in key information security program elements, but
did not believe that the report sufficiently reflected the progress
that the department has made in addressing information security. We
acknowledge in the report that HHS has made progress in correcting its
information security control weaknesses and has begun to implement the
foundation for an effective information security program. HHS also
provided specific technical comments, which we have incorporated, as
appropriate, in the report.
Background:
HHS is the federal government's principal agency responsible for
protecting the health of all Americans and providing essential human
services, especially for those who are least able to help themselves.
The department manages more than 300 programs covering a wide spectrum
of activities that include health and social science research, disease
prevention, food and drug safety, health information technology, health
insurance for elderly and disabled Americans (Medicare), health
insurance for low-income people (Medicaid), and comprehensive health
services for Native Americans. Other services provided by the
department include financial assistance to low-income families, pre-
school education programs such as Head Start, child abuse and domestic
violence programs, substance abuse treatment and prevention programs,
and programs to help older Americans, such as providing home-delivered
meals.
HHS has 14 operating divisions (see app. III for a description of each
division) to manage its programs and administered more grant dollars
than all other federal agencies combined. HHS employs about 67,000
employees and is responsible for managing a fiscal year 2005 budget of
approximately $581 billion. Each year HHS handles more than a billion
health care claims, supports over 38,000 research projects focusing on
diseases, provides funding to treat more than 650,000 persons with
serious substance abuse or mental health problems, and serves more than
900,000 pre-school children.
The Centers for Medicare & Medicaid Services (CMS) is an HHS operating
division responsible for administering two major health programs. It
administers the Medicare program, the nation's largest health insurance
program, which covers more than 42 million Americans. This program was
enacted to extend affordable health insurance coverage to the elderly
and was later expanded to cover the disabled. In partnership with the
states, CMS also administers Medicaid, a means-tested health care
program for low-income Americans. Medicaid is the primary source of
health care for a large population of medically vulnerable Americans,
including poor families, the disabled, and persons with developmental
disabilities requiring long-term care. In coordination with the
Medicaid program, the State Children's Health Insurance Program
provides health care coverage for children. CMS employs about 4,900
employees and has a fiscal year 2005 budget of approximately $480
billion or 83 percent of the HHS budget, as shown in figure 1.
Figure 1: HHS Fiscal Year 2005 Budget:
[See PDF for image]
[End of figure]
HHS relies extensively on computerized systems to support its mission
critical operations and store the sensitive information it collects. It
uses these systems to support the department's financial and management
functions, maintain sensitive employee personnel information, and
process financial and medical data for millions of health care
recipients. Its local and wide area networks interconnect these
systems. In addition, HHS relies on contractor-owned systems to process
departmental information and support its mission. For fiscal year 2005,
HHS planned to spend nearly $5 billion on information technology--more
than any other federal agency except the Department of Defense. A
significant amount of these funds will be spent to facilitate the
processing and payment of Medicare claims processed by CMS or its
Medicare contractors.
Information system controls are a critical consideration for any
organization that depends on computerized systems and networks to carry
out its mission or business. Without proper safeguards, there is risk
that individuals and groups with malicious intent may intrude into
inadequately protected systems and use this access to obtain sensitive
information, commit fraud, disrupt operations, or launch attacks
against other computer systems and networks.
In December 2002, Congress enacted the Federal Information Security
Management Act of 2002 (FISMA)[Footnote 1] to strengthen security of
information and information systems within federal agencies. FISMA
requires each agency to develop, document, and implement an agencywide
information security program to provide information security for the
information and systems that support the operations and assets of the
agency, including those provided or managed by another agency,
contractor, or other source. In addition, FISMA provides that the
Secretary of HHS is responsible for, among other things, (1) providing
information security protections commensurate with the risk and
magnitude of the harm resulting from unauthorized access, use,
disclosure, disruption, modification, or destruction of the agency's
information systems and information; (2) ensuring that senior agency
officials provide information security for the information and
information systems that support the operations and assets under their
control; and (3) delegating to the agency CIO the authority to ensure
compliance with the requirements imposed on the agency under the act.
HHS's CIO is responsible for developing, promoting, and coordinating
the departmentwide information security program; developing,
promulgating, and enforcing department information resource management
policies, standards, and guidelines; and appointing the HHS chief
information security officer. Each operating division, including CMS,
is responsible for complying with the requirements of FISMA and
departmentwide security-related policies, procedures, and standards;
reporting on the effectiveness of its information security program; and
ensuring that information systems operated by or on its behalf by
contractors provide adequate risk-based security safeguards.
Weak Controls and Incomplete Implementation Compromise Effectiveness of
HHS's Information Security Program:
HHS and CMS in particular have significant weaknesses in electronic
access controls and other information system controls designed to
protect the confidentiality, integrity, and availability of information
and information systems. A key reason for these weaknesses is that the
department has not yet fully implemented a departmentwide information
security program. As a result, HHS's medical and financial information
systems are vulnerable to unauthorized access, use, modification, and
destruction that could disrupt the department's operations.
Electronic Access Controls Are Inadequate:
A basic management objective for any organization is to protect the
resources that support its critical operations from unauthorized
access. Organizations accomplish this objective by designing and
implementing electronic controls that are intended to prevent, limit,
and detect unauthorized access to computing resources, programs, and
information. Inadequate electronic access controls diminish the
reliability of computerized information and increase the risk of
unauthorized disclosure, modification, and destruction of sensitive
information and disruption of service. Electronic access controls
include those related to network management, user accounts and
passwords, user rights and file permissions, and auditing and
monitoring of security-related events. Our analysis of reports issued
by the OIG and independent auditors disclosed that HHS did not
consistently implement effective electronic access controls in each of
these areas.
Network Management:
Networks are collections of interconnected computer systems and devices
that allow individuals to share resources such as computer programs and
information. Because sensitive programs and information are stored on
or transmitted along networks, effectively securing networks is
essential to protecting computing resources and data from unauthorized
access, manipulation, and use. Organizations secure their networks, in
part, by installing and configuring network devices that permit
authorized network service requests, deny unauthorized requests, and
limit the services that are available on the network. Devices used to
secure networks include (1) firewalls that prevent unauthorized access
to the network, (2) routers that filter and forward data along the
network, (3) switches that forward information among segments of a
network, and (4) servers that host applications and data. Network
services consist of protocols for transmitting data between network
devices.
Insecurely configured network services and devices, including those
without current software patches, can make a system vulnerable to
internal or external threats, such as denial-of-service
attacks.[Footnote 2] Because networks often include both external and
internal access points for electronic information assets, failure to
adequately secure these access points increases the risk of
unauthorized disclosure and modification of sensitive information or
disruption of service. HHS policy requires that all incoming and
outgoing connections from departmental systems and networks to the
Internet, intranets,[Footnote 3] and extranets[Footnote 4] be made
through a firewall and that effective technical controls be implemented
to protect computing resources connected to the network.
Our analysis found that HHS did not consistently configure network
services and devices securely to prevent unauthorized access to and
ensure the integrity of computer systems operating on its networks. The
reports we reviewed identified weaknesses in the way that HHS operating
divisions and contractors restricted network access, managed antivirus
software, configured network devices, and protected information
traversing the HHS networks. For example,
* System administrative access was not always adequately restricted,
and unnecessary services were available on several network devices,
increasing the risk that unauthorized individuals could gain access to
the operating system.
* Antivirus software was not always installed or up-to-date on the
operating divisions' and contractors' workstations, increasing the risk
that viruses could infect HHS systems and potentially disable or
disrupt system operations.
* Key network devices were not securely configured to prevent
unauthorized individuals from gaining access to sensitive system
configuration files and router access control lists. These weaknesses
could allow an external attacker to circumvent network controls and
thereby gain unauthorized access to the internal network.
* HHS did not encrypt certain information traversing its networks.
Instead, it used clear text protocols that make network traffic
susceptible to eavesdropping.
* HHS's operating divisions and contractors did not consistently patch
their computer systems and network devices in a timely manner. For
example, the OIG reported that approximately 25 percent (287 of 1,129)
of the systems tested at one operating division did not have up-to-date
patches installed on them. Thirty of the machines tested were missing
nine or more software patches that had been rated as critical by the
vendor. At another operating division, over 90 high-risk software patch
management vulnerabilities were outstanding from June 1999 through
April 2005. Failure to keep system patches up-to-date could lead to
denial-of-service attacks or to individuals gaining unauthorized access
to network resources. According to the HHS chief information security
officer, a patch management subcommittee was formed to address this
issue and has formulated and published an approach to the department's
patch management problems.
User Accounts and Passwords:
A computer system must be able to identify and differentiate among
users so that activities on the system can be linked to specific
individuals. When an organization assigns unique user accounts to
specific users, the system is able to distinguish one user from
another--a process called identification. The system must also
establish the validity of a user's claimed identity by requesting some
kind of information, such as a password, that is known only by the
user--a process known as authentication. The combination of
identification and authentication--such as user account and password
combinations--provides the basis for establishing individual
accountability and for controlling access to the system. Accordingly,
agencies (1) establish password parameters, such as number of
characters, type of characters, and the frequency with which users
should change their passwords, in order to strengthen the effectiveness
of passwords for authenticating the identity of users; (2) require
encryption for passwords to prevent their disclosure to unauthorized
individuals; and (3) implement procedures to control the use of user
accounts. HHS policy requires that all operating divisions implement
and enforce logical password controls for all departmental systems and
networks.
Our analysis of reported weaknesses showed that HHS did not adequately
control user accounts and passwords to ensure that only authorized
individuals were granted access to its systems. For example, the
department and its contractors did not always implement strong
passwords--using vendor-default or easy to guess passwords.
Additionally,
* One CMS Medicare contractor set passwords to never expire for 28
service accounts with powerful administrative privileges. As a result,
an unauthorized individual could use a compromised user identification
and password for an indefinite period to gain unauthorized access to
server resources.
* Firewall administrators for another CMS Medicare contractor used a
shared administrative account. As a result, the actions taken by these
individuals cannot be traced back to the responsible individual.
* The minimum password length on one operating division's local area
network was set to zero. Consequently, users could create short
passwords. Short passwords tend to be easier to guess or crack than
longer passwords. In addition, passwords on this local area network
were not required to be changed at initial logon.
Such weaknesses increase the risk that passwords may be disclosed to
unauthorized users and used to gain access to the system. They also
diminish the effectiveness of these controls for attributing system
activity to individuals. As a result, HHS may not be able to hold these
users individually accountable for system activity.
User Rights and File Permissions:
The concept of "least privilege" is a basic underlying principle for
securing computer systems and data. It means that users are granted
only those access privileges needed to perform their official duties.
To restrict legitimate users' access to only those programs and files
that they need to do their work, organizations establish access rights
and permissions. "User rights" are allowable actions that can be
assigned to users or to groups of users. File and directory permissions
are rules that are associated with a particular file or directory and
regulate which users can access them and the extent of that access. To
avoid unintentionally giving users unnecessary access to sensitive
files and directories, an organization must give careful consideration
to its assignment of rights and permissions. HHS policy requires that
access privileges be granted to users at the minimum level required to
perform their job-related duties.
Our analysis of OIG reports showed that HHS granted access rights and
permissions that gave some users more access to departmental
information and medical systems than they needed to perform their jobs.
For example, the following vulnerabilities were identified:
* All users could access world-readable start up scripts and files on
several Medicare contractor systems. A malicious user could use this
information to increase their system privileges.
* Members of the "Everyone" group were granted access to sensitive
Windows directories, files, and registry settings, even though some did
not have a legitimate business need for this access.
* Twenty-two groups or users without a legitimate need could access and
update mainframe production data at one CMS Medicare contractor
facility.
* Six of 15 employees reviewed at one operating division retained
access privileges to the local area network after their separation from
the department.
Inappropriate access to sensitive files and directories provides
opportunities for individuals to circumvent security controls to
deliberately or inadvertently read, modify, or delete critical or
sensitive information and computer programs.
Auditing and Monitoring of Security-Related Events:
To establish individual accountability, monitor compliance with
security policies, and investigate security violations, it is crucial
to determine what, when, and by whom specific actions have been taken
on a system. Organizations accomplish this by implementing system or
security software that provides an audit trail that they can use to
determine the source of a transaction or attempted transaction and to
monitor users' activities. The way in which organizations configure
system or security software determines the nature and extent of
information that can be provided by the audit trail. To be effective,
organizations should configure their software to collect and maintain
audit trails that are sufficient to track security-related events. HHS
policy requires that audit logging be enabled for all departmental
systems and networks so that security-related events--the manipulation,
modification, or deletion of data--can be monitored and analyzed for
unauthorized activity.
HHS has not consistently audited and monitored security-related system
activity on their systems. For example, the OIG reported that logging
on some UNIX systems was either disabled or configured to overwrite
these events, firewall and router logs were not routinely monitored,
and procedures for classifying and investigating security-related
events had not been documented at several HHS operating divisions and
CMS Medicare contractors. As a result, if a system was modified or
disrupted, the department's ability to trace or recreate events could
be diminished. In addition, these weaknesses could allow unauthorized
access to go undetected.
In response to weaknesses identified in electronic access controls, the
HHS chief information security officer indicated that significant
progress has been made in correcting these weaknesses and that
preliminary results of fiscal year 2005 audits, by independent
auditors, show a reduction in the number of weaknesses. In addition,
the independent auditor of HHS's financial statements for fiscal year
2005 reported that HHS had made significant progress in strengthening
system controls, although it continued to identify general controls
issues that represent significant deficiencies in the design and
operation of electronic access controls.
Other Information System Controls Are Ineffective:
In addition to electronic access controls, other important controls
should be in place to ensure the confidentiality, integrity, and
availability of an organization's information and systems. These
controls include policies, procedures, and techniques to physically
secure computer resources, conduct appropriate background
investigations, provide sufficient segregation of duties, and prevent
unauthorized changes to application software. Our analysis of reports
issued by the OIG and independent auditors disclosed significant
weaknesses in each of these areas. These weaknesses increase the risk
that unauthorized individuals can gain access to HHS information
systems and inadvertently or deliberately disclose, modify, or destroy
the sensitive medical and financial data that the department relies on
to deliver its vital services.
Physical Security:
Physical security controls are important for protecting computer
facilities and resources from espionage, sabotage, damage, and theft.
These controls restrict physical access to computer resources, usually
by limiting access to the buildings and rooms in which the resources
are housed and by periodically reviewing the access granted, in order
to ensure that access continues to be appropriate. HHS policy requires
that physical access to rooms, work areas and spaces, and facilities
containing departmental systems, networks, and data be limited to
authorized personnel; controls be in place for deterring, detecting,
monitoring, restricting, and regulating access to sensitive areas at
all times; and controls be commensurate with the level of risk and
sufficient to safeguard these resources against possible loss, theft,
destruction, accidental damage, hazardous conditions, fire, malicious
actions, and natural disasters.
Our analysis showed that HHS did not effectively implement physical
controls as the following examples illustrate:
* One CMS Medicare contractor used a privately owned vehicle and an
unlocked container to transport approximately 25,000 Medicare check
payments over a 1-year period.
* Four hundred forty individuals were granted unrestricted access to an
entire data center, including a sensitive area within the data center-
-although their jobs functions did not require them to have such
access.
* Surveillance cameras used for monitoring a facility were not
functioning, leading to blind spots in the data center's perimeter
security.
* Three individuals with access to an operating division's data center
did not have management approval for such access.
These weaknesses in physical security increase the risk that
unauthorized individuals could gain access to sensitive computing
resources and data and inadvertently or deliberately misuse or destroy
them.
Background Investigations:
According to Office of Management and Budget (OMB) Circular A-
130,[Footnote 5] it has long been recognized that the greatest harm to
computing resources has been done by authorized individuals engaged in
improper activities--whether intentionally or accidentally. Personnel
security controls (such as screening individuals in positions of trust)
are particularly important where the risk and magnitude of potential
harm is high. The National Institute of Standards and Technology (NIST)
guidelines suggest that agencies determine the sensitivity of
particular positions, based on such factors as the type and degree of
harm that the individual could cause by misusing the computer system
and on more traditional factors, such as access to classified
information and fiduciary responsibilities. Background investigations
help an organization to determine whether a particular individual is
suitable for a given position by attempting to ascertain the person's
trustworthiness and appropriateness for the position. The exact type of
screening that takes place depends on the sensitivity of the position
and any applicable regulations by which the agency is bound.
HHS policy requires that all information security employees and
contractor personnel be designated with position-sensitivity levels
that are commensurate with the responsibilities and risks associated
with their position. In addition, it requires suitability background
investigations to be completed and favorably adjudicated for all
personnel assigned to these positions prior to allowing them access to
sensitive HHS systems and networks.
Our analysis of prior reports showed that background investigations
were not always performed. For example, 13 CMS Medicare contractors had
weaknesses in their background investigation policies and procedures.
Six of the contractors reviewed were not adhering to established
policies, while the remaining seven were not performing background
investigations in a consistent manner. In addition, one operating
division was unable to provide the background investigation status for
any of the 49 contractor personnel working at its data center or for
any of the 28 contractor personnel supporting one of its general
support systems. Additionally, background investigations at three
operating divisions were considered inadequate because they were not
performed at the appropriate sensitivity level. Granting people access
to sensitive data without appropriate background investigations
increases the risk that unsuitable individuals could gain access to
sensitive information, use it inappropriately, or destroy it.
Segregation of Duties:
Segregation of duties refers to the policies, procedures, and
organizational structure that help ensure that no single individual can
independently control all key aspects of a process or computer-related
operation and thereby gain unauthorized access to assets or records.
Often segregation of duties is achieved by dividing responsibilities
among two or more individuals or organizational groups. This diminishes
the likelihood that errors and wrongful acts will go undetected,
because the activities of one individual or group will serve as a check
on the activities of the other. Inadequate segregation of duties
increases the risk that erroneous or fraudulent transactions could be
processed, improper program changes be implemented, and computer
resources could be damaged or destroyed. HHS policy requires operating
divisions to ensure that responsibilities with a security impact be
shared among multiple staff by enforcing the concept of separation of
duties, which requires that individuals do not have control of the
entirety of a critical process.
Our analysis of OIG reports showed that HHS did not always sufficiently
segregate computer functions. For example, some software developers had
full access to both development and production software libraries. To
illustrate, UNIX developers at one facility used a shared user account
to promote development changes into the production environment. In
another instance, two individuals with full access to development
source code also had update capabilities to production libraries.
Consequently, increased risk exists that these individuals could
introduce software errors into production or perform unauthorized
system activities without being detected.
Application Change Controls:
It is important to ensure that only authorized and fully tested
application programs are placed into operation. To ensure that changes
to application programs are necessary, work as intended, and do not
result in the loss of data or program integrity, such changes should be
documented, authorized, tested, and independently reviewed. In
addition, test procedures should be established to ensure that only
authorized changes are made to the application's program code. HHS
policy requires that operating divisions establish, implement, and
enforce change management and configuration management controls on all
departmental systems and networks that process, store, or communicate
sensitive information.
However, our analysis showed that HHS did not always document or
control changes to application programs as the following examples
demonstrate:
* Authorization forms did not exist for each of the 21 application
control changes reviewed at one Medicare contractor facility. In
addition, change control procedures were out-of-date and did not
reflect current process and practice.
* Testing documentation at one operating division was not maintained
for 4 of 15 change requests reviewed.
Without adequately documented or controlled application change control
procedures, changes may be implemented that are not authorized, tested,
or approved. Further, the lack of adequate controls place HHS at
greater risk that software supporting its missions will not produce
reliable data or effectively meet its business needs.
In response to weaknesses identified in other information security
controls, the HHS chief information security officer indicated that
significant progress has been made in correcting these weaknesses and
that preliminary results of fiscal year 2005 audits, by independent
auditors, show a reduction in the number of weaknesses. In addition,
the independent auditor of HHS's financial statements for fiscal year
2005 reported that HHS had made significant progress in strengthening
system controls, although it continued to identify general controls
issues that represent significant deficiencies in the design and
operation of key controls such as physical access, system software, and
application development and program change controls.
Information Security Program Is Not Yet Fully Implemented:
A key reason for the information security weaknesses identified at HHS
was that the department had not yet fully implemented its information
security program. A departmentwide security program provides a
framework and continuing cycle of activity for managing risk,
developing security policies, assigning responsibilities, and
monitoring the adequacy of the entity's computer-related controls.
Without such a program, security controls may be inadequate;
responsibilities may be unclear, misunderstood, and improperly
implemented; and controls may be inconsistently applied. Such
conditions may lead to insufficient protection of sensitive or critical
resources and disproportionately high expenditures for controls over
low-risk resources.
FISMA[Footnote 6] requires each agency to develop, document, and
implement an information security program that includes the following
key elements:
* periodic assessments of the risk and the magnitude of harm that could
result from the unauthorized access, use, disclosure, disruption,
modification, or destruction of information and information systems;
* policies and procedures that (1) are risk-based, (2) cost-effectively
reduce risks, (3) ensure that information security is addressed
throughout the life cycle of each system, and (4) ensure compliance
with applicable requirements;
* plans for providing adequate information security for networks,
facilities, and systems;
* security awareness training to inform personnel--including
contractors and other users of information systems--of information
security risks and of their responsibilities in complying with agency
policies and procedures;
* at least annual testing and evaluation of the effectiveness of
information security policies, procedures, and practices relating to
management, operational, and technical controls of every information
system identified in the agency's inventory;
* a process for planning, implementing, evaluating, and documenting
remedial action to address any deficiencies in its information security
policies, procedures, or practices;
* procedures for detecting, reporting, and responding to security
incidents; and:
* plans and procedures to ensure continuity of operations for
information systems that support the operations and assets of the
agency.
FISMA also requires each agency to (1) annually report to OMB, selected
congressional committees, and the Comptroller General on the adequacy
of information security policies, procedures, and practices and
compliance with requirements, and (2) its OIG or independent external
auditor perform an independent annual evaluation of the agency's
information security program and practices.
HHS has begun to implement the foundation for an effective information
security program through its Secure One initiative by developing and
documenting policies and procedures that designate implementation
responsibilities. For example, HHS information security program
provides baseline security policies and standards for the department.
Operating divisions are required to comply with departmental standards
or develop specific standards that exceed them. In addition, HHS uses
an automated security management tool to collect, analyze, and report
FISMA data. Similarly, CMS has made progress in developing and
documenting its information security policies and procedures.
Although HHS has made progress in developing and documenting a
departmentwide information security program, it has not fully
implemented the following key elements: risk assessments, policies and
procedures, system security planning, security and awareness training,
periodic testing and evaluation of controls, remedial action plans,
incident handling, and continuity of operations. These weaknesses limit
HHS's ability to protect the confidentiality, integrity, and
availability of its information and information systems.
Risk Assessments:
Identifying and assessing information security risks are essential to
determining what controls are required. By increasing awareness of
risks, these assessments can generate support for the policies and
controls that are adopted. OMB Circular A-130, appendix III, prescribes
that risk be reassessed when significant changes are made to
computerized systems--or at least every 3 years, as does HHS policy.
Consistent with NIST guidance, HHS requires that risk assessments
characterize the system, identify information sensitivity and threats,
determine the risk level of those threats and corresponding
vulnerabilities, and analyze the potential business impact of exploited
vulnerabilities.
HHS's performance in conducting risk assessments has varied across the
department. Our review of 10 CMS risk assessments found that they
generally complied with applicable federal and departmental guidance.
By contrast, two of the three Office of the Secretary risk assessments
reviewed did not fully address key elements. For example, the risk
assessments did not identify threat sources, threat actions, or risk
levels, as described in NIST SP 800-30.[Footnote 7] Nor did they detail
whether or not a business impact analysis had been completed. HHS's OIG
also identified weaknesses in the department's risk assessments. In its
2005 FISMA evaluation, the OIG reported that risk assessments had not
been performed on two major systems--one at the Administration for
Children and Families, and one at the Administration on Aging.
In response to these weaknesses identified in the department's
information security program, the HHS chief information security
officer stated that risk assessments are currently being tracked using
the department's FISMA data management tool, which compiles information
security management data for monitoring and review. All operating
divisions are required to enter their FISMA data into this automated
tool so that it can be reviewed and validated by the Secure One program
staff. The combination of this tool and feedback from the Secure One
program is designed to improve the completion rate and quality of risk
assessments. The lack of or incomplete risk assessments could result in
HHS's systems having inadequate or inappropriate security controls that
might not address those systems' true risk, and result in costly
efforts to subsequently implement effective controls.
Policies and Procedures:
Another key task in implementing an effective information security
program is to develop and document risk-based policies, procedures, and
technical standards that govern security over an agency's computing
environment. If properly implemented, policies and procedures should
help to cost-effectively reduce the risk of unauthorized access,
modification, and destruction of information and systems. Technical
security standards should provide consistent implementing guidance for
each computing environment. Because security policies are the primary
mechanism by which management communicates its views and requirements,
it is important to develop and document them. FISMA requires each
agency to develop minimally acceptable system configuration
requirements and ensure compliance with them. Systems with secure
configurations have less vulnerabilities and are better able to thwart
network attacks.
HHS has not developed departmentwide policies regarding minimally
acceptable configuration requirements. According to HHS's chief
information security officer, HHS has neither developed nor documented
such configuration requirements for its operating systems. The OIG
reported in its fiscal year 2005 FISMA evaluation that these
requirements were being maintained at the operating division level. In
addition, the OIG found that three of the six operating divisions had
not implemented minimum acceptable configuration requirements for their
operating systems. Without departmentwide policies for developing
minimally acceptable configuration requirements for its information
systems, HHS may not be able to cost-effectively reduce information
security risks to an acceptable level.
Security Plans:
The objective of system security planning is to improve the protection
of information technology resources. A system security plan is to
provide a complete and up-to-date overview of the system's security
requirements and describe the controls that are in place or planned to
meet those requirements. FISMA requires that agency information
security programs include subordinate plans for providing adequate
information security for networks, facilities, and systems or groups of
information systems, as appropriate. OMB Circular A-130 specifies that
agencies develop and implement system security plans for major
applications and for general support systems and that these plans
address policies and procedures for providing management, operational,
and technical controls. According to NIST, security plans should
include existing or planned security controls, the individual
responsible for the security of the system, a description of the system
and its interconnected environment, and rules of behavior. HHS policy
requires all of its operating divisions to develop and document system
security plans for all departmental systems and networks in accordance
with NIST guidance[Footnote 8] and to update such plans at least once
every 3 years or when significant changes occur to the system.
Our review found that HHS and CMS system security plans generally
complied with applicable federal and departmental guidance. We examined
seven plans and determined that they were up-to-date, addressed
existing controls, identified responsible security personnel, described
the system and its interconnections, and included rules of behavior.
However, our analysis of OIG reports found that security plans had not
been completed for two major systems--one at the Administration for
Children and Families, and one at the Administration on Aging. Until
its operating divisions complete security plans for all systems, HHS
cannot ensure that appropriate controls are in place to protect its
systems and critical information.
Awareness and Security Training:
Computer intrusions and security breakdowns often occur because
computer users fail to take appropriate security measures. For this
reason, it is vital that employees and contractors who use computer
resources in their day-to-day operations be made aware of the
importance and sensitivity of the information they handle, as well as
the business and legal reasons for maintaining its confidentiality,
integrity, and availability. FISMA requires that an information
security program promote awareness and provide training for users
(federal employees and contractors) so that they can understand the
system security risks and their role in implementing related policies
and controls to mitigate those risks. HHS policy requires the
establishment of an annual security awareness training program for all
employees and contractors. In the event that a security breach occurs,
amply trained security personnel are vital to a timely and appropriate
response. Depending on an employee's specific security role,
specialized training could include training in incident detection
response, physical security, or firewall configuration. FISMA requires
agency chief information officers to ensure that personnel with
significant information security responsibilities receive specialized
security training. HHS policy also require specialized security
education and awareness training for all individuals with significant
security responsibilities.
Although the department has made progress in security awareness
training, the department had not provided adequate security training to
employees with significant security related responsibilities. In fiscal
year 2005, HHS reported that 98 percent of its employees, including
contractors, had received security awareness training. However, it
reported that 32 percent of its employees with significant security
related responsibilities had not received specialized security
training. Conversely, CMS reported that 100 percent of its employees
with significant security related responsibilities had received such
training. Without sufficiently trained security personnel, security
lapses are more likely to occur and could contribute to information
security weaknesses at HHS.
Tests and Evaluations:
Another key element of an information security program is testing and
evaluating system controls to ensure that they are appropriate,
effective, and comply with policies. An effective program of ongoing
tests and evaluations can be used to identify and correct information
security weaknesses. This type of oversight demonstrates management's
commitment to the security program, reminds employees of their roles
and responsibilities, and identifies and mitigates areas of
noncompliance and ineffectiveness. Although control tests may encourage
compliance with security policies, the full benefits of testing are not
achieved unless the test results are analyzed by security specialists
and business managers and used as a means of identifying new problem
areas, reassessing the appropriateness of existing controls, and
identifying the need for new controls.
FISMA requires that agencies test and evaluate the information security
controls of their systems, and that the frequency of such tests be
based on risk, but occur no less than annually. HHS requires systems
and networks that contain sensitive or mission critical information to
undergo vulnerability scanning and/or penetration testing to identify
security threats at least annually or when significant changes are made
to the system or network. HHS also requires that a self-assessment be
conducted of all departmental systems and networks at least annually in
accordance with NIST SP 800-26.[Footnote 9] Consistent with FISMA
provisions and HHS guidance, CMS policy also requires periodic testing
and evaluation of its information systems' security controls.
Although HHS has initiatives under way to improve its testing and
evaluation of controls, it has not fully implemented an ongoing program
of tests and evaluations. Our analysis of the OIG's fiscal year 2005
FISMA report found that several operating divisions had not tested and
evaluated security controls for all their systems. For example, three
systems at three different operating divisions had not undergone system
testing and evaluation. At another operating division, system tests and
evaluations for three of its six major applications had not been
completed.
Without comprehensive tests and evaluations of security controls, HHS
cannot be assured that employees and contractors are complying with
established policies or those policies and controls are appropriate and
working as intended.
Remedial Actions:
Remedial action plans, also known as plans of actions and milestones,
can assist agencies in identifying, assessing, prioritizing, and
monitoring progress in correcting security weaknesses in information
systems. According to OMB Circular A-123, agencies should take timely
and effective action to correct deficiencies that they have identified
through a variety of information sources. To accomplish this, remedial
action plans should be developed for each deficiency, and progress
should be tracked for each. In compliance with OMB policy, HHS requires
the capture of all information security program and system control
weaknesses that require mitigation in remedial action plans. In
addition, HHS has provided information security managers and system
owners guidance for developing, maintaining, and reporting their
remedial action plans.
Our review of OIG reports on selected operating divisions identified
shortcomings in the HHS remedial action process. For example, the
remedial action plans for three operating divisions did not include
weaknesses previously identified in the operating divisions' risk
assessments, OIG audits, or other independent audits. Moreover, the
remedial action plans for four operating divisions contained overdue
corrective action items and lacked key corrective action information,
such as the risk level assigned to weaknesses, resources needed to
remedy the weaknesses, and adequate support to demonstrate closed
weaknesses. Our review of CMS remedial action plans yielded similar
results. Specifically, we found 20 percent of the corrective actions
did not identify the resources needed to correct those weaknesses.
Without a sound remediation process, HHS cannot be assured that
weaknesses in its information security program will be efficiently and
effectively corrected.
Incident Handling:
Even strong controls may not block all intrusions and misuse, but
organizations can reduce the risks associated with such events if they
take steps to promptly detect and respond to them before significant
damage is done. In addition, analyzing security incidents allows
organizations to gain a better understanding of the threats to their
information and the costs of their security-related problems. Such
analyses can pinpoint vulnerabilities that need to be eliminated so
that they will not be exploited again. Incident reports can be used to
provide valuable input for risk assessments, help in prioritizing
security improvement efforts, and illustrate risks and related trends
for senior management. FISMA requires that agency information security
programs include procedures for detecting and reporting security
incidents. To ensure effective handling of incidents, HHS policy
requires the establishment and maintenance of an incident response
capability that includes preparation, identification, containment,
eradication, recovery, and follow-up capabilities.
HHS operating divisions did not always employ adequate incident
detection capabilities. Our analysis of OIG reports found, for example,
that 13 CMS Medicare contractors had weaknesses in their intrusion
detection policies and procedures. Five of the contractors did not have
intrusion detection systems in place, while six were cited for either
not reporting incidents in accordance with FISMA guidance or not
reporting incidents to CMS. The remaining two contractors exhibited
weaknesses in their incident monitoring process and procedures.
Finally, one operating division used router and firewall logs for
troubleshooting instead of for intrusion detection.
The wide disparity in the reporting of security incidents[Footnote 10]
and events[Footnote 11] at HHS and its operating divisions also raises
concern. For example, the Food and Drug Administration reported over 16
million events while the Centers for Medicare & Medicaid Services and
the Centers for Disease Control and Prevention combined reported less
than 1,600, as indicated in table 1.
Table 1: Reported Incidents among HHS Operating Divisions:
September 2005 Event Summary:
Operating division: Food and Drug Administration;
Number of events: 16,515,911;
Number of incidents: 1.
Operating division: National Institutes of Health;
Number of events: 1,142,424;
Number of incidents: 0.
Operating division: Health Resources and Services Administration;
Number of events: 348,346;
Number of incidents: 0.
Operating division: Office of the Secretary;
Number of events: 162,197;
Number of incidents: 1.
Operating division: Indian Health Service;
Number of events: 79,911;
Number of incidents: 2.
Operating division: Program Support Center;
Number of events: 9,125;
Number of incidents: 0.
Operating division: Office of the Inspector General;
Number of events: 8,839;
Number of incidents: 0.
Operating division: Agency for Healthcare Research and Quality;
Number of events: 1,682;
Number of incidents: 0.
Operating division: Administration for Children and Families;
Number of events: 1,560;
Number of incidents: 0.
Operating division: Centers for Disease Control and Prevention;
Number of events: 1,074;
Number of incidents: 0.
Operating division: Centers for Medicare & Medicaid Services;
Number of events: 429;
Number of incidents: 1.
Operating division: Administration on Aging;
Number of events: 244;
Number of incidents: 0.
Operating division: Substance Abuse and Mental Health Services
Administration;
Number of events: 0;
Number of incidents: 0.
Source: HHS.
Notes: Incidents were reported to the U.S. Computer Emergency Response
Team. No data were available for the Agency for Toxic Substances and
Disease Registry.
[End of table]
HHS operating divisions collectively reported over 18 million events
during September 2005 but less than 10 incidents. We did not attempt to
assess the accuracy of the reported events and incidents. However, the
disparity in the number of reported events among the operating
divisions of relatively similar size raises concerns. This disparity
may be an indication of inconsistency among criteria settings and
configuration requirements for the respective intrusion detection
systems. The reporting disparities may also be influenced by the type
and location of the intrusion detection systems. For example, an
intrusion detection system located behind a firewall detects fewer
events than one located on the perimeter in front of a firewall because
of the firewall's ability to block certain network traffic. Intrusion
detection systems' visibility to the Internet also increases the
potential exposure to security events. Without consistent detection and
reporting, HHS cannot be assured that it is handling incidents in an
effective manner.
Continuity of Operations:
Continuity of operations controls can enable systems to be recovered
quickly and effectively following a service disruption or disaster.
Such controls include plans and procedures designed to protect
information resources and minimize the risk of unplanned interruptions,
along with a plan to recover critical operations should interruptions
occur. These controls should be designed to ensure that when unexpected
events occur, key operations continue without interruption or are
promptly resumed, and critical and sensitive data are protected. They
should also be tested annually or as significant changes are made. It
is important that these plans be clearly documented, communicated to
potentially affected staff, and updated to reflect current operations.
Consistent with federal guidance, HHS policy requires operating
divisions to identify, prioritize, and document disaster recovery
planning requirements for all critical departmental systems, networks,
data, and facilities. CMS's information security policy complies with
the departmentwide policy. CMS's Information Security Handbook provides
additional guidance as to what key elements should be included in
contingency plans. These elements are further detailed in its guidance
to CMS contractors.
HHS has various efforts underway to address continuity of operations.
In its fiscal year 2005 FISMA report, the OIG noted the elimination of
the department's significant deficiency relating to contingency
planning and disaster recovery. However, shortcomings in continuity of
operations still exist. In its FISMA report to OMB for fiscal year
2005, HHS reported that 19.2 percent of its FISMA inventoried systems
(34 out of 177) did not have tested contingency plans. Furthermore, the
OIG also identified deficiencies in continuity of operations plans
developed at HHS's operating divisions. For example,
* contingency plans for four major applications at one operating
division were not application specific, but were actually the same plan
originally developed for the server recovery;
* contingency plans did not exist for the local area networks of four
operating divisions;
* another operating division did not prioritize the recovery of its
systems in the divisionwide contingency plan; and:
* inadequate documentation existed to determine whether testing had
been performed for one of another division's contingency plans.
As a result of these weaknesses, the department has limited assurance
that operating divisions will be able to protect critical and sensitive
information and information systems and resume operations promptly when
unexpected events or unplanned interruptions occur. If continuity of
operations controls are inadequate, even a relatively minor
interruption could result in significant adverse impact on HHS
operating divisions' ability to recover and resume operations.
Conclusions:
Given the size and significance of HHS's information technology
investments, and the sensitivity of the medical, personal, and
financial data it maintains through these investments, it is imperative
that the department develops strong information security controls and
implements a comprehensive information security program. While HHS has
made progress toward developing and documenting a departmentwide
information security program, significant weaknesses in information
security controls could lead to the unauthorized disclosure,
modification, or destruction of the sensitive data that HHS relies on
to accomplish its vital mission. A key reason for these weaknesses is
that HHS has not yet fully implemented a departmentwide information
security program that can establish and maintain effective controls.
Full implementation of such a program would provide for periodically
assessing risks, establishing appropriate policies and procedures,
developing and implementing security plans, promoting security
awareness training, testing and evaluating the effectiveness of
controls, implementing corrective actions, responding to incidents, and
ensuring continuity of operations. Implementing such a program across
all operating divisions requires effective management oversight and
monitoring, especially at a department as diverse as HHS. Until HHS
strengthens information security controls and fully implements its
information security program, it will have limited assurance that its
operations and assets are adequately protected.
Recommendations for Executive Action:
To help HHS fully implement its departmentwide information security
program, we recommend that the Secretary of HHS direct the Chief
Information Officer to develop and implement policies and procedures to
ensure the establishment of minimum acceptable configuration
requirements. In addition, we recommend that the Secretary direct the
Chief Information Officer to take the following seven steps to ensure
that operating divisions:
* develop comprehensive risk assessments that address key elements;
* complete system security plans for all systems;
* provide specialized training to all individuals with significant
security responsibilities;
* conduct tests and evaluations of the effectiveness of controls on
operational systems, and document results;
* review remedial action plans to ensure that they address all
previously identified weaknesses and key corrective action information;
* implement intrusion detection systems and configure them to use
consistent criteria for the detection and reporting of security
incidents and events; and:
* develop and test continuity of operations plans for all of their
systems.
Agency Comments and Our Evaluation:
The Department of Health and Human Services's Inspector General
transmitted the department's written comments on a draft of this report
(reprinted in app. II). In these comments, HHS supported our emphasis
on improvements needed in key information security program elements,
but stated that our report did not appropriately reflect the progress
that the department has made in addressing information security.
Specifically, HHS expressed concerns that our evaluation approach did
not provide an accurate or complete appraisal of the department's
information security program, in that the report does not mention the
department's defense-in-depth strategy or accomplishment of two major
goals--the department's campaign to mitigate its deficiency pertaining
to contingency planning and reduce its number of reportable conditions
by 25 percent. According to HHS, it employs a defense-in-depth strategy
to ensure threats are effectively addressed and mitigated. We
acknowledge HHS's statement on its defense-in-depth strategy, but note
that the significant control weaknesses identified in this report and
by independent auditors indicate that this strategy is not fully
working as intended. With regard to the two major goals, we have
revised the report to reflect the elimination of the contingency
planning deficiency. Regarding the department's reduction in:
the number of reportable conditions, in its report on internal
controls,[Footnote 12] the OIG's independent auditor reported progress
made in strengthening security controls; however, it still reported
weaknesses in several information security areas, including the
entitywide security program, access controls, application development
and program change controls, system software, and service continuity.
HHS also noted that our report did not mention recent improvements or
progress made in information security until a brief statement in the
conclusion of the report, and that the report was predicated on
findings originally documented by the HHS OIG in fiscal year 2005.
However, throughout the report we acknowledge HHS's improvements and
progress made in correcting information security weaknesses and have
added additional statements based on these comments. In addition, as
noted in our scope and methodology, our evaluation included the most
recent reports issued at the time of our review.
In its comments, HHS also expressed concern over our use of the word
"significant" to describe the reported weaknesses. In their most recent
report on internal controls, the OIG's independent auditor reported
information security as a "reportable condition"[Footnote 13] at the
department. The auditors concluded that "the cumulative effect of these
weaknesses represents significant deficiencies in the overall design
and operation of internal controls." Based on the findings in our
report, the definition of "reportable condition," and the comments of
the independent auditors, we believe the use of the word "significant"
is appropriate to describe these weaknesses.
HHS also took exception to our conclusion that it had not fully
implemented a departmentwide information security program, and stated
that our findings instead indicate that the full integration or
maturity of the program has not been achieved. FISMA requires that
agencies develop, document, and implement an information security
program. As stated in our report, we acknowledged that HHS has made
progress in developing and documenting its program. However, elements
of the program have not been fully or consistently implemented. For
example, three systems at three different operating divisions had not
undergone system testing and evaluation. As a result, we believe that
the use of the phrase "not fully implemented" is appropriate for
describing HHS's shortcomings in its information security program.
Additionally, the department stated that our assessment of its security
program was based on a small percentage of HHS systems. However, as
noted in our scope and methodology, we selected applications and
general support systems because they support HHS's departmentwide
financial reporting and communications, or Medicare payment and
communication functions at CMS and its contractors--operations that are
critical to the department. These included the Medicare Claims
Processing Systems that processed over one billion claims and $294
billion in claims payments in 2004; the CMS Communication Network that
provides connectivity between CMS and its business-related entities;
and the HHS Enterprise Services Network that provides a shared network
backbone for several HHS operating divisions.
The department also noted that our statement that HHS had not developed
departmentwide policies regarding minimally acceptable configuration
requirements was inaccurate. In its comments, HHS states that "plans
are in place" to standardize implementation in fiscal year 2006 and
that the divisional chief information security officers formed a
subcommittee to develop configuration standards. Although these are
positive efforts, we believe that such statements support our
conclusion that such policies have not yet been developed.
In addition, the department noted that we did not acknowledge progress
made relating to contingency planning. HHS stated that it had completed
and tested contingency plans for 100 percent of its high-risk FISMA
systems. However, the HHS OIG did not concur with this statement,
reporting that one of the seven high-risk systems that they evaluated
did not have tested contingency plans. As mentioned previously, the
department also stated that we did not acknowledge the elimination of
their sole existing significant deficiency relating to contingency
planning and disaster recovery. We have revised the report to reflect
the elimination of this deficiency.
Finally, the department noted additional improvements specific to CMS
that were not included in our report. The department cited the
elimination of a long standing CMS material weakness in Medicare
electronic access controls. However, this material weakness was
downgraded to a reportable condition, indicating that significant
deficiencies still exist. The department also stated that we did not
acknowledge significant progress in FISMA compliance made by its fiscal
intermediaries and carriers and that they provided these results to the
HHS OIG in early December 2005. However, these reports were not
available for release to us at that time. Additionally, the department
stated that we did not acknowledge CMS's significant achievements in
meeting it statutory responsibilities under FISMA, as reported by the
HHS OIG. We acknowledge in the report that HHS, which includes CMS, has
begun to implement the foundation for an effective information security
program. While the HHS OIG FISMA report cited some achievements made by
CMS, the HHS OIG also noted 28 exceptions in the CMS information
security program.
HHS also provided specific technical comments, which we have
incorporated, as appropriate, in the report.
As agreed with your office, unless you publicly announce the contents
of this report earlier, we plan no further distribution until 30 days
from the report date. At that time we will send copies of this report
to the Secretary of Health and Human Services. We will also make copies
available to others upon request. In addition, this report will be
available at no charge on the GAO Web site at [Hyperlink,
http://www.gao.gov].
If you have any questions regarding this report, please contact me at
(202) 512-6244 or by e-mail at [Hyperlink, wilshuseng@gao.gov]. Contact
points for our Offices of Congressional Relations and Public Affairs
may be found on the last page of this report. Key contributors to this
report are listed in appendix IV.
Sincerely yours,
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
[End of section]
Appendixes:
Appendix I: Objective, Scope, and Methodology:
The objective of our review was to assess the effectiveness of the HHS
information security program, particularly at CMS, in protecting the
confidentiality, integrity, and availability of its information and
information systems. To accomplish this objective, we evaluated the
effectiveness of HHS's information security controls, and whether HHS
had developed, documented, and implemented a departmentwide information
security program consistent with federal laws and policies.
To evaluate the effectiveness of HHS's information security controls,
we examined 74 management and audit reports pertaining to information
security practices and controls at 13 operating divisions issued by the
department, its Office of the Inspector General (OIG), and independent
auditors during 2004 and 2005. These reports identified information
security control weaknesses at HHS, the operating divisions, and
contractor-owned facilities, which we then classified according to the
general control categories specified in our Federal Information System
Controls Audit Manual (FISCAM).[Footnote 14] Further, these reports
contained specific recommendations to the department to remedy
identified information security control weaknesses.
To evaluate whether HHS had developed and documented a departmentwide
information security program consistent with federal laws and policies,
we examined related documents, such as policies and procedures,
handbooks, various types of security-related reports, and HHS's
information systems inventory. We assessed whether its program was
consistent with the requirements of FISMA, as well as applicable Office
of Management and Budget policies and National Institute of Standards
and Technology guidance related to risk assessments, risk-based
policies and procedures, information security plans, security awareness
training, testing and evaluating security controls, remedial action
plans, handling security incidents, and continuity of operations for
information systems. We also held discussions with CMS and contractor
officials responsible for information security management and with the
HHS Inspector General staff regarding any related prior, ongoing, or
planned work in these areas.
To evaluate whether HHS had implemented an information security program
consistent with federal laws and policies, we focused our review on
CMS--the operating division with the largest budget in the department-
-as well as the Office of the Secretary, an operating division with a
departmentwide perspective. We compared their documented practices and
controls to the departmentwide information security program as well as
applicable FISMA requirements, OMB policy, and NIST guidance. To
determine how well the operating divisions were implementing their own
policies and procedures, we evaluated available risk assessments,
security plans, security and awareness training, system tests and
evaluations, remedial actions, and continuity of operations for the
following major applications and general support systems:
* Automated Financial Statement System--a system to collect operating
divisions' financial statement data to generate the departmentwide year-
end and quarterly statements.
* Information Collection Review and Approval System--a web-based
database application used by HHS, the Securities and Exchange
Commission and OMB to help federal agencies electronically administer
and manage its information collection clearance responsibilities under
the Paperwork Reduction Act.
* HHS's Enterprise Services Network--the enterprise network for the
department. It is comprised of a combination of very high performance
network services provided by a public communications carrier.
* Medicare Claims Processing Systems--a CMS contractor operated group
of systems used to process Medicare claims--including inpatient
hospital care, nursing facilities, home health care, and other health
care services.
* CMS communications network--a private network that provides
connectivity between CMS and its business-related entities that provide
Medicare services.
We selected these applications and systems because they support either
(1) HHS's enterprisewide financial reporting and communication
functions, or (2) CMS's and its contractors' Medicare payments and
communication functions.
We performed our work at HHS headquarters in Washington, D.C., and the
CMS Central Office, located in Baltimore, Maryland. This review was
performed from June through December 2005 in accordance with generally
accepted government auditing standards.
[End of section]
Appendix II: Comments from the Department of Health and Human Services:
DEPARTMENT OF HEALTH & HUMAN SERVICES:
Office of Inspector General:
Washington, D.C. 20201:
FEB 14 2006:
Mr. Gregory C. Wilshusen:
Director, Information Security Issues:
U.S. Government Accountability Office:
Washington, DC 20548:
Dear Mr. Wilshusen:
Enclosed are the Department's comments on the U.S. Government
Accountability Office's (GAO) draft report entitled, "INFORMATION
SECURITY: Department of Health and Human Services Needs to Fully
Implement Its Program" (GAO-06-267). These comments represent the
tentative position of the Department and are subject to reevaluation
when the final version of this report is received.
The Department provided several technical comments directly to your
staff.
The Department appreciates the opportunity to comment on this draft
report before its publication.
Sincerely,
Signed by:
Daniel R. Levinson:
Inspector General:
Enclosure:
The Office of Inspector General (OIG) is transmitting the Department's
response to this draft report in our capacity as the Department's
designated focal point and coordinator for U.S. Government
Accountability Office reports. OIG has not conducted an independent
assessment of these comments and therefore expresses no opinion on
them.
COMMENTS OF THE DEPARTMENT OF HEALTH AND HUMAN SERVICES ON THE U.S.
GOVERNMENT ACCOUNTABILITY OFFICE'S DRAFT REPORT ENTITLED, "INFORMATION
SECURITY: DEPARTMENT (IF HEALTH AND HUMAN SERVICES NEEDS TO FULIN
IMPLEMENT ITS PROGRAM" (GAO-06-267):
The Department of Health and Human Services (HHS) appreciates the
opportunity to comment on the draft report. We appreciate the efforts
GAO undertook to examine HHS's information security program. The
comments that follow represent HHS's responses to the draft report.
The evaluation approach utilized by GAO does not provide an accurate or
complete appraisal of the HHS enterprise-wide information security
program. The GAO "Results in Brief" section and the majority of the
remaining document focus exclusively on security control weaknesses
that could place the confidentiality, integrity, and availability of
sensitive information and information systems at risk. Yet, there is no
mention of HHS's defense-in-depth strategy which is employed throughout
the enterprise and results in layering of safeguards to ensure threats
to confidentiality, integrity, and availability are effectively
addressed and mitigated, thereby reducing the probability of single
points of failure. Nor is there recognition of the ambitious campaign
HHS launched in fiscal year (FY) 2005 to accomplish two major goals -
address and mitigate its sole existing significant deficiency
pertaining to contingency planning and disaster recovery and reduce its
number of reportable conditions by 25 percent. In fact, HHS exceeded
this goal, eliminating its sole significant deficiency and reducing the
number of reportable conditions by 57 percent from FY 2004 to FY 2005.
These accomplishments were documented in the FY 2005 Office of
Inspector General (OIG) Federal Information Security Management Act
(FISMA) Executive Summary, but not recorded in this draft GAO report.
We request that these successes be noted in the GAO report.
There is no mention of HHS's information security improvements or
progress until the brief statement in the conclusion of the report. The
majority of the GAO report is predicated on the findings originally
documented by HHS OIG in FY 2005, (between January and June 2005) and
is representative of activities carried out in support of the
information security program throughout 2004 and 2005. This GAO
assessment is scheduled for publication in February 2006, but will not
reflect at least seven additional months of progress and maturity in
HHS's security posture. Please consider including the additional points
and evidence provided in this draft GAO assessment response as
confirmation of further strides made in support of HHS's information
security program implementation in the months following the FY 2005 OIG
evaluation.
The frequent use of the word "significant" to describe control
weaknesses documented throughout this GAO assessment evokes a negative
connotation that is not reflective of the progress or current state of
HHS's information security program. In light of HHS's successful
elimination of its sole significant deficiency, HHS requests the
removal of the word "significant" to describe the depth of control
weaknesses in this assessment. Alternatively, we recommend use of
"noteworthy" or "important" to describe these weaknesses.
HHS, consistent with the National Institute of Standards and Technology
(KIST), defines implementation as observed consistency with policies
and procedures. Evidence of general compliance with policy and
procedures exists at the enterprise and OPDIV levels. In 2003, HHS
formally established the foundation of its information security program
to ensure the confidentiality, integrity, and availability of the
information it collects, stores, and processes to meet its strategic
missions on behalf of the American citizenry. Since 2003, the HHS
information security program has continued to evolve, resulting in
standard, repeatable security processes disseminated throughout its 14
Operating Divisions (OPDIVs). HHS, as acknowledged in the FY 2005 OIG
FISMA Executive Summary, issued an overarching information security
policy, an information security program handbook, and numerous guides.
HHS initiated a variety of analysis and oversight activities,
continuously monitoring and improving current security practices. The
observations in this GAO assessment identify information security areas
in which improvements can be made but, when considered collectively, do
not equate to HHS having "not fully implemented a Department wide
information security program." [NOTE 1] Instead, these findings
indicate that full integration, or maturity, has not yet been achieved.
Integration represents a level of growth beyond implementation in which
HHS tests security practices and controls for compliance and mitigates
the results of these tests to demonstrate continued improvement. HHS,
through its increasing oversight activities, strives towards such
integration. Therefore, HHS agrees that full integration has not yet
been achieved, but requests that the implementation of the security
program be recognized in this report.
The HHS information security program addresses each of the key elements
required by FISMA. HHS assesses risk periodically; disseminates
necessary policies and procedures; develops security plans; delivers
security awareness and training; tests and evaluates system controls at
least annually; detects, responds to and reports incidents; plans
continuity of operations; and maintains reliable monitoring and
reporting capabilities. This programmatic structure, as mandated by law
and proven in practice, led to the development of sound security
practices and continuous improvement in HHS's overall security posture.
On page 17, the GAO assessment implies that the HHS information
security program is not "well-designed." The program, however, adheres
to law and is acknowledged in the FY 2005 OIG FISMA Executive Summary
as a program intended to "improve the Department's overall IT security
posture, ensure adequate enterprise-wide security standards, support
integration of IT security into lines of business, and promote an
environment in which employee actions reflect the importance of IT
security." [NOTE 2] HHS requests that the terms "well-designed" and
"fully implemented" be revised to read "fully integrated" to more
accurately describe the HHS information security program posture.
NOTES:
[1] Report GAO-06-267, Department of Health and Human Services Needs to
Fully Implement Its Program, page 6.
[2] FY 2005 OIG Annual FISMA Executive Summary, page 10.
The HHS Information Security Program Policy, signed by the HHS Chief
Information Officer (CIO) and released to the HHS OPDIVs on January 26,
2004, articulates the roles and responsibilities for each category of
security personnel and addresses each information program area required
by FISMA. Compliance with this policy is mandatory. HHS developed an
information security program handbook to complement this overarching
security policy and to recommend procedures for implementation of
policy stipulations. Therefore, the statement on page 19 asserting that
"Operating divisions are expected to comply with departmental standards
or develop specific standards that exceed them" is not accurate and
should be revised. As stated on page v of the Information Security
Program Policy, "compliance with this document is mandatory. It is HHS
policy that Department personnel abide by or exceed the requirements
outlined in this document." HHS requests that the word "expected" be
replaced with "required" to reinforce the stringency of HHS's policy
compliance.
In some instances, determinations were made regarding enterprise-wide
weaknesses based on small percentages of HHS FISMA systems.
Documentation pertaining to six or fewer percent of HHS's total FISMA
systems is not evidence of incomplete implementation of an enterprise-
wide security program. Nor does it indicate systematic problems in
HHS's certification and accreditation (C&A) processes. The GAO
assessment references four OPDIV risk assessments that lacked
information or had not been completed. These four systems' risk
assessments represent only two percent of HHS's 177 total FISMA
systems. Two incomplete security plans were cited to constitute an
overarching system security plan finding, although these two plans
represent a mere one percent of the 177 HHS's FISMA systems. The GAO
assessment identified six OPDIV systems for which annual system
security control tests and evaluations were not completed, equaling
only three percent of HHS's FISMA systems. The FY 2005 OIG FISMA
findings document that 83.3 percent of the OPDIV system sample reviewed
had completed C&A packages, including satisfactory risk assessments,
system security plans, and annual security control tests and
evaluations. In addition, in FY 2005, OIG deemed the Department's C&A
process "satisfactory" for the first time. We believe that the
statistics cited above more accurately reflect the current state of
HHS's information security and that the related GAO findings should be
excluded from the report.
The HHS Information Security Program Policy documents the following
policy pertaining to change management and configuration management
controls, "3.6 Change Management Control: Establish, implement, and
enforce change management and configuration management controls on all
Departmental systems and networks that process, store, or communicate
sensitive information, to include the preparation of configuration
control plans for all Departmental systems and networks." [NOTE 3] The
GAO assessment, on page 21, stating "HHS has not developed Department
wide policies regarding minimally acceptable configuration
requirements" is inaccurate and should be revised. Plans are in place
to standardize, monitor, and enforce the extent of implementation
according to OMB standards in FY 2006. OPDIV Chief Information Security
Officers (CISO) also formed a configuration management subcommittee to
develop configuration standards specific to the most predominant
operating systems in the HHS security environment.
NOTE:
[3] HHS Information Security Program Policy, January 26, 2004, page 18.
HHS, as noted in the FY 2005 OIG FISMA Executive Summary and above,
"initiated procedures that resulted in the elimination of a previously
identified significant deficiency." The Department established and
completed contingency plans and performance testing at system levels,
thereby eliminating this deficiency, related to Department level
contingency planning and disaster recovery. HHS's role as the lead
agency for public health services - including prevention, surveillance,
laboratory services, and personal health services - made the
elimination of this significant deficiency vital. Additionally, HHS
completed and tested contingency plans for 100 percent of its high-risk
FISMA systems, or those systems that would result in a catastrophic
loss of confidentiality, integrity, and availability should their
security be compromised. These accomplishments and their significance
to the overall HHS mission should be noted in the GAO assessment.
In addition to our comments pertaining to the HHS enterprise-wide
information security program, there are three additional points
pertaining to the Centers for Medicare & Medicaid Services (CMS):
In FY 2005, CMS initiated an aggressive initiative to rid itself of a
material weakness attributable to Medicare Electronic Data Processing
(EDP) based on Federal Information System Controls Audit Manual
(FISCAM) audits performed in FY 2004. Our progress toward this goal was
tracked monthly as a part of the HHS Risk Management and Financial
Oversight Committee. The Medicare Claims Processing System (MCPS) was
the primary focus of the GAO review. The FY 2005 Report of the
Independent Auditors on Internal Control, also focused primarily on the
MCPS, found that CMS had made improvements in its entity-wide security
program, systems software, and service continuity planning and testing.
There was a significant 63 percent reduction in high-risk findings in
FY 2005 over FY 2004. The progress was such that the long-standing
material weakness in Medicare EDP controls based on FISCAM was
eliminated. The progress noted in the FY 2005 Report of the Independent
Auditors on Internal Control was provided and discussed with the GAO
auditors.
In FY 2005, CMS also made significant progress in its compliance with
the requirements of FISMA. Under section 912 of the Medicare
Prescription Drug, Improvement, and Modernization Act of 2003 CMS is
required to evaluate our fiscal intermediaries and carriers for
compliance with FISMA. Similar to the FISCAM findings, GAO based its
conclusions, at least in part, on evaluations that were a year old.
Again, CMS made significant strides in FY 2005. In fact, the FY 2005
evaluation results, provided to OIG in early December 2005, and offered
to GAO, reflect a 70 percent reduction in high-risk findings over FY
2004, with significant improvement in the areas of Policies and
Procedures, Systems Security Plans, Incident Handling, and Continuity
of Operations.
The FY 2005 OIG report of CMS's FISMA compliance also noted that CMS
had made "significant achievements in meeting its statutory
responsibilities under FISMA."
Accomplishments in security policy, contingency plans, and training
were cited by OIG. Again, this documented improvement in CMS' FISMA
compliance was not acknowledged in the GAO report, although the report
was made available.
In summary, HHS is proud of its information security program and the
progress it has made over the last fiscal year, specifically in its
improved satisfaction of FISMA requirements. HHS proactively measures
and tests compliance with information security policies, processes,
Federal standards, and requirements. Testing indicates consistent
improvements throughout the enterprise, but given such rigorous and
aggressive testing, there will invariably be findings. HHS's emphasizes
risk management and the strong remediation of discrepancies once
identified. HHS places great importance on achieved progress and
positive results. The Department utilizes such successes to build
momentum within the program itself. HHS's proactive approach to
security program implementation and management resulted in a
substantial reduction in findings and risks, both at odds with the GAO
report. We regret the GAO report did not consider the more recent data
available.
HHS supports the GAO's emphasis on improvements in the eight areas of
FISMA, since continuous improvement in system security exemplified
through the system development lifecycle is a must for all government
agencies. HHS endeavors to farther improve its information security
program, staying in step with existing and emerging Federal
requirements and industry best practices.
[End of section]
Appendix III: HHS Operating Divisions:
Administration for Children and Families--responsible for some 60
programs that promote the economic and social well being of children,
families and communities.
Administration on Aging--supports a nationwide network providing
services to the elderly, especially to enable them to remain
independent.
Agency for Healthcare Research and Quality--supports research on health
care systems, health care quality and cost issues, access to health
care, and effectiveness of medical treatments. It provides evidence-
based information on health care outcomes and quality of care.
Agency for Toxic Substances and Disease Registry--responsible for
preventing exposure to hazardous substances from waste sites on the
U.S. Environmental Protection Agency's National Priorities List and
develops toxicological profiles of chemicals at these sites.
Centers for Disease Control and Prevention--provides a system of health
surveillance to monitor and prevent disease outbreaks, implements
disease prevention strategies, and maintains national health
statistics. The centers also provide for immunization services,
workplace safety, and environmental disease prevention. In addition,
the centers guard against international disease transmission, with
personnel stationed in more than 25 foreign countries.
Centers for Medicare & Medicaid Services--administers the Medicare and
Medicaid programs, which provide health care to about one in every four
Americans. Medicare provides health insurance for more than 42.1
million elderly and disabled Americans. Medicaid, a joint federal-state
program, provides health coverage for some 44.7 million low-income
persons, including 21.9 million children, and nursing home coverage for
low-income elderly. CMS also administers the State Children's Health
Insurance Program that covers more than 4.2 million children.
Food and Drug Administration--responsible for assuring the safety of
foods and cosmetics, and the safety and efficacy of pharmaceuticals,
biological products, and medical devices--products that represent
almost 25 cents of every dollar in U.S. consumer spending.
Health Resources and Services Administration--provides access to
essential health care services for people who are low-income, uninsured
or who live in rural areas or urban neighborhoods where health care is
scarce. The agency helps prepare the nation's health care system and
providers to respond to bioterrorism and other public health
emergencies, maintains the National Health Service Corps, and helps
build the health care workforce through training and education
programs.
Indian Health Service--provides health services to 1.6 million American
Indians and Alaska Natives of more than 550 federally recognized
tribes. The Indian health system includes 49 hospitals, 247 health
centers, 348 health stations, satellite clinics, residential substance
abuse treatment centers, Alaska Native village clinics, and 34 urban
Indian health programs.
National Institutes of Health--a medical research organization,
supporting over 38,000 research projects nationwide in diseases
including cancer, Alzheimer's, diabetes, arthritis, heart ailments, and
AIDS.
Office of Inspector General--The OIG is responsible for protecting the
integrity of HHS programs, as well as the health and welfare of the
beneficiaries of those programs. It is also responsible for reporting
program and management problems and recommendations to correct them to
both the Secretary of HHS and to Congress. The OIG's duties are carried
out through a nationwide network of audits, investigations,
inspections, and other mission-related functions performed by OIG
components.
Office of the Secretary--provides counsel to the secretary on such
issues as public affairs, legislation, budget, technology, and finance.
Program Support Center--The Program Support Center was created in 1995
to provide a wide range of administrative support within the Department
of Health and Human Services, allowing the department operating
divisions to concentrate on their core functional and operational
objectives.
Substance Abuse and Mental Health Services Administration--works to
improve the quality and availability of substance abuse prevention,
addiction treatment, and mental health services.
[End of section]
Appendix IV: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gregory C. Wilshusen (202) 512-6244:
Acknowledgments:
In addition to the person named above, Idris Adjerid, Larry Crosland,
Jeffrey Knott, Carol Langelier, Ronald Parker, Amos Tevelow, and
William Thompson made key contributions to this report.
(310559):
FOOTNOTES
[1] Title III, E-Government Act of 2002, P.L. 107-347 (Dec. 17, 2002).
[2] A denial-of-service attack is an attack on a network that sends a
flood of useless traffic that prevents legitimate use of the network.
[3] An intranet is a private network that is contained within an
enterprise. It may consist of many interlinked local area networks and
also use leased lines in the wide area network.
[4] An extranet is a private network that uses Internet technology and
the public telecommunication system to securely share part of an
organization's information or operations with suppliers, vendors,
partners, customers, or other businesses.
[5] Office of Management and Budget, Circular A-130, appendix III,
Security of Federal Automated Information Resources (Nov. 28, 2000).
[6] FISMA requires each agency to develop, document, and implement an
agencywide information security program to provide information security
for the information and systems that support the operations and assets
of the agency, including those operated or maintained by contractors or
others on behalf of the agency, using a risk-based approach to
information security management. 44 USC § 3544(b).
[7] NIST Special Publication 800-30, Risk Management Guide for
Information Technology Systems, July 2002.
[8] NIST Special Publication 800-18, Guide for Developing Security
Plans for Information Technology Systems, December 1998.
[9] NIST Special Publication 800-26, Security Self-Assessment Guide for
Information Technology Services, July 2002.
[10] HHS defines a security incident as the violation of an explicit or
implied security policy in a computing or telecommunications system or
network.
[11] HHS defines an event as a notable occurrence in a network or
system.
[12] Included in HHS's Fiscal Year 2005 Performance and Accountability
Report, section III.
[13] The American Institute of Certified Public Accountants' standards
define "reportable conditions" as significant deficiencies in the
design or operation of internal control that could adversely affect the
entity's ability to record, process, summarize, and report financial
data consistent with the assertions of management in the financial
statements.
[14] GAO/AIMD-12.19.6 (Washington, D.C.: January 1999). FISCAM contains
guidance for reviewing information system controls that affect the
security of computerized data.
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: