Information Security

Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies Gao ID: GAO-10-237 March 12, 2010

To reduce the threat to federal systems and operations posed by cyber attacks on the United States, the Office of Management and Budget (OMB) launched, in November 2007, the Trusted Internet Connections (TIC) initiative, and later, in 2008, the Department of Homeland Security's (DHS) National Cybersecurity Protection System (NCPS), operationally known as Einstein, became mandatory for federal agencies as part of TIC. For each of these initiatives, GAO was asked to (1) identify their goals, objectives, and requirements; (2) determine the status of actions federal agencies have taken, or plan to take, to implement the initiatives; and (3) identify any benefits, challenges, and lessons learned. To do this, GAO reviewed plans, reports, and other documents at 23 major executive branch agencies, interviewed officials, and reviewed OMB and DHS guidance.

The goals of TIC are to secure federal agencies' external network connections, including Internet connections, and improve the government's incident response capability by reducing the number of agencies' external network connections and implementing security controls over the connections that remain. In implementing TIC, agencies could either provide their own access points by becoming an access provider or seek service from these providers or an approved vendor. To achieve the initiative's goals, agencies were required to (1) inventory external connections, (2) establish a target number of TIC access points, (3) develop and implement plans to reduce their connections, (4) implement security capabilities (if they chose to be an access provider) addressing such issues as encryption and physical security, and (5) demonstrate to DHS the consolidation of connections and compliance with the security capabilities (if they chose to be an access provider). As of September 2009, none of the 23 agencies had met all of the requirements of the TIC initiative. Although most agencies reported that they have made progress toward reducing their external connections and implementing critical security capabilities, most agencies have also experienced delays in their implementation efforts. For example, the 16 agencies that chose to become access providers reported that they had reduced their number of external connections from 3,286 to approximately 1,753. Further, agencies have not demonstrated that they have fully implemented the required security capabilities. Throughout their reduction efforts, agencies have experienced benefits, such as improved security and network management. However, they have been challenged in implementing TIC because OMB did not promptly communicate the number of access points for which they had been approved and DHS did not always respond to agency queries on security capabilities in a timely manner. Agencies' experiences with implementing TIC offered OMB and DHS lessons learned, such as the need to define program requirements before establishing deadlines and the usefulness of sponsoring collaborative meetings for agencies' implementation efforts. Einstein is intended to provide DHS with an increased awareness of activity, including possible security incidents, on federal networks by providing intrusion detection capabilities that allow DHS to monitor and analyze agencies' incoming and outgoing Internet traffic. As of September 2009, fewer than half of the 23 agencies had executed the required agreements with DHS, and Einstein 2 had been deployed to 6 agencies. Agencies that participated in Einstein 1 improved identification of incidents and mitigation of attacks, but DHS will continue to be challenged in understanding whether the initiative is meeting all of its objectives because it lacks performance measures that address how agencies respond to alerts.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Gregory C. Wilshusen Team: Government Accountability Office: Information Technology Phone: (202) 512-6244


GAO-10-237, Information Security: Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies This is the accessible text file for GAO report number GAO-10-237 entitled 'Information Security: Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies' which was released on April 12, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: March 2010: Information Security: Concerted Effort Needed to Consolidate and Secure Internet Connections at Federal Agencies: GAO-10-237: GAO Highlights: Highlights of GAO-10-237, a report to congressional requesters. Why GAO Did This Study: To reduce the threat to federal systems and operations posed by cyber attacks on the United States, the Office of Management and Budget (OMB) launched, in November 2007, the Trusted Internet Connections (TIC) initiative, and later, in 2008, the Department of Homeland Security‘s (DHS) National Cybersecurity Protection System (NCPS), operationally known as Einstein, became mandatory for federal agencies as part of TIC. For each of these initiatives, GAO was asked to (1) identify their goals, objectives, and requirements; (2) determine the status of actions federal agencies have taken, or plan to take, to implement the initiatives; and (3) identify any benefits, challenges, and lessons learned. To do this, GAO reviewed plans, reports, and other documents at 23 major executive branch agencies, interviewed officials, and reviewed OMB and DHS guidance. What GAO Found: The goals of TIC are to secure federal agencies‘ external network connections, including Internet connections, and improve the government‘s incident response capability by reducing the number of agencies‘ external network connections and implementing security controls over the connections that remain. In implementing TIC, agencies could either provide their own access points by becoming an access provider or seek service from these providers or an approved vendor. To achieve the initiative‘s goals, agencies were required to: * inventory external connections, * establish a target number of TIC access points, * develop and implement plans to reduce their connections, * implement security capabilities (if they chose to be an access provider) addressing such issues as encryption and physical security, and; * demonstrate to DHS the consolidation of connections and compliance with the security capabilities (if they chose to be an access provider). As of September 2009, none of the 23 agencies had met all of the requirements of the TIC initiative. Although most agencies reported that they have made progress toward reducing their external connections and implementing critical security capabilities, most agencies have also experienced delays in their implementation efforts. For example, the 16 agencies that chose to become access providers reported that they had reduced their number of external connections from 3,286 to approximately 1,753. Further, agencies have not demonstrated that they have fully implemented the required security capabilities. Throughout their reduction efforts, agencies have experienced benefits, such as improved security and network management. However, they have been challenged in implementing TIC because OMB did not promptly communicate the number of access points for which they had been approved and DHS did not always respond to agency queries on security capabilities in a timely manner. Agencies‘ experiences with implementing TIC offered OMB and DHS lessons learned, such as the need to define program requirements before establishing deadlines and the usefulness of sponsoring collaborative meetings for agencies‘ implementation efforts. Einstein is intended to provide DHS with an increased awareness of activity, including possible security incidents, on federal networks by providing intrusion detection capabilities that allow DHS to monitor and analyze agencies‘ incoming and outgoing Internet traffic. As of September 2009, fewer than half of the 23 agencies had executed the required agreements with DHS, and Einstein 2 had been deployed to 6 agencies. Agencies that participated in Einstein 1 improved identification of incidents and mitigation of attacks, but DHS will continue to be challenged in understanding whether the initiative is meeting all of its objectives because it lacks performance measures that address how agencies respond to alerts. What GAO Recommends: GAO is making recommendations to OMB to promptly communicate the number of approved connections for agencies, and to DHS aimed at improving communication and performance measures. OMB concurred with GAO‘s findings, conclusions, and recommendations. DHS concurred with GAO‘s recommendations and also provided technical comments. View [hyperlink, http://www.gao.gov/products/GAO-10-237] or key components. For more information, contact Gregory C. Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. [End of section] Contents: Letter: Background: Agencies Have Made Progress toward Consolidating and Reducing Connections, but Inconsistent Communication from OMB and DHS Has Led to Challenges: DHS Has Deployed Einstein to Six Agencies, but Faces Challenges with Meeting Program Goals: Conclusions: Recommendations for Executive Action: Agency Comments: Appendix I: Objectives, Scope, and Methodology: Appendix II: GAO Contact and Staff Acknowledgments: Tables: Table 1: Reported Status of Consolidation by 19 Agencies: Table 2: Number of Critical Security Capabilities Reported as Implemented by Access Provider Agencies: Figures: Figure 1: Interaction of TIC and Einstein: Figure 2: Comparison of Reported Consolidation by 16 Access Provider Agencies: Abbreviations: DHS: Department of Homeland Security: GSA: General Services Administration: NCPS: National Cybersecurity Protection System: OMB: Office of Management and Budget: TIC: Trusted Internet Connections: US-CERT: United States Computer Emergency Readiness Team: [End of section] United States Government Accountability Office: Washington, DC 20548: March 12, 2010: The Honorable Joseph I. Lieberman: Chairman: The Honorable Susan M. Collins: Ranking Member: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable Thomas R. Carper: Chairman: Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security: Committee on Homeland Security and Governmental Affairs: United States Senate: Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact on federal systems and operations. The need for a vigilant approach to information security is demonstrated by a dramatic increase in reports of security incidents, the wide availability of hacking tools, and steady advances in the sophistication and effectiveness of attack technology. As recently as July 2009, press accounts reported that a widespread and coordinated attack over the course of several days targeted Web sites operated by major government agencies, including the Departments of Homeland Security and Defense, the Federal Aviation Administration, and the Federal Trade Commission, causing disruptions to the public availability of government information. In addition, the Director of National Intelligence testified in February 2009 that foreign nations and criminals had targeted government and private-sector networks to gain a competitive advantage or potentially disrupt or destroy them, and that terrorist groups had expressed a desire to use cyber attacks as a means to target the United States.[Footnote 1] Such attacks and threats highlight the importance of developing a concerted response to safeguard federal information systems. To improve the effectiveness of information security across the federal government, in November 2007, the Office of Management and Budget (OMB) announced the Trusted Internet Connections (TIC) initiative, and in 2003 the Department of Homeland Security (DHS) established the Einstein program, recently incorporated into the National Cybersecurity Protection System (NCPS). TIC is intended to improve security by reducing and consolidating external network connections and by providing centralized monitoring at a select group of access providers, while Einstein is an intrusion detection system that provides an automated process for DHS to analyze computer network traffic information from agencies. In January 2008, these programs were incorporated into the Comprehensive National Cybersecurity Initiative.[Footnote 2] At your request, we evaluated key elements of the implementation of TIC and Einstein at federal agencies. For each of these initiatives, we (1) identified the goals, objectives, and requirements for the initiatives; (2) determined the status of the actions federal agencies have taken, or plan to take, to implement the initiatives; and (3) identified the benefits, challenges, and lessons learned in implementing the initiatives. To accomplish our objectives, we examined OMB memorandums and DHS guidance in order to identify program requirements, which we confirmed through interviews with OMB and DHS officials. We obtained and analyzed plans, status reports, and other documents and interviewed officials from 23 of the 24 federal agencies listed in the Chief Financial Officers Act.[Footnote 3] The Department of Defense was not included in our review because it was not required to implement TIC or Einstein. The initiatives include additional agencies which were not included in our review. We conducted this performance audit between December 2008 and March 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Further details of our objectives, scope, and methodology are included in appendix I. Background: As computer technology has advanced, federal agencies have become dependent on computerized information systems to carry out their operations and to process, maintain, and report essential information. Virtually all federal operations are supported by computer systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions, deliver services to the public, and account for their resources without these cyber assets. Information security is thus especially important for federal agencies to ensure the confidentiality, integrity, and availability of their systems and data. Conversely, ineffective information security controls can result in significant risk to a broad array of government operations and assets, as the following examples illustrate: * Computer resources could be used for unauthorized purposes or to launch attacks on other computer systems. * Sensitive information, such as personally identifiable information, intellectual property, and proprietary business information could be inappropriately disclosed, browsed, or copied for purposes of identity theft, espionage, or other types of crime. * Critical operations, such as those supporting critical infrastructure, national defense, and emergency services, could be disrupted. * Data could be added, modified, or deleted for purposes of fraud, subterfuge, or disruption. Due to the growing cyber-based threats to federal systems and critical infrastructure, the persistent nature of information security vulnerabilities, and the associated risks, we continue to designate information security as a governmentwide high-risk issue in our most recent biennial report to Congress,[Footnote 4] a designation we have made in each report since 1997. In July 2009, we reported[Footnote 5] that almost all 24 major federal agencies had weaknesses in information security controls and that an underlying reason for these weaknesses is that agencies have not fully implemented their information security programs as required under the Federal Information Security Management Act.[Footnote 6] As a result, federal systems and sensitive information are at increased risk of unauthorized access and disclosure, modification, or destruction, as well as inadvertent or deliberate disruption of system operations and services. We have previously reported that federal agencies have experienced security breaches in their networks, potentially allowing sensitive information to be compromised, and systems, operations, and services to be disrupted. These examples illustrate that a broad array of federal information and critical infrastructures are at risk:[Footnote 7] * The Department of State experienced a breach on its unclassified network, which daily processes about 750,000 e-mails and instant messages from more than 40,000 employees and contractors at 100 domestic and 260 overseas locations. * The Nuclear Regulatory Commission confirmed that in January 2003, the Microsoft SQL Server worm known as "Slammer" infected a private computer network at the idled Davis-Besse nuclear power plant in Oak Harbor, Ohio, disabling a safety monitoring system for nearly 5 hours. * Officials at the Department of Commerce's Bureau of Industry and Security discovered a security breach in July 2006. In investigating this incident, officials were able to review firewall logs for an 8- month period prior to the initial detection of the incident, but were unable to clearly define the amount of time that perpetrators were inside its computers, or find any evidence to show that data was lost as a result. Because the threats have persisted and grown, in January 2008 the President issued National Security Presidential Directive 54/Homeland Security Presidential Directive 23, establishing the Comprehensive National Cybersecurity Initiative,[Footnote 8] a set of projects with the objective of safeguarding federal executive branch government information systems by reducing potential vulnerabilities, protecting against intrusion attempts, and anticipating future threats against the federal government's networks. Under the initiative, DHS is to lead several projects to better secure civilian federal government networks, while other agencies, including OMB, the Department of Defense, the Office of the Director of National Intelligence, and other agencies have key roles in other projects, including monitoring military systems and classified networks, overseeing intelligence community systems and networks, and spearheading advanced technology research and development. The initiative's 12 projects can be grouped into three focus areas: * Establishing front lines of defense. This focus area includes initiatives intended to protect the perimeter of federal networks, such as consolidating connections and deploying intrusion detection and prevention systems. * Defend against full spectrum of threats. This focus area includes activities intended to protect national security and intelligence- related information and systems across the federal government. * Shape the future environment. The initiatives in this area are focused on expansion of cybersecurity education and research and development efforts for future technologies and cybersecurity strategies. Two primary initiatives under the establishing front lines of defense focus area are TIC and Einstein. Trusted Internet Connections: In November 2007, OMB announced the TIC initiative.[Footnote 9] Directed by OMB with assistance from DHS, this effort is intended to improve the federal government's security posture and incident response capability by reducing and consolidating external network connections, including Internet connections, currently in use by the government, and by centrally monitoring the traffic passing through these connections for potentially malicious activity. All federal agencies in the executive branch, except for the Department of Defense, are required to implement the initiative. Although the initiative is intended to secure connections to the Internet, other external connections to potentially unsecured systems must also be routed through an approved TIC access point,[Footnote 10] even if they do not pass through the Internet.[Footnote 11] Agencies may implement TIC by serving as their own access provider or by obtaining services from another source. Agencies may choose one of four service options: * Single service: The agency provides services to its own bureaus and components only. * Multi-service: The agency provides services to its own bureaus and components as well as to other agencies. * Seeking service: The agency obtains services from a multi-service agency or through the Networx program. This program, managed by the General Services Administration (GSA), provides an acquisition vehicle for agencies to procure telecommunication, network, wireless, and information technology security services, including TIC services, from among multiple vendors. * Hybrid: The agency both provides services to its own bureaus and components and obtains additional services from a Networx provider. Of the 23 agencies in our review, 16 have chosen to be a TIC access provider: specifically, 12 have chosen the single service option, 1 chose the multi-service option, and 3 have chosen the hybrid approach. The remaining seven agencies have chosen to seek service from another access provider.[Footnote 12] Einstein: NCPS, operationally known as Einstein,[Footnote 13] was created in 2003 by the United States Computer Emergency Readiness Team (US-CERT) [Footnote 14] in order to aid in its ability to help reduce and prevent computer network vulnerabilities across the federal government. The initial version of Einstein provided an automated process for collecting, correlating, and analyzing agencies' computer network traffic information from sensors installed at their Internet connections. The Einstein sensors collected network flow records [Footnote 15] at participating agencies, which were then analyzed by US-CERT to detect certain types of malicious activity. It then coordinated with the appropriate agencies to mitigate those threats and vulnerabilities. US-CERT also used the information from the sensors to create analyses of cross-governmental trends, offering departments and agencies an aggregate picture of external threats against the federal government's networks. Participation in the program was initially voluntary for federal agencies. In 2008, DHS developed the current iteration of Einstein--Einstein 2-- which incorporated network intrusion detection technology into the capabilities of the initial version of the system. Einstein 2 monitors for specific predefined signatures[Footnote 16] of known malicious activity at federal agency Internet connections and alerts US-CERT when specific malicious network activity matching the predetermined signatures is detected. According to US-CERT, the signatures are not typically included in commercially available databases of known attack signatures, but are developed by US-CERT to look for specific malicious activity based on previous analysis. In addition, participation in Einstein became mandatory as part of the TIC initiative. Currently being piloted by DHS, Einstein 3 is intended to be an intrusion prevention system that is to automatically detect and respond appropriately to cyber threats before harm is done. Using signatures developed from critical information about foreign cyber threats as determined by the National Security Agency, the system is to draw on commercial technology and specialized government technology to conduct real-time full packet inspection and threat-based decision making on traffic entering or leaving federal agency networks. It is also intended to support enhanced information sharing by US-CERT with federal agencies by giving DHS the ability to provide agencies with automated alerts of detected network intrusion attempts. Ultimately, TIC and Einstein are intended to work together to build successive layers of defense mechanisms in the federal government's information technology infrastructures. When Einstein is deployed at a TIC location, it monitors inbound and outbound network traffic. Once TIC is fully implemented across the federal government, all traffic passing between the federal civilian networks and the Internet is to be monitored for malicious activity by US-CERT using Einstein and its supporting processes. Figure 1 illustrates how TIC portals interact with the Einstein sensors and the Internet. Figure 1: Interaction of TIC and Einstein: [Refer to PDF for image: illustration] Single service provider: Agency A network: * Agency A TIC; - Einstein; * Agency A TIC; - Einstein; Connected to Internet. Multi-service provider: Agency B network: * Agency B TIC; - Einstein; * Agency B TIC; - Einstein; Connected to Internet. Seeking service: Agency C network: connects through Agency B TIC; Agency G network: connects through Networx vendor; Agency G network: connects through Networx vendor; Agency G network: connects through Networx vendor. Networx vendor: * Networx vendor TIC; - Einstein; * Networx vendor TIC; - Einstein; Connected to Internet. Hybrid approach: Agency G network: * Agency G TIC; - Einstein; * Agency G TIC; - Einstein; Connected to Internet. Source: GAO analysis based on DHS data. [End of figure] Agencies Have Made Progress toward Consolidating and Reducing Connections, but Inconsistent Communication from OMB and DHS Has Led to Challenges: OMB and DHS established requirements to meet the initiative's goals of securing agencies' external connections and improving the government's incident response capability. However, as of September 2009, none of the 23 agencies had met all of the requirements. Throughout their efforts, agencies have experienced benefits and challenges as well as learned lessons. TIC Aims to Improve the Security of Federal Connections to the Internet: The primary goals of the TIC initiative are (1) to secure federal agency external connections using a common set of security controls and (2) to improve the federal government's incident response capability. To achieve these goals, the initiative has the following objectives: * reduce and consolidate external connections,[Footnote 17] including connections to the Internet, across the federal government; * define and maintain baseline security capabilities for TIC access providers; and: * establish a compliance program to monitor agency adherence to TIC policy. Agencies Were Required to Develop and Implement Plans to Consolidate and Secure External Connections: To achieve these objectives, agencies were required to: * Inventory agency external connections. Agencies were required to provide their connection inventories to DHS by January 8, 2008. * Identify and justify target number of external access points. Each agency was to submit their target number to DHS by April 15, 2008. They were also required to provide a justification indicating why the requested number of external access points was necessary to support their missions. * Develop and implement plans to consolidate external connections. OMB required agencies to develop and submit initial plans for consolidating their external connections to DHS by January 8, 2008. In addition, agencies were required to update their plans in April 2008. Access provider agencies were required to provide updated plans to DHS in October 2008, and all agencies were required to provide updated plans to DHS in September 2009. When it announced the initiative in November 2007, OMB required that agencies' initial plans have a target completion date of June 2008 for reducing and consolidating their external connections. OMB later revised its target deadline for implementation of TIC across the federal government to December 2009. * Implement security capabilities. To ensure that each TIC access point would be secure, OMB required[Footnote 18] agencies that planned to be an access provider to evaluate their ability to meet 74 security capabilities and to report this information to DHS by April 2008. The 74 security capabilities include technical capabilities, such as encryption of Internet traffic and the use of firewalls; capabilities related to availability, such as the presence of an uninterrupted power source; physical access controls; and capabilities that describe how an access provider maintains an acceptable level of service. Of the 74 capabilities, 51 are designated as critical, 14 are designated as important, and 9 are categorized as desired. Of the 51 critical capabilities, 40 are required for both single service and multi- service access providers. The 11 capabilities required only for multi- service access providers address the interaction with external customers, such as service level agreements, communication, and reporting. OMB provided a template for agencies to report whether they currently met each of the capabilities and to indicate their plans for addressing any critical capabilities they did not meet. Once agencies determined whether to be an access provider or to seek service from another provider, they were required to do one of the following: - Access provider agencies were required to develop plans for implementing any of the critical TIC capabilities that they did not yet have in place. They were required to report on their progress toward implementing the critical capabilities to DHS in October 2008 and September 2009. - Agencies that are seeking service from other access providers were not required to implement the critical capabilities; however, they were required to acquire TIC services from a multi-service access provider or a commercial vendor that had met the security capabilities through the Networx contract. * Demonstrate consolidation of connections and implementation of TIC security capabilities. Access provider agencies, along with Networx vendors that offer TIC services, are required to undergo a TIC Compliance Validation review, in which DHS assesses the degree to which the access provider meets the critical security capabilities and has consolidated its connections to approved TIC access points. If any capabilities are not fully implemented or if further consolidation is required, the access provider is granted Initial Operating Capability status and is required to develop plans to address the shortcomings and to submit the plans to DHS. All access providers are required to be re-assessed periodically to ensure the capabilities are still being met. All access provider agencies were required to schedule the on- site review with DHS by September 25, 2009. Agencies Have Not Fully Implemented All Requirements of TIC and Progress Has Been Slower Than Planned: None of the 23 agencies has met all of the requirements of the TIC initiative, and most agencies have experienced delays in their plans for reducing and consolidating connections. However, most agencies reported that they have made progress toward reducing and consolidating their external connections and implementing security capabilities. In addition, several access provider agencies have made more progress toward implementing the capabilities than others. The following describes the status of each requirement. All Agencies Submitted Connection Inventories: The 23 agencies in our review reported that they initially identified a total of 3,482 external connections. According to DHS, each agency submitted the required inventories, although four submitted the inventories after the January 2008 deadline. Two agencies told us that they discovered additional connections after submitting the initial inventory. Access Provider Agencies Requested 73 TIC Access Points, but OMB Approved 32: In April 2008, the 16 access provider agencies requested a total of 73 TIC access points. There were a variety of factors that influenced how agencies decided how many access points to request. For example, multiple agencies told us that they chose the number and location of their access points based on the location of existing data centers. Agencies also considered the need for redundant connections, geographic separation between connection sites, the business needs of the agency, and cost factors. In response to these requests, OMB approved 2 external access points for each access provider agency, a total of 32 TIC access points for the 16 agencies in our review.[Footnote 19] OMB and DHS established a process for these agencies to request additional access points. As of October 2009, one agency had submitted a request to DHS, and seven other agencies indicated that they had plans to do so. Progress toward Consolidating Connections Has Been Mixed and Slower than Projected: Progress reported by individual agencies toward meeting their targeted numbers of connections or access points has been mixed, and the reported overall progress toward consolidation has been slower than expected.[Footnote 20] In submitting their plans, which were due to DHS in October 2008 and September 2009, three agencies reported that they were at their target number of access points and had no further plans to consolidate connections; in addition, one agency did not report the status of its consolidation efforts. Of the remaining 19 agencies, as of September 25, 2009, 6 reported that they had consolidated at least 60 percent of their connections and 9 reported that they had consolidated fewer than 20 percent of their connections. Table 1 shows the consolidation status reported by these 19 agencies as of September 25, 2009.[Footnote 21] Table 1: Reported Status of Consolidation by 19 Agencies: Agency type: Access provider; Reported Status of Consolidation: Less than 20%[A]: 6; Reported Status of Consolidation: 20% to 39%: 1; Reported Status of Consolidation: 40% to 59%: 1; Reported Status of Consolidation: 60% to 79%: 6; Reported Status of Consolidation: 80% to 100%: 0. Agency type: Seeking service; Reported Status of Consolidation: Less than 20%[A]: 3; Reported Status of Consolidation: 20% to 39%: 1; Reported Status of Consolidation: 40% to 59%: 1; Reported Status of Consolidation: 60% to 79%: 0; Reported Status of Consolidation: 80% to 100%: 0. Agency type: Total; Reported Status of Consolidation: Less than 20%[A]: 9; Reported Status of Consolidation: 20% to 39%: 2; Reported Status of Consolidation: 40% to 59%: 2; Reported Status of Consolidation: 60% to 79%: 6; Reported Status of Consolidation: 80% to 100%: 0. Source: GAO analysis of agency data. [A] One access provider agency reported that it was less than 20 percent consolidated on September 25, 2009, but that it expected to consolidate to its target of two connections by September 30, 2009. [End of table] Overall, the reported progress toward consolidating connections was slower than projected, and agencies delayed their future plans for consolidation. In October 2008, the 16 access provider agencies, which were authorized a total of 32 TIC access points by OMB, projected in their plans of action and milestones that they would consolidate from their initial reported total of 3,286 external connections to a maximum of 1,528 connections by September 2009. However, in their September 2009 plans of action and milestones, these agencies reported that they had consolidated to a maximum of 1,753 connections--225 more than they had planned. In addition, agencies projected in their October 2008 plans that they would have consolidated to a maximum of 764 external connections by OMB's revised deadline of December 31, 2009. However, in September 2009 they anticipated that they would still have a maximum of 1,374 connections by that date--610 more than originally planned--and had significantly revised their projections for consolidation through November 2010. As agencies continue to consolidate their connections, their future projections for consolidation are likely to be revised further. Figure 2 indicates the estimated overall progress that access provider agencies reported toward reducing connections as of October 2008 and September 2009, their planned future consolidation, and how both their plans and reported progress have changed between October 2008 and September 2009.[Footnote 22] Figure 2: Comparison of Reported Consolidation by 16 Access Provider Agencies: [Refer to PDF for image: multiple line graph] Number of connections: Date: 1/31/2008; October 2008 reported schedule: 3,215; September 2009 reported actual consolidation: 3,215. Date: 2/29/2008; October 2008 reported schedule: 3,178; September 2009 reported actual consolidation: 3,180. Date: 3/31/2008; October 2008 reported schedule: 3,144; September 2009 reported actual consolidation: 3,146. Date: 4/30/2008; October 2008 reported schedule: 3,103; September 2009 reported actual consolidation: 3,146. Date: 5/31/2008; October 2008 reported schedule: 3,103; September 2009 reported actual consolidation: 3,146. Date: 6/30/2008; October 2008 reported schedule: 3,078; September 2009 reported actual consolidation: 3,140. Date: 7/31/2008; October 2008 reported schedule: 3,007; September 2009 reported actual consolidation: 3,105. Date: 8/31/2008; October 2008 reported schedule: 3,007; September 2009 reported actual consolidation: 3,105. Date: 9/30/2008; October 2008 reported schedule: 3,003; September 2009 reported actual consolidation: 3,105. Date: 10/31/2008; October 2008 reported schedule: 3,003; September 2009 reported actual consolidation: 3,105. Date: 11/30/2008; October 2008 reported schedule: 3,003; September 2009 reported actual consolidation: 3,105. Date: 12/31/2008; October 2008 reported schedule: 2,621; September 2009 reported actual consolidation: 2,748. Date: 1/31/2009; October 2008 reported schedule: 2,575; September 2009 reported actual consolidation: 2,748. Date: 2/28/2009; October 2008 reported schedule: 2,534; September 2009 reported actual consolidation: 2,746. Date: 3/31/2009; October 2008 reported schedule: 2,312; September 2009 reported actual consolidation: 2,544. Date: 4/30/2009; October 2008 reported schedule: 1,996; September 2009 reported actual consolidation: 2,272. Date: 5/31/2009; October 2008 reported schedule: 1,953; September 2009 reported actual consolidation: 2,266. Date: 6/30/2009; October 2008 reported schedule: 1,604; September 2009 reported actual consolidation: 1,872. Date: 7/31/2009; October 2008 reported schedule: 1,604; September 2009 reported actual consolidation: 1,872. Date: 8/31/2009; October 2008 reported schedule: 1,594; September 2009 reported actual consolidation: 1,865. Date: 9/30/2009; October 2008 reported schedule: 1,528; September 2009 reported actual consolidation: 1,753. Date: 10/31/2009; October 2008 reported schedule: 1,254; September 2009 projected schedule: 1,717. Date: 11/30/2009; October 2008 reported schedule: 1,248; September 2009 projected schedule: 1,710. Date: 12/31/2009; October 2008 reported schedule: 764; September 2009 projected schedule: 1,374. Date: 1/31/2010; October 2008 reported schedule: 748; September 2009 projected schedule: 1,310. Date: 2/28/2010; October 2008 reported schedule: 744; September 2009 projected schedule: 1,286. Date: 3/31/2010; October 2008 reported schedule: 744; September 2009 projected schedule: 1,284. Date: 4/30/2010; October 2008 reported schedule: 744; September 2009 projected schedule: 1,196. Date: 5/31/2010; October 2008 reported schedule: 744; September 2009 projected schedule: 1,196. Date: 6/30/2010; October 2008 reported schedule: 706; September 2009 projected schedule: 1,172. Date: 7/31/2010; October 2008 reported schedule: 706; September 2009 projected schedule: 1,138. Date: 8/31/2010; October 2008 reported schedule: 706; September 2009 projected schedule: 1,116. Date: 9/30/2010v October 2008 reported schedule: 585; September 2009 projected schedule: 1,059. Date: 10/31/2010; October 2008 reported schedule: 585; September 2009 projected schedule: 1,026. Date: 11/30/2010; October 2008 reported schedule: 585; September 2009 projected schedule: 1,026. Date: 12/31/2010; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 1/31/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 2/28/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 3/31/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 4/30/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 5/31/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 6/30/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 7/31/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 8/31/2011; October 2008 reported schedule: 550; September 2009 projected schedule: 700. Date: 9/30/2011; October 2008 reported schedule: 435; September 2009 projected schedule: 645. Date: 10/31/2011; October 2008 reported schedule: 435; September 2009 projected schedule: 627. Date: 11/30/2011; October 2008 reported schedule: 435v September 2009 projected schedule: 627. Date: 12/31/2011; October 2008 reported schedule: 337; September 2009 projected schedule: 505. Date: 1/31/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 505. Date: 2/29/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 505. Date: 3/31/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 505. Date: 4/30/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 505. Date: 5/31/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 505. Date: 6/30/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 505. Date: 7/31/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 487. Date: 8/31/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 487. Date: 9/30/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 487. Date: 10/31/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 487. Date: 11/30/2012; October 2008 reported schedule: 337; September 2009 projected schedule: 487. Date: 12/31/2012; October 2008 reported schedule: 238; September 2009 projected schedule: 389. Date: 1/31/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 389. Date: 2/28/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 389. Date: 3/31/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 371. Date: 4/30/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 371. Date: 5/31/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 371. Date: 6/30/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 371. Date: 7/31/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 371. Date: 8/31/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 371. Date: 9/30/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 371. Date: 10/31/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 353. Date: 11/30/2013; October 2008 reported schedule: 238; September 2009 projected schedule: 353. Date: 12/31/2013; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 1/31/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 2/28/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 3/31/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 4/30/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 5/31/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 6/30/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 7/31/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 8/31/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 9/30/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 10/31/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 11/30/2014; October 2008 reported schedule: 140; September 2009 projected schedule: 238. Date: 12/31/2014; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 1/31/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 2/28/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 3/31/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 4/30/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 5/31/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 6/30/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 7/31/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 8/31/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 9/30/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 10/31/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 11/30/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 238. Date: 12/31/2015; October 2008 reported schedule: 46; September 2009 projected schedule: 140. Source: GAO estimate based on agency reported data. Note: In this figure, both of the reported schedules begin at 3,215 connections because one agency reported that it had consolidated 71 connections by January 2008. In addition, at the time of our review, one access provider agency had not submitted its September 2009 progress report to DHS. As a result, the September 2009 projections for this agency were based on an earlier progress report that may not represent the agency's current status or plans. [End of figure] Few Agencies Have Reported Implementing All Required Security Capabilities: As of September 2009, only 3 of the 16 access provider agencies have reported implementing all 40 required critical security capabilities.[Footnote 23] The other 13 agencies have implemented most of the capabilities, but their progress in addressing the remaining capabilities has varied. For example, of those agencies that had not implemented all of the critical capabilities, six reported meeting no additional capabilities between April 2008 and September 2009. Table 2 describes access provider agencies' reported progress toward implementing the capabilities. Table 2: Number of Critical Security Capabilities Reported as Implemented by Access Provider Agencies: Agency: A; Capabilities reported as implemented in April 2008: 27; Capabilities reported as implemented in September 2009: 27; Change between April 2008 and September 2009: 0. Agency: B; Capabilities reported as implemented in April 2008: 32; Capabilities reported as implemented in September 2009: 32; Change between April 2008 and September 2009: 0. Agency: C; Capabilities reported as implemented in April 2008: 33; Capabilities reported as implemented in September 2009: 34; Change between April 2008 and September 2009: 1. Agency: D; Capabilities reported as implemented in April 2008: 33; Capabilities reported as implemented in September 2009: 35; Change between April 2008 and September 2009: 2. Agency: E; Capabilities reported as implemented in April 2008: 33; Capabilities reported as implemented in September 2009: 36; Change between April 2008 and September 2009: 3. Agency: F; Capabilities reported as implemented in April 2008: 34; Capabilities reported as implemented in September 2009: 38; Change between April 2008 and September 2009: 4. Agency: G; Capabilities reported as implemented in April 2008: 35; Capabilities reported as implemented in September 2009: 37; Change between April 2008 and September 2009: 2. Agency: H; Capabilities reported as implemented in April 2008: 37; Capabilities reported as implemented in September 2009: 37[A]; Change between April 2008 and September 2009: 0. Agency: I; Capabilities reported as implemented in April 2008: 37; Capabilities reported as implemented in September 2009: 38; Change between April 2008 and September 2009: 1. Agency: J; Capabilities reported as implemented in April 2008: 37; Capabilities reported as implemented in September 2009: 39; Change between April 2008 and September 2009: 2. Agency: K; Capabilities reported as implemented in April 2008: 38; Capabilities reported as implemented in September 2009: 38; Change between April 2008 and September 2009: 0. Agency: L; Capabilities reported as implemented in April 2008: 38; Capabilities reported as implemented in September 2009: 38; Change between April 2008 and September 2009: 0. Agency: M; Capabilities reported as implemented in April 2008: 38; Capabilities reported as implemented in September 2009: 40; Change between April 2008 and September 2009: 2. Agency: N; Capabilities reported as implemented in April 2008: 39; Capabilities reported as implemented in September 2009: 39; Change between April 2008 and September 2009: 0. Agency: O; Capabilities reported as implemented in April 2008: 40; Capabilities reported as implemented in September 2009: 40; Change between April 2008 and September 2009: N/A. Agency: P; Capabilities reported as implemented in April 2008: 40; Capabilities reported as implemented in September 2009: 40; Change between April 2008 and September 2009: N/A. Source: GAO analysis of agency-provided data. [A] At the time of our review, agency H had not submitted its September 2009 plan to DHS. This reported number is from an earlier plan that the agency provided to us. [End of table] Examples of the capabilities that agencies most frequently reported not having implemented included having secure facilities in place to handle classified information, being able to filter specific types of Internet traffic, and participating in the Einstein program. Between October 2008 and September 2009, agencies delayed their plans for implementing the critical security capabilities. Of the 13 access provider agencies that had not implemented all of the required capabilities as of September 2009, 6 agencies delayed their expected planned dates for implementing the remaining critical capabilities between approximately 10 months and 3 years. As of September 2009, nine of these agencies were reporting that they expected to complete implementation of the remaining critical security capabilities between September 2009 and December 2010, one expected to complete its efforts in December 2013, and three did not project a date by which they expected to complete implementation. Agencies Have Not Demonstrated Full Compliance with TIC Capabilities or Completed Consolidation Efforts: Agencies have not demonstrated full compliance with TIC capabilities. As of September 2009, DHS had conducted TIC Compliance Validation reviews at 6 of the 16 agencies in our review that are required to undergo a review, and the remaining 10 had been scheduled to be evaluated between October 2009 and May 2010.[Footnote 24] The results of the reviews indicated that information that agencies had reported was not always accurate. Specifically, although agencies had reported that certain capabilities were in place, the results for five of the six agencies that completed reviews indicated that several of these capabilities had not been fully implemented. For example, one agency's results showed that it had not fully implemented 10 critical capabilities, including 7 that it had previously reported as complete. In addition, the results for another agency showed that it had a large number of connections that it had not previously reported; the agency originally reported 119 connections, but after the review it identified 403 external connections. As indicated earlier, agencies are required to develop plans to address any shortcomings identified in the review and to submit their plans to DHS. Agencies Experienced Benefits and Lessons Learned in Implementing TIC, but Challenges Remain in Complying with Requirements: While the TIC initiative offers benefits to agencies, such as improved network security, agencies have been challenged in complying with the requirements of the initiative, in part because of shortcomings in communication by OMB and DHS. In addition, agencies' experiences in implementing TIC offers valuable lessons learned for OMB and DHS that may increase the likelihood of the initiative's success. Benefits in Improved Security and Network Management Are Anticipated: Although agencies are still in the process of implementing TIC, the initiative offers benefits to agencies. Improved Network Security. TIC will improve security at agencies by reducing the number of access points that have to be monitored. Several agencies indicated that consolidating connections and centralizing security monitoring at TIC access points should make it easier to monitor traffic and protect their networks from attacks. In addition, officials from another agency stated that the consolidation of external connections had made the agency's network perimeter more secure. Improved Network Management. The initiative has also helped improve agencies' management of their networks. Several agencies stated that implementing TIC by consolidating their external connections is beneficial because it has forced them to gain a greater awareness of their overall network environment. Another agency anticipated that TIC implementation would reduce complexity in its network, making it simpler to manage. Agencies Faced Challenges with Implementing TIC Requirements: Agencies continue to face challenges in implementing TIC, including implementing the initiative with incomplete information about the number of access points for which they have been approved and about the technical security capabilities. Further, DHS will continue to face challenges in knowing whether the access points are adequately secured. Implementing the initiative with incomplete information. Best practices for program management, established by the Project Management Institute in The Standard for Program Management,[Footnote 25] state that the information that program stakeholders need should be made available in a timely manner throughout the life cycle of a program. In addition, our Internal Control Management and Evaluation Tool [Footnote 26] states that when communicating with other agencies, managers should provide timely information that is relevant to the requester's needs. However, in some circumstances, agencies have been unable to effectively plan for implementing the initiative because OMB did not always consistently communicate the number of TIC access points for which agencies had been approved in a timely manner and DHS did not always promptly respond to agencies' questions about the required security capabilities. OMB did not consistently inform agencies about the number of TIC access points for which they had been approved until more than a year after it required agencies to submit their requested number. In a memo issued in September 2009,[Footnote 27] OMB announced that access provider agencies were each allowed two access points, 17 months after its April 2008 deadline for agencies to submit their requested number of trusted connections. However, between April 2008 and September 2009, OMB's communication of the number of access points it had approved for agencies was inconsistent. Specifically, * Several agencies told us that OMB, or DHS rather than OMB, verbally told them about the number of access points for which they had been approved but did not provide them with written confirmation of the approved number. * One agency said that it received an e-mail from DHS, as opposed to OMB, stating that its top two to three locations had been approved; however, officials from the agency indicated that the agency was not informed of the exact number of approved access points. * A few other agencies stated that OMB never informed them of the number of approved access points, either verbally or in writing. OMB addressed these shortcomings by issuing the memo in September 2009; however, any further inconsistencies in communication by OMB could cause additional challenges for agencies. In the memo, OMB also informed access provider agencies about the process for submitting an evidence-based rationale to DHS to request additional TIC access points. In this process, OMB is responsible for notifying agencies of its final decision on how many additional access points the agency is to be allowed. As described earlier, several agencies indicated that they planned to request additional access points. However, even with this process in place, agencies may still be uncertain about the number of access points for which they have been approved if prior inconsistencies in communication from OMB resurface. For example, although one agency's request for additional access points was sent to OMB in April 2009, as of December 2009 agency officials indicated that they not been told whether the agency's request had been approved. Without consistent and timely communication of the results of agency requests for additional access points by OMB, agencies that requested additional access points will continue to face challenges with implementation of TIC. In addition, DHS often did not promptly respond to agency questions about the technical aspects of securing TIC access points, further complicating agency implementation efforts. Although a few agencies that have asked DHS questions about the meaning of specific terms in the security capabilities or about guidance for implementation stated that DHS answered their questions effectively, four agencies stated that DHS has often been slow to respond to questions about the capabilities, or in some cases has not responded at all. Specifically, one agency noted that DHS took a year to produce answers to frequently asked questions that were generated in an inter-agency working group. Three other agencies told us that they still have not received answers to questions that they submitted to DHS on specific security capabilities such as data storage requirements, inspection of encrypted traffic, and participation in the Einstein program. DHS officials acknowledged that its communications with agencies had not been timely because it had limited staff at the beginning of the initiative. Without consistent and timely communication from OMB and DHS, agencies may not be able to effectively execute plans for consolidating their external connections and securing their TIC access points. Ensuring that critical capabilities have been implemented. DHS will be challenged to know whether access providers have adequately secured their access points because it does not directly test the capabilities in its compliance validation reviews. The National Institute of Standards and Technology state[Footnote 28]s that organizations should conduct assessments to determine the extent to which controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. During its reviews, DHS conducts document reviews, interviews, and observation of agency processes, but does not conduct direct testing of the capabilities to determine if they are effectively implemented, operating as intended, and achieving desired results. Even with this limited testing, five of the six reviews that DHS conducted showed that agencies had not fully implemented critical security capabilities that had previously been reported as implemented. However, without directly testing the capabilities, DHS could be unaware of additional weaknesses that its more limited reviews may not have identified. In addition, in at least three of the six reviews that it conducted at agencies, DHS did not evaluate all of the trusted connection locations. Specifically, in one agency's review, DHS evaluated only one of the agency's two security operations centers and one of its four TIC locations. According to DHS, the other center and three locations were not evaluated because the agency asserted that its other sites were identical to the ones evaluated. For another agency, DHS evaluated a security operations center and a telecommunications facility at the agency but did not examine controls at either of the agency's TIC access point locations. A third agency was only evaluated at one of its two TIC locations. DHS officials indicated that in designing the method for TIC compliance reviews, it was decided that the initial round of reviews would include only the most mature TIC locations and supporting network and operations centers. Without evaluating all agency locations in its compliance reviews, DHS cannot be assured that agencies have implemented critical capabilities at all locations. Defining Requirements and Effective Communication Offer Lessons Learned for OMB and DHS as the Initiative Moves Forward: Agencies' experiences in implementing TIC offer valuable lessons learned for OMB and DHS. Defining requirements clearly and early prove useful for agency planning. OMB and DHS did not always use sound program management principles when planning the TIC initiative. According to The Standard for Program Management, during the planning phase, program requirements should be developed before schedules are defined. However, OMB and DHS did not define certain fundamental requirements before establishing initial deadlines for the initiative. For example, DHS did not define the meaning of "external connection" until April 2009, 17 months after the initiative was announced and 10 months after the initial June 2008 deadline for reducing external connections to authorized levels. This resulted in DHS determining during a compliance validation review that one agency had not reported a number of external connections that needed to be consolidated. DHS officials acknowledged that this was due to confusion over the definition of what constituted an external connection. In addition, the technical security capabilities that would be required for access providers were still being defined when agencies developed their required initial implementation plans and were not finalized until April 2008, 5 months after the initiative was announced. As a result, several agencies stated that it was difficult for them to plan for TIC implementation. In going forward, defining any key future requirements prior to establishing deadlines will be critical to the initiative's success. Collaborative meetings aided implementation. DHS and OMB sponsored several collaborative meetings during the initiative that many agencies found beneficial for their implementation of TIC. Specifically, several agencies stated that the meetings of the inter- agency TIC technical working group were helpful. For example, one agency said that DHS provided updates about the initiative during the meetings. Another agency noted that the meetings provided additional specificity on aspects of the program. Several agencies also stated that the meetings provided a forum for agencies to discuss issues related to TIC with one another, allowing them to gain insight from other agencies. One of these agencies found the meetings to be helpful because it was able to provide feedback to DHS about the technical capabilities. Another agency noted that it had recently participated in conference calls with DHS that helped to address its technical questions related to implementing the critical capabilities. In the future, continuing such effective communication increases the chances of the initiative's success. Meeting business needs with a reduced number of connections is complex and time-consuming. As indicated earlier, the 16 access provider agencies in our review are reporting that they are reducing and consolidating from 3,286 external connections. Reducing to the approved total of 32 TIC access points is a complex and time-consuming effort for most agencies. For example, one agency indicated that implementing the infrastructure required to support its mission would require 4 years to complete. Two other agencies noted that implementing the initiative required them to make significant changes to their existing network architecture. In addition, for several agencies, determining how to meet their business needs within the technical constraints of TIC has been a complex task. For example, three agencies stated that they needed more than two TIC access points to ensure that their networks would remain operational in the event of a disaster. One of these agencies explained that its high performance and capacity requirements would not be met with only two access points. The complex effort required for agencies to implement the initiative while still meeting their business needs has led to significant delays in agencies' plans for implementation. As indicated earlier, the access provider agencies have reported that they have consolidated fewer connections than they originally planned and have significantly revised their future plans for consolidation. Recognizing that agencies may desire more than two access points, as noted earlier, OMB and DHS established a process for agencies to submit an evidence-based rationale for obtaining additional access points. DHS Has Deployed Einstein to Six Agencies, but Faces Challenges with Meeting Program Goals: Einstein is intended to provide DHS with an increased awareness of activity, including possible security incidents, on federal networks. As of September 2009, fewer than half of the 23 agencies had executed the required agreements with DHS, and Einstein 2 had been deployed to six agencies. Agencies that participated in Einstein 1 improved identification of incidents and mitigation of attacks, but DHS continues to face challenges with meeting the goals of the initiative. Einstein Is to Provide Increased Awareness of Activity on Agency Networks: The goal for Einstein is to provide US-CERT with a higher level of awareness of activity on federal networks. By implementing this initiative, DHS intended to achieve the following objectives: * provide an automated process for collecting, correlating, and analyzing computer network traffic information from participating federal agencies; * provide US-CERT with a means to observe potential malicious activity in computer network traffic entering and exiting participating agencies' computer networks; * increase US-CERT's situational awareness of federal agency computer networks through correlation of activity across the entire federal enterprise; and: * incorporate intrusion detection technology (i.e., the Einstein sensors and signature-monitoring capabilities) capable of alerting US- CERT to the presence of malicious or potentially harmful computer network activity in federal agencies' network traffic. DHS and Agencies Are Required to Take Various Actions before Einstein 2 Can Be Deployed: To accomplish these objectives, for Einstein 2, agencies are required to meet the following two requirements:[Footnote 29] * Execute a memorandum of agreement with DHS. This agreement establishes the responsibilities of deployment and operation of the sensor between the participating federal agency and DHS. * Execute a service level agreement with DHS. This agreement defines the roles, responsibilities, and points of contact, as well as describes the services, hours of operation, and performance levels provided to the agency. It also requires agencies to update US-CERT regularly on the status of ongoing investigations related to alerts. Agencies were required to report on the status of these agreements to DHS in September 2009. In addition, the TIC access provider agencies are required to meet two additional requirements: * Execute an interconnection security agreement with DHS. Describes the interconnection between the agency and DHS and the security controls required and implemented to protect the confidentiality, integrity, and availability of the systems and data. Agencies were required to report on their status in completing this agreement to DHS in September 2009. * Perform a site assessment. Provides a technical description of the agency's network and how the network connects to the agency's Internet service providers. Vendors that intend to provide TIC services to agencies under the Networx contract are also required to complete a memorandum of agreement, an interconnection security agreement, and a site assessment. With the required agreements in place,[Footnote 30] DHS is to deploy Einstein sensors to access provider agencies and Networx vendors. When deploying the sensors, DHS is to use a site deployment checklist to verify that the Einstein equipment is installed and configured appropriately. After the sensors are operational, US-CERT is to begin monitoring and analyzing results. Einstein 2 Has Been Deployed to Six Agencies, but DHS and Agencies Did Not Always Complete Required Activities: As of September 2009, DHS had deployed Einstein 2 at six access provider agencies included in our review and at three Networx vendors. According to DHS, the sensors at five of the six agencies were operational as of September 2009; it had not activated the sensors at one agency because it was waiting for the agency to complete required agreements. Agencies that had operational sensors had completed certain required agreements, but not all agencies had executed all required agreements. All five agencies with operational sensors had executed memorandums of agreement and interconnection security agreements with DHS as required. However, three of the five agencies had not executed service level agreements. According to DHS officials, these agencies were still in the process of negotiating the agreements. However, the agreements define key requirements for the initiative, including how US-CERT is to notify agencies of potential incidents and how agencies are to respond to these notifications, including what information must be provided to US-CERT in support of investigations related to Einstein alerts. Without these agreements in place between agencies and DHS, agencies may not receive the information needed to address security incidents detected by Einstein, and DHS may not obtain the information it needs from agencies in order to fully meet the objective of improving situational awareness. DHS and the agencies also did not always complete deployment checklists. Although all five of the agencies had performed required site assessments, the site deployment checklists for two agencies had not been signed by officials from the agency or from DHS verifying that the sensors had been installed and configured appropriately. As a result, DHS and agency management cannot be assured that the Einstein equipment has been installed and configured appropriately. Because these sensors had only recently been deployed, we did not evaluate the extent to which US-CERT was collecting and analyzing data and reporting alerts to agencies for Einstein 2. Not all of the remaining 17 agencies reported their status toward submitting required agreements to DHS in September 2009. Only a few have reported completing required agreements with DHS, while several have not yet reported their plans for submitting agreements.[Footnote 31] Specifically: * Four agencies reported that they had completed and submitted their memorandums of agreement to DHS, and 4 reported that they expected to submit them within a year; however, nine did not project a date by which they expected to submit them. * One agency reported that it had submitted its service level agreement to DHS, and 4 reported that they expected to submit them between December 2009 and September 2010; however, 12 did not project a date by which they expected to submit the agreement. * Two of the 10 remaining agencies required to execute interconnection security agreements[Footnote 32] reported that they had submitted them to DHS, and 1 reported that it expected to submit the agreement within the next year; however, 7 did not project a date by which they expected to submit the agreements. Although DHS required agencies to report their status toward executing required agreements in September 2009, it did not establish milestones for agencies to submit the agreements. According to The Standard for Program Management, the actual completion of program activities and milestones should be tracked against a planned timeline in order to ensure that the program produces its required deliverables on time. However, DHS had not established any milestones for agencies to submit these agreements. As indicated earlier, these agreements establish key responsibilities and controls that are necessary for successful operation of the sensors. Without establishing milestones for these agreements, DHS could face delays in deploying and activating Einstein sensors. Einstein Has Proven Beneficial to Providing Security, but DHS Faces Ongoing Challenges with Meeting Program Goals: Agencies have benefited from Einstein alerts, and their experiences have provided DHS with valuable lessons; however, DHS may be challenged in meeting program goals as the system is deployed at more agencies. Einstein Provided Security Benefits for Agencies: Although Einstein 2 has only been deployed at 6 agencies, the 12 agencies that participated in Einstein 1 realized benefits in the following areas: Identifying incidents. US-CERT provided alerts to agencies from its analysis of the data from the Einstein 1 sensors, which contained information about potential cyber attacks or incidents against the agency's networks. Several agencies observed that the alerts from US- CERT were helpful or contained useful information about potential incidents, including information that could be used to trace potential incidents to specific locations on the network. For some agencies, Einstein identified incidents that agencies' intrusion detection systems had not found, increasing their ability to mitigate potential attacks. Providing cross-agency view. For Einstein 1, US-CERT provided reports based on a correlation of sensor data from all of the participating agencies. Several agencies said US-CERT's ability to aggregate Einstein data from multiple agencies was beneficial for identifying potential attacks against government networks. Using sensor data. In addition to receiving alerts generated by US- CERT's analysis, agencies had the ability to access the sensor data directly via a Web portal. Several agencies indicated that they used this data to look for potential incidents on their own. DHS Faces Challenges with Meeting Einstein Goals and Providing Adequate Analysis: As DHS deploys Einstein across the government, it faces the following challenges: Understanding whether alerts are valid. Although one of the objectives of Einstein is to improve situational awareness of activity across the federal government, DHS will be challenged in understanding the extent to which this objective is being met because it lacks performance measures for Einstein 2 that address whether or not agencies report that the alerts represent actual incidents. For Einstein 1, agencies did not always inform US-CERT of how they responded to the alerts. As a result, US-CERT did not know whether these alerts represented false positives or actual incidents. We have previously reported that performance measures are most meaningful when they are linked with organizational goals.[Footnote 33] DHS's performance measures for Einstein 2 indicate the time required for the system to detect known cyber events and to generate automated notifications once the events are detected, but they do not indicate agencies' responses to alerts. Establishing such measures would help DHS better understand whether the alerts are valid, helping it to better determine the extent to which the initiative is meeting its objective of improving situational awareness. Having staff with required skills to monitor and analyze data. DHS will be challenged to have staff with the appropriate skills to fulfill its analysis and incident response mission as Einstein 2 is deployed across the government. As more agencies receive sensors, the amount of data that US-CERT will be responsible for analyzing will drastically increase. DHS recognizes that staff with appropriate analytical skills will be required in order to handle the increased workload, but it has not developed a staffing plan to address its need to acquire and retain qualified analysts at US-CERT. Although the department announced in October 2009 that it plans to hire up to 1,000 new cybersecurity professionals over the next 3 years, we previously reported in July 2008 that obtaining and retaining adequately trained cyber analysts is an ongoing challenge to US-CERT that hinders its ability to respond to increasingly fast, nimble, and sophisticated cyber attacks. At that time, we recommended that the department address the challenges that have impeded it from expeditiously hiring sufficiently trained cyber analysts and developing strategies for hiring and retaining highly qualified cyber analysts.[Footnote 34] Although DHS indicated that it plans to expedite the hiring and on- boarding process for new analysts and to offer appropriate training opportunities for its analysts, it has not yet provided evidence that it has taken these actions. Until DHS addresses our prior recommendation by developing strategies for hiring and retaining cyber analysts, US-CERT may lack staff with appropriate skills to analyze the Einstein data, increasing the risk that attacks against federal networks could go undetected. Additional Information from US-CERT Helped Agencies, Providing Valuable Lessons Learned: Agencies' experiences with the initial version of Einstein provided DHS with lessons learned for future versions of the initiative. Detailed and timely information from alerts proved useful. Several agencies' experiences with Einstein 1 improved over time because information provided by US-CERT increased in its timeliness and detail. Although some agencies said that the alerts and reports that US-CERT provided were not always timely and useful, a few agencies observed that the information had improved over time. For example, one agency stated that the alerts lacked sufficient contextual information, making it difficult to determine whether the alerts were identifying false positives or actual incidents; however, several agencies indicated that the alerts had since improved in their usefulness. In addition, although several agencies noted that the alerts were not very timely when the sensors were first installed, a few indicated that the timeliness had improved for more recent alerts. Going forward, continuing to provide appropriate and timely information from the alerts will prove useful for agencies. Access to sensor data proved useful for agencies. Further, several agencies that had direct access to the flow records from the Einstein sensor found that it was helpful in detecting potential incidents. DHS stated that all agencies participating in Einstein 2 will also have access to the flow data, which could provide similar benefits. However, not all agencies were aware that they would have access to this data. Making them aware of this and of the data's possible benefits could aid agencies in improving their monitoring of potential incidents. Conclusions: TIC and Einstein are ambitious efforts that can help improve security and situational awareness across the federal government. However, in implementing the initiatives, federal agencies have faced challenges. For TIC, OMB did not consistently communicate the number of access points for which agencies had been approved, and DHS did not always provide timely answers to agency questions about technical capabilities. In addition, because DHS does not conduct direct testing of the capabilities or evaluate all possible locations in its validation reviews, it cannot be assured that all critical capabilities have been implemented. For Einstein, the initiative could fail to fully meet the objective of increasing US-CERT's situational awareness because DHS did not always ensure that key agreements were executed with agencies. DHS could also be challenged in determining whether the initiative is meeting this objective without performance measures that indicate whether the alerts provided to agencies represent actual incidents. Without improvements in program management and communication from OMB and DHS, federal agencies will continue to be faced with challenges in implementing these initiatives that could ultimately jeopardize their ability to reduce and secure Internet connections. With agencies still in the process of implementing TIC and DHS in the early stages of deploying Einstein 2, the success of such large-scale initiatives will be in large part determined by the extent to which DHS, OMB, and other federal agencies work together to address the challenges of these efforts and to apply lessons learned during the initial stages of implementation. Although this will not guarantee the success of TIC and Einstein, doing so will enhance the chances that the initiatives will meet their goals of reducing, consolidating, and securing federal Internet connections. Recommendations for Executive Action: In order to ensure that federal agencies continue to have adequate information about the number of connections for which they have been approved, we recommend that the Director of OMB take the following two actions: * Communicate its final decisions on agency requests for additional TIC access points in a consistent and timely manner. * Assess the efficacy of, and take steps to apply as appropriate, the lesson learned during the initial implementation of TIC regarding the need to define future requirements before establishing deadlines. In addition, in order to further ensure that federal agencies have adequate, sufficient, and timely information to successfully meet the goals and objectives of the TIC and Einstein programs, we recommend that the Secretary of Homeland Security take the following six actions: * Provide agencies with timely responses to their questions seeking clarification on TIC security capabilities. * Enhance TIC compliance validations by including (1) direct testing and evaluation of the critical capabilities and (2) evaluation of the capabilities at all agency TIC locations. * Before activating Einstein sensors, ensure that both DHS and participating agencies (1) execute required service level agreements and (2) sign site deployment checklists. * Establish milestones for agencies to submit required Einstein agreements. * To better understand whether Einstein alerts are valid, develop additional performance measures that indicate how agencies respond to alerts. * Assess the efficacy of, and take steps to apply as appropriate, lessons learned during the initial implementation of these initiatives such as the need to (1) define future requirements for TIC before establishing deadlines and (2) make agencies aware of their ability to access Einstein flow data. Agency Comments and Our Evaluation: We provided a draft of this report to OMB and DHS for their review and comment. In providing e-mail comments on a draft of this report, the lead information technology policy analyst from OMB's Office of E- Government and Information Technology stated that OMB concurred with the report's findings, conclusions, and two recommendations addressed to OMB. In e-mail comments provided by an audit liaison from DHS's Office of Cybersecurity and Communications, DHS concurred with the six recommendations addressed to DHS. DHS also provided technical comments, which we have incorporated into this report as appropriate. We also provided a draft of this report to the 22 other agencies included in our review. Of the 22, 15 responded that they did not have any comments; 1 provided technical comments, which we addressed as appropriate; and 6 did not respond. As agreed with your office, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days after its date. At that time, we will send copies to interested congressional committees, secretaries of the Departments of Agriculture, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, Labor, State, Transportation, the Treasury, and Veterans Affairs; the Attorney General; the administrators of the Environmental Protection Agency, General Services Administration, National Aeronautics and Space Administration, Small Business Administration, and the U.S. Agency for International Development; the Chairman of the Nuclear Regulatory Commission; the Commissioner of the Social Security Administration; and the directors of the National Science Foundation, Office of Management and Budget, and Office of Personnel Management. The report also is available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions regarding this report, please contact me at (202) 512-6244 or at wilshuseng@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. Signed by: Gregory C. Wilshusen: Director, Information Security Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: The scope of our review covered two initiatives: Trusted Internet Connections (TIC) and the National Cybersecurity Protection System (NCPS) program, operationally known as Einstein. For each initiative, our objectives were to (1) identify their goals, objectives, and requirements; (2) determine the status of the actions federal agencies have taken, or plan to take, to implement them; and (3) identify the benefits, challenges, and lessons learned in implementing each initiative. For TIC, to address the first objective, we obtained and reviewed applicable policies and memorandums issued by the Office of Management and Budget (OMB) and guidance, reports, and other documentation provided by the Department of Homeland Security (DHS). We also held discussions with OMB and DHS representatives concerning the goals, objectives, and requirements of the initiative. To understand the options for agencies seeking to acquire TIC services through the Networx contract, we obtained and reviewed relevant documents regarding Networx and interviewed officials from the General Services Administration. To address the second objective for TIC, we reviewed statements of capability, plans of action and milestones, and other relevant documents for 23 of the 24 agencies[Footnote 35] listed in the Chief Financial Officers Act of 1990[Footnote 36] to determine if reporting requirements were met. We also reviewed these documents to determine reported progress toward the reduction and consolidation of external connections and implementation of critical capabilities and analyzed them to estimate the overall progress reported by agencies. We also reviewed documentation from DHS to determine whether agencies submitted the required documents. In addition, we reviewed the results of six TIC Compliance Validation reviews and interviewed officials from DHS to understand how the department assesses agencies' degree of compliance with TIC and to determine the extent to which the information reported in agency plans of action and milestones was accurate. To address the third objective for TIC, we interviewed officials from each agency, DHS, and OMB. In addition, we obtained written responses to follow-up questions from each agency. We also examined plans of action and milestones and other relevant documents from each agency and reviewed policies and guidance from OMB and DHS to identify any additional benefits, challenges, or lessons learned. Further, we interviewed officials from agency inspectors general to obtain information on any benefits, challenges, or lessons learned that they had identified related to the initiative. For Einstein, to address the first objective, we obtained and reviewed applicable policies, guidance, and other documentation provided by DHS. We also held discussions with DHS officials concerning the goals, objectives, and requirements of the initiative. To address the second objective for Einstein, we reviewed plans of action and milestones for each agency to determine whether reporting requirements were met. In addition, we examined required agreements and site assessments for the six agencies where Einstein 2 was deployed to verify their completion. We also interviewed officials and obtained written information from DHS and from each agency to obtain additional information on the status of implementation. To address the third objective for Einstein, we interviewed officials from DHS and from each agency. In addition, we obtained and reviewed written responses to follow-up questions from each agency. We also examined policies, guidance, and other documentation from DHS to identify any additional benefits, challenges, or lessons learned. Further, we interviewed officials from agency inspectors general to obtain information on any benefits, challenges, or lessons learned that they had identified related to the initiative. We conducted this performance audit from December 2008 to March 2010 in Washington, D.C., in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: GAO Contact and Staff Acknowledgments: GAO Contact: Gregory C. Wilshusen (202) 512-6244 or wilshuseng@gao.gov: Staff Acknowledgments: In addition to the individual named above, Jeffrey Knott (Assistant Director); John Bainbridge; William Cook; Kami Corbett; Neil Doherty; Rebecca Eyler; Nancy Glover; Valerie Hopkins; Lee McCracken; Zsaroq Powe; and Shawn Ward made key contributions to this report. [End of section] Footnotes: [1] Director of National Intelligence, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, statement before the Senate Select Committee on Intelligence (Feb. 12, 2009). [2] The Comprehensive National Cybersecurity Initiative consists of 12 projects intended to improve DHS's and other federal agencies' efforts to safeguard federal executive branch government information systems by reducing potential vulnerabilities, protecting against intrusion attempts, and anticipating future threats against the federal government's networks. [3] The 24 agencies subject to the act are the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, Justice, Labor, State, Transportation, the Treasury, and Veterans Affairs; the Environmental Protection Agency, General Services Administration, National Aeronautics and Space Administration, National Science Foundation, Nuclear Regulatory Commission, Office of Personnel Management, Small Business Administration, Social Security Administration, and U.S. Agency for International Development. [4] GAO, High-Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January 2009). [5] GAO, Information Security: Agencies Continue to Report Progress, but Need to Mitigate Persistent Weaknesses, [hyperlink, http://www.gao.gov/products/GAO-09-546] (Washington, D.C.: July 17, 2009). [6] The Federal Information Security Management Act was enacted as title III, E-Government Act of 2002, Pub L. No. 107-347, 116 Stat. 2899, 2946 (Dec. 17, 2002). [7] GAO, Information Security: Progress Reported, but Weaknesses at Federal Agencies Persist, [hyperlink, http://www.gao.gov/products/GAO-08-571T] (Washington, D.C.: Mar. 12, 2008). [8] GAO, Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative, [hyperlink, http://www.gao.gov/products/GAO-10-338] (Washington, D.C.: Feb. 1, 2010). [9] OMB, Implementation of Trusted Internet Connections (TIC), M-08-05 (Washington, D.C.: Nov. 20, 2007). [10] According to DHS officials, each authorized TIC access point may include one or more external connections. [11] Examples of connections that are not required to be routed through an approved TIC include (1) dedicated connections to agency remote offices that do not pass through the Internet, (2) connections made using technology that provides a secure communication mechanism for data transmitted across public networks (i.e., virtual private networks), and (3) connections with other agencies where both agencies have implemented TIC. [12] Although OMB originally designated 17 of the 23 agencies in our review as TIC access providers, one of these agencies has since chosen to seek service from another access provider. [13] According to DHS officials, in December of 2008, the Einstein program was incorporated into NCPS, a larger collection of systems that includes not only the Einstein sensors, but also other systems providing data correlation and analysis. [14] Established by DHS, the US-CERT serves as a focal point for the government's interaction with federal and nonfederal entities on a 24- hour-a-day, 7-day-a-week basis regarding cyber-related analysis, warning, information sharing, major incident response, and national- level recovery efforts. It is charged with aggregating and disseminating cybersecurity information to improve warning of and response to incidents, increasing coordination of response information, reducing vulnerabilities, and enhancing prevention and protection. In addition, US-CERT collects incident reports from all federal agencies and assists agencies in their incident response efforts. [15] Network flow records are records of communications made to an organization's IT systems. The records identify the source and destination Internet Protocol addresses used in the communication, the source and destination ports, the time the communication occurred, and the protocol used to communicate. [16] Signatures are recognizable, distinguishing patterns associated with cyber attacks, such as a binary string associated with a computer virus or a particular set of keystrokes used to gain unauthorized access to a system. [17] When the initiative was first announced in November 2007, OMB set a target number of 50 connections across the federal government. However, OMB officials have since stated that the target number is no longer applicable and that a new target has not been established. [18] OMB, Guidance for Trusted Internet Connection Statement of Capability Form (SOC), M-08-16 (Washington, D.C.: Apr. 4, 2008). [19] The seven agencies in our review that are seeking service from other providers were not authorized a specific number of access points. [20] As of September 2009, six access provider agencies were targeting more access points than the number for which they had been approved by OMB. [21] At the time of our review, one access provider agency had not submitted its September 2009 progress report to DHS; the status of its consolidation effort, reflected in the table, is based on its July 2009 progress report. [22] Seeking service agencies are not included in this figure. [23] The one multi-service access provider agency reported that it had implemented all of the 11 additional critical security capabilities required for multi-service access providers. [24] According to DHS officials, only one of the four participating Networx vendors had passed a review and could offer TIC services to agencies. [25] Project Management Institute, The Standard for Program Management, Second Edition (Newton Square, Pa.: 2008). [26] GAO, Internal Control Management and Evaluation Tool, [hyperlink, http://www.gao.gov/products/GAO-01-1008G] (Washington, D.C.: August 2001). [27] OMB, Update on the Trusted Internet Connections Initiative, M-09- 32 (Washington, D.C.: Sept. 17, 2009). [28] National Institute of Standards and Technology: Recommended Security Controls for Federal Information Systems, Special Publication 800-53 Revision 3 (Gaithersburg, Md.: December 2007). [29] For Einstein 1, DHS required participating agencies to complete a memorandum of agreement, interconnection security agreement, and a site assessment before receiving a sensor. [30] Although agencies are required to complete a service level agreement, DHS officials stated that it is not necessary for it to be completed before the Einstein sensors are deployed. [31] One access provider agency did not submit its updated plan to DHS in September 2009. [32] The seven agencies seeking service from other access providers are not required to execute interconnection security agreements. [33] GAO, Information Security: Concerted Effort Needed to Improve Federal Performance Measures, [hyperlink, http://www.gao.gov/products/GAO-09-617] (Washington, D.C.: Sept. 14, 2009). [34] GAO, Cyber Analysis and Warning: DHS Faces Challenges in Establishing a Comprehensive National Capability, [hyperlink, http://www.gao.gov/products/GAO-08-588] (Washington, D.C.: July 31, 2008). [35] The Department of Defense was not included in our review because it was not required to implement TIC or Einstein. [36] 31 U.S.C. §901(b). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.