Information Security

Selected Departments Need to Address Challenges in Implementing Statutory Requirements Gao ID: GAO-07-528 August 31, 2007

The Federal Information Security Management Act of 2002 (FISMA) strengthened security requirements by, among other things, requiring federal agencies to establish programs to provide cost-effective security for information and information systems. In overseeing FISMA implementation, the Office of Management and Budget (OMB) has established supporting processes and reporting requirements. However, 4 years into implementation of the act, agencies have not yet fully implemented key provisions. In this context, GAO determined what challenges or obstacles inhibit the implementation of the information security provisions of FISMA at the Departments of Defense, Homeland Security, Justice, and State. To do this, GAO reviewed and analyzed department policies, procedures, and reports related to department information security programs and interviewed agency officials.

Defense, Homeland Security, Justice, and State face challenges in implementing key information security control activities required by FISMA and by OMB in its oversight role. These activities include creating and maintaining an inventory of major systems, implementing common security configurations, ensuring that staff receive information security training, testing and evaluating controls, taking remedial actions where deficiencies are found, and certifying and accrediting systems for operation. The four departments were challenged in several of these areas. For example, Defense is challenged in developing a complete FISMA inventory of systems because it has different definitions of what constitutes a "system." As another example, Homeland Security reported that the tool it uses to report security training counts each course taken, instead of tracking that an individual has taken a specialized course. As a result, the department lacks assurance that all users have received appropriate training. Until the departments address their challenges and fully implement effective departmentwide information security programs, increased risk exists that they will not be able to effectively protect the confidentiality, integrity, and availability of their information and information systems.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-07-528, Information Security: Selected Departments Need to Address Challenges in Implementing Statutory Requirements This is the accessible text file for GAO report number GAO-07-528 entitled 'Information Security: Selected Departments Need to Address Challenges in Implementing Statutory Requirements' which was released on October 1, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Ranking Member, Committee on Oversight and Government Reform, House of Representatives: United States Government Accountability Office: GAO: August 2007: Information Security: Selected Departments Need to Address Challenges in Implementing Statutory Requirements: FISMA Implementation Challenges: GAO-07-528: GAO Highlights: Highlights of GAO-07-528, a report to the Ranking Member, Committee on Oversight and Government Reform, House of Representatives. Why GAO Did This Study: The Federal Information Security Management Act of 2002 (FISMA) strengthened security requirements by, among other things, requiring federal agencies to establish programs to provide cost-effective security for information and information systems. In overseeing FISMA implementation, the Office of Management and Budget (OMB) has established supporting processes and reporting requirements. However, 4 years into implementation of the act, agencies have not yet fully implemented key provisions. In this context, GAO determined what challenges or obstacles inhibit the implementation of the information security provisions of FISMA at the Departments of Defense, Homeland Security, Justice, and State. To do this, GAO reviewed and analyzed department policies, procedures, and reports related to department information security programs and interviewed agency officials. What GAO Found: Defense, Homeland Security, Justice, and State face challenges in implementing key information security control activities required by FISMA and by OMB in its oversight role. These activities include * creating and maintaining an inventory of major systems, * implementing common security configurations, * ensuring that staff receive information security training, * testing and evaluating controls, * taking remedial actions where deficiencies are found, and * certifying and accrediting systems for operation. As shown in the table below, the four departments were challenged in several of these areas. For example, Defense is challenged in developing a complete FISMA inventory of systems because it has different definitions of what constitutes a ’system.“ As another example, Homeland Security reported that the tool it uses to report security training counts each course taken, instead of tracking that an individual has taken a specialized course. As a result, the department lacks assurance that all users have received appropriate training. Until the departments address their challenges and fully implement effective departmentwide information security programs, increased risk exists that they will not be able to effectively protect the confidentiality, integrity, and availability of their information and information systems. Table: Security Requirements That Challenge Selected Departments: Requirement: Inventory of major systems; Defense: X; Homeland Security: [Empty]; Justice: [Empty]; State: X. Requirement: Enforcing system configuration policies; Defense: X; Homeland Security: X; Justice: X; State: [Empty]. Requirement: Information security training; Defense: X; Homeland Security: X; Justice: [Empty]; State: X. Requirement: Testing and evaluation of controls; Defense: X; Homeland Security: X; Justice: X; State: X. Requirement: Remedial actions; Defense: X; Homeland Security: X; Justice: X; State: X. Requirement: Certification and accreditation of systems; Defense: X; Homeland Security: X; Justice: [Empty]; State: X. Source: GAO. [End of table] What GAO Recommends: GAO is making recommendations to assist the four departments in addressing the challenges they face in implementing FISMA requirements for information security programs. Homeland Security, Justice, and State generally agreed with the recommendations. However, Defense did not agree with three of GAO‘s six recommendations. GAO continues to stand by its recommendations. [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-528]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Gregory C. Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Departments Face Challenges in Implementing FISMA Requirements: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objective, Scope, and Methodology: Appendix II: Comments from the Department of Defense: Appendix III: Comments from the Department of Homeland Security: Appendix IV: Comments from the Department of Justice: Appendix V: Comments from the Department of State: Appendix VI: GAO Contact and Staff Acknowledgments: Tables: Table 1: Security Requirements That Challenge Selected Departments: Table 2: Weaknesses in Implementation of Common Security Configurations for Fiscal Year 2006: Table 3: Weaknesses in Policies of Selected Departments, by Security Control Testing Element: Table 4: Percentage of Systems Tested by Selected Department of Defense Components: Table 5: Percentage of Systems Tested by Selected Homeland Security Components: Table 6: Percentage of Systems Tested by Selected State Department Bureaus: Table 7: Challenges Departments Face in Developing Remediation Policies: Table 8: Status of System Certification and Accreditation at the Four Departments: Figure: Figure 1: Percentage of Systems for Which Security Controls Have Been Tested and Evaluated in Fiscal Years 2003-2006: Abbreviations: CIO: chief information officer: FISMA: Federal Information Security Management Act of 2002: IG: inspectors general: IT: information technology: NIST National Institute of Standards and Technology: OMB: Office of Management and Budget: United States Government Accountability Office: Washington, DC 20548: August 31, 2007: The Honorable Tom Davis Ranking Member Committee on Oversight and Government Reform House of Representatives: Dear Mr. Davis: The Federal Information Security Management Act of 2002 (FISMA) strengthened security requirements by, among other things, requiring departments to establish agencywide programs to provide cost-effective security for information and information systems. Information security is a critical consideration for any organization that depends on information systems and networks to carry out its mission or business. It is especially important for federal departments where maintaining the public trust is essential. In this context, our objective in this report was to determine the challenges or obstacles that inhibit the implementation of the information security provisions of FISMA at the Departments of Defense, Homeland Security, Justice, and State. To achieve our objective, we analyzed various department policies and procedures and examined agency and inspectors general (IG) reports related to their information security programs. We also interviewed information security program officials from each department and selected component agencies of the departments. We performed our work in Washington, D.C., from July 2006 through May 2007 in accordance with generally accepted government auditing standards. See appendix I for additional details on our objective, scope, and methodology. Results in Brief: Defense, Homeland Security, Justice, and State face challenges in implementing key information security control activities required by FISMA and the Office of Management and Budget (OMB) to establish an effective departmentwide information security program. These activities include creating and maintaining an inventory of major systems, implementing common security configurations, ensuring that staff receives information security training, testing and evaluating controls, taking remedial actions where deficiencies are found, and certifying and accrediting systems for operation. The challenges in implementing these FISMA activities at the four departments include the following: * Defense and State do not have complete and accurate system inventories as verified by their IGs. * Although each of the four departments has established a departmentwide policy for common security configurations, only State reported successfully implementing its security configurations for all system platforms. * None of the four departments has trained all of its personnel as required by FISMA. * Although these departments reported progress in the percentage of systems in which security controls were tested, guidance for developing plans of action and milestones to address deficiencies uncovered by testing was not sufficient, and processes were not established to carry out such plans consistently. In addition, components of Defense, Homeland Security, and State show wide variations in their reported accomplishment of security controls testing. * Of the four departments, only Justice has achieved full certification and accreditation of its information systems. The reasons for these challenges vary. For example, Defense is challenged in developing a complete FISMA inventory of systems because its components have different definitions of what constitutes a "system." As another example, Homeland Security reported that the tool it uses to report training counts each course taken, instead of tracking that an individual has taken a specialized course. As a result, the department lacks assurance that all users have received appropriate training. Until the departments address their challenges and fully implement effective departmentwide information security programs, they may not be able to effectively protect the confidentiality, integrity, and availability of their information and information systems. We are making recommendations to the Secretaries of Defense, Homeland Security, and State, as well as the U.S. Attorney General, to assist these departments in addressing the challenges in six areas, including agency information security training programs and department-level remediation processes. We obtained written comments on a draft of this report from Defense, Homeland Security, Justice, and State; these comments are reproduced in appendixes II to V, respectively. Homeland Security, Justice, and State generally agreed with all recommendations. Defense generally agreed with two of our recommendations and partially concurred with one, but it disagreed with the remaining three recommendations. Specifically, Defense did not agree with our recommendation to develop and implement a departmentwide definition of a major information system that is accepted by the Defense IG. Defense said that it already has a standard definition for FISMA reporting. However, although Defense does have such a definition, its own guidance, as we discuss in our report, provides at least two definitions of a system. This forces the components, and the Defense IG, to make independent interpretations of what should be included in the inventory for FISMA reporting purposes, leading to inconsistent results. In addition, Defense did not agree with our recommendation to complete the development of the departmentwide remediation process and finalize the remediation guidance; however, Defense commented that the interim guidance, discussed in our report, will be finalized in September 2007. Lastly, Defense did not agree with our recommendation to ensure that all information systems receive a full authorization to operate and to improve the department's certification and accreditation process. Although interim authorizations to operate represent some level of accepting risk, we believe that without a full authorization to operate there is an increased risk to the department's operations. We continue to believe that all of our recommendations have merit. In addition, Defense and State commented that the report findings did not fully illustrate their perspective on implementing FISMA activities, such as the department's efforts and progress, or external challenges. Throughout our report, where appropriate, we acknowledge the progress made by the departments; however, each continues to face individual challenges to implementing an effective and robust information security program. Background: Federal agencies rely extensively on computerized information systems and electronic data to carry out their missions. The security of these systems and data is essential to prevent data tampering, disruptions in critical operations, fraud, and inappropriate disclosure of sensitive information. Protecting federal computer systems and the systems that support critical infrastructures has never been more important, owing to the ease of obtaining and using hacking tools, the steady advances in the sophistication and effectiveness of attack technology, and the emergence of new and more destructive attacks. Without proper safeguards, there is enormous risk that individuals and groups with malicious intent may intrude into inadequately protected systems and use this access to obtain sensitive information, commit fraud, disrupt operations, or launch attacks against other computer systems and networks. Federal Law and Policy Establish Federal Information Security Requirements: Enacted into law on December 17, 2002, as Title III of the E-Government Act of 2002, FISMA authorized and strengthened information security program, evaluation, and reporting requirements. It assigns specific responsibilities to agency heads, chief information officers (CIO), and IGs. It also assigns OMB and the National Institute of Standards and Technology (NIST) with responsibilities with regard to oversight and guidance. Among other things, OMB is responsible for overseeing agency information security policies and practices, including developing and overseeing guidance on information security and overseeing compliance. NIST is tasked with developing standards and guidance for implementation of FISMA requirements by federal agencies. However, 4 years into the implementation of FISMA, many agencies continue to exhibit weaknesses in carrying out the act's requirements. Overall, FISMA requires each agency to develop, document, and implement an agencywide information security program. This program should provide security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source. Among the key activities and responsibilities associated with implementing this program are the following: * Development, maintenance, and annual update of an inventory of major information systems (including major national security systems) that are operated by the agency or are under its control. * Risk-based policies and procedures that cost-effectively reduce information security risks to an acceptable level and ensure that information security is addressed throughout the life cycle of each information system, including through compliance with minimally acceptable system configuration requirements. * Security awareness training for agency personnel, including contractors and other users of information systems that support the operations and assets of the agency, and training for personnel with significant responsibilities for information security. * Periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices, performed with a frequency depending on risk, but not less than annually, and that includes testing of management, operational, and technical controls for every system identified in the agency's required inventory of major information systems. * A process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of the agency. In addition, as part of its responsibilities for overseeing the establishment of agency information security programs in accordance with FISMA, OMB requires that systems be certified and accredited, a process by which senior agency officials certify that the risk level of information systems is acceptable and that the systems are approved for operation. Because these key activities are interdependent, weaknesses in one activity challenge the effective accomplishment of other FISMA activities. For example, a complete and accurate system inventory provides a basis for tracking FISMA compliance and for testing the effectiveness of security controls for all systems and their components--necessary to assess system risk. The inventory and risk assessments in turn feed an agency's strategy for managing risk and maintaining departmental risk-based policies and procedures. Similarly, effectively training personnel strengthens an agency's ability to properly and consistently implement required security controls and to maintain an effective program over time. To help ensure that agencies are accountable for meeting the act's requirements, FISMA requires each agency to annually report to OMB, selected congressional committees, and the Comptroller General of the United States on the adequacy of information security policies, procedures, and practices and on compliance with requirements. Agency heads are required to annually report the results of their independent evaluations to OMB. Departments Face Challenges in Implementing FISMA Requirements: Defense, Homeland Security, Justice, and State face challenges in implementing key information security control activities required by FISMA and OMB, as shown in table 1. Table 1: Security Requirements That Challenge Selected Departments: Requirement: Inventory of major systems; Defense: X; Homeland Security: [Empty]; Justice: [Empty]; State: X. Requirement: Enforcing system configuration policies; Defense: X; Homeland Security: X; Justice: X; State: [Empty]. Requirement: Information security training; Defense: X; Homeland Security: X; Justice: [Empty]; State: X. Requirement: Testing and evaluation of controls; Defense: X; Homeland Security: X; Justice: X; State: X. Requirement: Remedial actions; Defense: X; Homeland Security: X; Justice: X; State: X. Requirement: Certification and accreditation of systems; Defense: X; Homeland Security: X; Justice: [Empty]; State: X. Source: GAO. [End of table] The reasons that the departments are challenged in these areas vary. For example, some departments attribute weaknesses to limitations in the tools and processes they use to perform certain activities (such as training and remedial actions). Until the departments address these challenges and fully implement an effective departmentwide information security program, they increase the risk that they may not effectively protect the confidentiality, integrity, and availability of their information and information systems. Identifying an Inventory of Major Information Systems Presents a Challenge for Two of the Four Departments: FISMA and OMB guidance require each agency to develop, maintain, and annually update an inventory of major information systems[Footnote 1] that are operated by the department or that are under its control. For each system, OMB requires agencies to use their inventories to support information resource management, including monitoring, testing, and evaluation of information security controls. Of the four departments, Homeland Security and Justice reported having complete system inventories. OMB has announced in its FY 2006 Report to Congress on Implementation of The Federal Information Security Management Act of 2002 that Justice's automated tool will be available to other federal agencies under the information system security line of business. However, Defense and State have not developed accurate and complete FISMA inventories. Since 2004, the IG at Defense has reported that the department does not have a complete and accurate inventory of its major information systems. A contributing factor to this incomplete inventory is that Defense does not have a common definition of an information system. As noted in guidance that the department issued in 2006, Defense policies have at least two definitions of a system, neither of which provides consistent criteria for what should be entered into a FISMA inventory.[Footnote 2] The 2006 guidance provides a third set of criteria and states that the two policy definitions should act only as a starting point. However, Defense components must make independent interpretations of whether the asset under evaluation should be reported as a system for FISMA purposes, and the varied interpretations create discrepancies in the inventory. For example, Department of the Navy officials stated that not having a common definition of what is an information technology (IT) system makes it virtually impossible to distinguish between a system and its constituent subsystems/ applications versus a family of systems and constituent systems. Without establishing and enforcing the use of one common definition, Defense cannot implement consistent inventory management practices across its components. State has developed a definition of a major information system for the purposes of its inventory; however, there is disagreement with its IG regarding how to apply the definition to individual IT assets--either separately or as part of a consolidated system. In 2006, State's IG found Web applications that State officials had not included separately in their FISMA inventory. Because of time limitations, the IG was unable to determine whether other IT assets were missing from the inventory and rejected the entire FISMA inventory maintained by State. State now has an effort under way to resolve this challenge and identify all Web applications for inclusion in the inventory. If this effort results in agreement with State's IG, it could help the department in obtaining independent verification of its system inventory. Three of the Four Departments Are Challenged in Implementing Common Security Configurations for All Systems: FISMA requires that agency information security programs include risk- based policies and procedures that ensure that information security is addressed throughout the life cycle of each information system, including through compliance with minimally acceptable system configuration requirements. According to the NIST guidance for implementing configuration management requirements, the policies for baseline system configurations provide information about the makeup of a particular system component (e.g., the standard software load for a workstation or notebook computer, including updated patch information). In addition, the system configuration settings are the adjustable parameters of these components that enforce the agency security policy consistent with operational requirements.[Footnote 3] According to the fiscal year 2006 CIO FISMA reports, all four departments reported that they had established a departmentwide policy for common security configurations. However, as detailed in table 2, only State reported successfully implementing its common configuration policy on all system platforms. State attributes its success to the development and implementation of a strong configuration management compliance program known as "Evaluation and Verification." According to State, the program conducts remote scans to confirm whether State systems are operating as intended, in accordance with mandatory security configuration requirements. The program also helps provide the CIO with an additional level of assurance by identifying known security vulnerabilities within State systems and applications. However, Defense, Homeland Security, and Justice reported inconsistent implementation of common secure configuration policies across departmental systems. Table 2: Weaknesses in Implementation of Common Security Configurations for Fiscal Year 2006: Product: Windows XP Professional; Defense: [Empty]; Homeland Security: [Empty]; Justice: [Empty]; State: [Empty]. Product: Windows NT; Defense: X; Homeland Security: X; Justice: X; State: [Empty]. Product: Windows 2000 Professional; Defense: [Empty]; Homeland Security: X; Justice: [Empty]; State: [Empty]. Product: Windows 2000 Server; Defense: [Empty]; Homeland Security: X; Justice: X; State: [Empty]. Product: Windows 2003 Server; Defense: [Empty]; Homeland Security: [Empty]; Justice: [Empty]; State: [Empty]. Product: Solaris; Defense: [Empty]; Homeland Security: [Empty]; Justice: [Empty]; State: N/A. Product: HP-UX; Defense: X; Homeland Security: X; Justice: X; State: N/ A. Product: Linux; Defense: X; Homeland Security: X; Justice: [Empty]; State: [Empty]. Product: Cisco Router IOS; Defense: [Empty]; Homeland Security: [Empty]; Justice: [Empty]; State: [Empty]. Product: Oracle; Defense: [Empty]; Homeland Security: X; Justice: X; State: [Empty]. Legend: X = Agency reported that 95 percent or fewer of the systems running this software are in compliance with its configuration policy; empty cells indicate that the agency was compliant with the configuration policy for 96 to 100 percent of the systems running this software. N/A = Agency does not operate this software. Source: Agency CIO FISMA reports for fiscal year 2006. [End of table] Without consistent implementation of common security configurations across systems, these departments increase the risk that their systems will have avoidable security vulnerabilities. Three Departments Face Challenges in Identifying Personnel Needing Training: FISMA mandates that all federal employees and contractors who use department information systems be provided with periodic training in information security awareness and accepted information security practices. FISMA also requires agencies to provide appropriate training on information security to personnel who have significant security responsibilities. This training, described in NIST guidance,[Footnote 4] should inform personnel, including contractors and other users of information systems supporting the operations and assets of an agency, of information security risks associated with their activities and of the roles and responsibilities of personnel to properly and effectively implement the controls required by policies and procedures that are designed to reduce these risks. Although the four departments reported that they have implemented training for the majority of their personnel, three departments face individual challenges, as follows: * Defense officials reported that the department's components have not been able to document and track whether their 2.3 million users (who are distributed worldwide) have received the required awareness training. For example, the Department of the Army is currently unable to ensure that users who access its IT systems have taken the required awareness training. To overcome this obstacle, the Army has identified a need for a componentwide tool that will ensure that only users who have taken the required training are permitted to access its systems. In addition, Defense officials stated that several of its components have difficulty in identifying and tracking all employees who have significant IT security responsibilities. For example, U.S. Air Force officials stated that it is challenging to identify these personnel when they are not within an IT functional area, and the Defense Information Systems Agency stated that it is difficult to track information security training requirements for contractors because of the lack of a central personnel database. In fiscal year 2006, Defense issued a training and workforce improvement manual to provide instructions to components to account for and track training of all IT security personnel, even in the absence of a central personnel database. Such a manual, if properly implemented, could help Defense ensure that all personnel receive appropriate security training. However, until Defense implements a mechanism to track training of personnel, it will be unable to verify that personnel are effectively trained in their information security roles and responsibilities. * Homeland Security has not been able to ensure that employees who have significant IT security responsibilities receive specialized training. Specifically, the Homeland Security IG reported that the department has not yet established a program to train all individuals who have significant IT security responsibilities. Furthermore, in fiscal year 2006, the IG reported that Homeland Security did not ensure that employees with these responsibilities had completed the required training in the department's process for validating the annual FISMA metrics. In addition, the department reported that it was unable to accurately report on the percentage of employees who have received specialized training because its reporting tool counts each course taken, instead of tracking that an individual has taken a specialized course. As a result, it could not be assured that all users had completed required training. Homeland Security has efforts under way to implement a centralized Web-based learning management system that will track the completion of security training. Until such a system is properly implemented, the department is unable to identify personnel who have not completed required training. * State has not been able to verify that all employees and contractors have received required annual awareness training. The State IG reported that the department was unable to determine the total number of users who are required to complete the annual awareness training because of duplicate entries in State's database that generates the number of users. Without adequate controls to ensure the accuracy of training information, the department cannot confirm that all personnel who require awareness training have actually completed the training. Departments Have Weaknesses in the Testing and Evaluation of Their Information Security Programs: FISMA requires that department information security programs include periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices. This testing is to be performed with a frequency that depends on risk, but no less than annually. It is to include testing of management, operational, and technical controls for every information system identified in the FISMA- required inventory of major systems. Furthermore, a review of each system is essential to determine the program's effectiveness. However, as we explained in a prior report, the depth and breadth of such system reviews are flexible and depend on several factors, such as (1) the potential risk and magnitude of harm to the system or data, (2) the relative comprehensiveness of the last year's review, and (3) the adequacy and successful implementation of the plan of action and milestones for weaknesses in the system.[Footnote 5] Each of the four departments reported progress in increasing the percentage of systems for which reviews were performed and security controls tested (see fig. 1). Figure 1: Percentage of Systems for Which Security Controls Have Been Tested and Evaluated in Fiscal Years 2003-2006: [See PDF for image] Source: GAO analysis of agency-reported data. [End of figure] However, the departments have not demonstrated adequate and effective monitoring and evaluation of information security controls. In previous work, we showed that guidance for performing such assessments at these departments was not sufficient, and that the departments have not adequately and effectively implemented policies for periodically testing and evaluating information security controls.[Footnote 6] We reported that the policies for the 24 Chief Financial Officer's Act agencies for periodically testing and evaluating security controls did not fully address elements included in OMB and NIST guidelines and standards for performing effective security testing and evaluations. In particular, we reported that Defense, Homeland Security, Justice, and State had not established adequate instructions for determining the depth and breadth of periodic tests. Table 3 indicates weaknesses in developing and promulgating documented policies to address the security elements needed for effective testing. Table 3: Weaknesses in Policies of Selected Departments, by Security Control Testing Element: Department: Defense; Security controls testing element: Identify the frequency of periodic testing: [Empty]; Security controls testing element: Define roles and responsibilities: X; Security controls testing element: Provide instructions for selecting minimum security controls evaluated during periodic testing: X; Security controls testing element: Specify the identification and testing of common security controls: X; Security controls testing element: Provide instructions on determining the depth and breath of testing: X; Security controls testing element: Describe a process for documenting weaknesses in remediation plans: X. Department: Homeland Security; Security controls testing element: Identify the frequency of periodic testing: [Empty]; Security controls testing element: Define roles and responsibilities: X; Security controls testing element: Provide instructions for selecting minimum security controls evaluated during periodic testing: [Empty]; Security controls testing element: Specify the identification and testing of common security controls: X; Security controls testing element: Provide instructions on determining the depth and breath of testing: X; Security controls testing element: Describe a process for documenting weaknesses in remediation plans: [Empty]. Department: Justice; Security controls testing element: Identify the frequency of periodic testing: [Empty]; Security controls testing element: Define roles and responsibilities: [Empty]; Security controls testing element: Provide instructions for selecting minimum security controls evaluated during periodic testing: X; Security controls testing element: Specify the identification and testing of common security controls: X; Security controls testing element: Provide instructions on determining the depth and breath of testing: X; Security controls testing element: Describe a process for documenting weaknesses in remediation plans: [Empty]. Department: State; Security controls testing element: Identify the frequency of periodic testing: X; Security controls testing element: Define roles and responsibilities: X; Security controls testing element: Provide instructions for selecting minimum security controls evaluated during periodic testing: [Empty]; Security controls testing element: Specify the identification and testing of common security controls: X; Security controls testing element: Provide instructions on determining the depth and breath of testing: X; Security controls testing element: Describe a process for documenting weaknesses in remediation plans: [Empty]. Legend: X = weakness: Source: GAO analysis of department policies (as of February 2006). [End of table] Ensuring that departmental policies are sufficient to address federal standards and guidelines helps to ensure their effective implementation in meeting FISMA requirements for testing and evaluation. Until these departments address the weaknesses in their policies, departments may not be able to overcome the weaknesses in the corresponding security control activities required by FISMA. In addition, the departments reported that security control testing was not performed consistently across all components in three of the four departments. Justice was the only department to report that all of its components successfully completed the required annual security control and contingency plan testing on all their systems. This success was achieved through the department's efforts to establish and maintain a system inventory and to manage departmentwide risks. In contrast, Defense, Homeland Security, and State reported inconsistent testing of security controls and contingency plans among their components. As shown in tables 4 to 6, components of Defense, Homeland Security, and State reported widely varying percentages of systems tested. For example, at Homeland Security, the percentages for contingency plan testing ranged from 39 to 97 percent. Table 4: Percentage of Systems Tested by Selected Department of Defense Components: Component: Air Force; Security control testing: 82%; Contingency plan testing: 79%. Component: Army/Army Corps of Engineers; Security control testing: 86; Contingency plan testing: 86. Component: Defense Information Systems Agency; Security control testing: 93; Contingency plan testing: 88. Component: Navy/Marine Corps; Security control testing: 91; Contingency plan testing: 90. Source: GAO analysis based on 2006 Defense FISMA report data. [End of table] Table 5: Percentage of Systems Tested by Selected Homeland Security Components: Component: Coast Guard; Security control testing: 98%; Contingency plan testing: 45%. Component: Customs and Immigration Service; Security control testing: 77; Contingency plan testing: 78. Component: Federal Emergency Management Agency; Security control testing: 94; Contingency plan testing: 68. Component: Immigration and Customs Enforcement; Security control testing: 83; Contingency plan testing: 39. Component: Transportation Security Administration; Security control testing: 94; Contingency plan testing: 97. Source: GAO analysis based on 2006 Homeland Security FISMA report data. [End of table] Table 6: Percentage of Systems Tested by Selected State Department Bureaus: Component: Diplomatic Security; Security control testing: 8%; Contingency plan testing: 71%. Component: Information Resource Management; Security control testing: 34; Contingency plan testing: 72. Source: GAO analysis based on 2006 State FISMA report data. [End of table] Without consistent security testing across all components, a department lacks assurance that it is maintaining adequate information security departmentwide. Departments Have Weaknesses in Processes for Developing Remediation Plans: In addition to periodically evaluating the effectiveness of security policies and controls, acting to address any identified weaknesses is a fundamental activity that allows an organization to manage its information security risks cost-effectively, rather than reacting to individual problems only after a violation has been detected or an audit finding has been reported. FISMA directs agencies to establish a process for remediating identified weaknesses in their information security policies and procedures. When weaknesses are identified, agencies are required to follow OMB and NIST guidance for developing and maintaining a plan of action and milestones. NIST Special Publication 800-37 states that remediation plans need to be updated to address weaknesses identified as a result of periodic testing. Key to an effective remediation plan is the accurate and complete inclusion of weaknesses identified during periodic testing. Remediation plans (also referred to as plans of action and milestones) should list all identified weaknesses and show estimated resource needs or other challenges to resolving them, key milestones and completion dates, and the status of corrective actions. In their fiscal year 2006 FISMA reports, the IGs at all four departments reported that the departments did not consistently use the remediation plan process to manage the correction of their information security actions. Specifically, the four departments had not fully ensured (1) that significant IT security weaknesses are addressed in a timely manner and receive appropriate resources or (2) that when an IT security weakness is identified, program officials develop, implement, and manage plans of action and milestones for their systems. Table 7 lists the challenges identified by the four departments and IGs regarding why they struggle to effectively handle deficiencies in information security policies, procedures, and practices. Table 7: Challenges Departments Face in Developing Remediation Policies: Department: Defense; Challenges: * Ensuring its guidance aligns with NIST guidance; * Aggregating data across components; * Ensuring plans of action and milestones are developed and followed up; * Developing an effective tool for its remediation process. Department: Homeland Security; Challenges: * Ensuring consistent implementation of its remediation process tool across components; * Locating and tracking the information that is contained within its remediation tracking tool; * Fixing or decommissioning the antiquated systems or systems not in use. Department: Justice; Challenges: * Ensuring data are accurate and complete for sensitive but unclassified systems; * Validating data in its remediation system; * Removing redundant plans of action and milestones from its database. Department: State; Challenges: * Monitoring and validating entries included in its remediation tracking tool. Source: GAO analysis of agency-reported data. [End of table] Although the four departments have control monitoring and weakness remediation processes in place, each department faces barriers to effectively incorporating these processes into their departmentwide information security programs: * Defense officials reported that the size of the department has made it difficult to overcome its challenges in developing remediation plans. However, Defense is in the process of developing a departmentwide remediation process, but the process has not been completed and promulgated in final form. Interim guidance has been issued, and the Defense CIO stated that more time is needed to coordinate staffing to complete the final remediation guidance. Without complete guidance and an established departmentwide process, Defense cannot be assured that identified security weaknesses have been tracked and corrected. * At Homeland Security, component agencies view the departmentwide FISMA reporting tool as more of a hindrance than a help for tracking their weaknesses, so use of the tool is inconsistent across component agencies. However, the department headquarters disagrees with the components on the usefulness of the tool. Unless the department can achieve user acceptance of this tool, it will be challenged to establish a consistent departmentwide remediation process. * At Justice, the transition from an earlier NIST control framework to that in the most recent guidance[Footnote 7] resulted in duplicate versions of plans of action and milestones (one for each framework). According to Justice officials, the department's tool for tracking these plans does not permit easy reconciliation of these redundancies because there is no automated process in place to do so. As a result, the department is challenged in accurately tracking information security weaknesses. Without such accurate tracking, the department has little assurance that security weaknesses are being addressed appropriately. * In September 2006, State's IG stated that the department has not yet verified that IT security findings and recommendations from external and internal reviews are being addressed and resolved as part of the remediation process. The department is aware of the need to have all data in its tracking tool--including weaknesses reportable via the remediation process--monitored and validated on a regular basis. To address this issue in fiscal year 2007, the senior agency information security officer plans to use a "system vulnerability checklist" to ensure that system owners are aware of the weaknesses and plan to remediate them in a timely manner according to the set milestones. If properly implemented, such a process could help to ensure that identified security weaknesses have been tracked and corrected. Certification and Accreditation Processes Show Weaknesses at Three Departments: OMB has established a certification and accreditation process for federal agencies that supports the establishment of the information security programs required by FISMA. This process requires various activities, including assessing system risk, documenting security controls in place and planned, testing controls in place, and analyzing test results.[Footnote 8] Such a process provides a basis on which a senior agency official decides whether or not to approve system operation. Requiring such approvals from senior officials helps to ensure that risk is considered in the context of departmentwide mission operations. However, as seen in table 8, three of the four departments reported that not all systems in their inventory are fully certified and accredited, and two of the four departments' IGs rated their respective department's certification and accreditation process as "poor." Only Justice overcame its challenges of prior years and achieved success in this activity. Table 8: Status of System Certification and Accreditation at the Four Departments: Department: Defense; Agency-reported percentage of systems certified and accredited in fiscal year 2006: 81%; IG fiscal year 2006 assessment of agency certification and accreditation process: Poor. Department: Homeland Security; Agency-reported percentage of systems certified and accredited in fiscal year 2006: 85; IG fiscal year 2006 assessment of agency certification and accreditation process: Satisfactory. Department: Justice; Agency-reported percentage of systems certified and accredited in fiscal year 2006: 100; IG fiscal year 2006 assessment of agency certification and accreditation process: Good. Department: State; Agency-reported percentage of systems certified and accredited in fiscal year 2006: 91; IG fiscal year 2006 assessment of agency certification and accreditation process: Poor. Sources: Agency-and IG-reported data. [End of table] According to Defense officials, the reason for the low percentage reported is that many of these systems received interim authority to operate, which is not reflected in the reported numbers.[Footnote 9] Defense considers such interim authorities appropriate for certain systems, such as legacy systems and battlefield systems. However, systems without a full authorization to operate are an increased risk to agencywide operations, contributing to the overall risk to the agency. In fiscal years 2005 and 2006, the Homeland Security IG reported that the data contained in the department's tracking tool used for monitoring the certification and accreditation process were often either incomplete or insufficient. In addition, in Homeland Security's effort to produce complete certification and accreditation documentation to satisfy federal requirements, the department's IG judged that the quality of work performed and documented did not meet applicable criteria. The IG has made recommendations to improve the quality of all certification and accreditation documents. In September 2006, the State IG reported that the department's bureaus performed certification and accreditation of their respective systems, and that two components (Information Resource Management and Diplomatic Security) also performed certification and accreditation on both applications and systems. The IG believed that the certification and accreditation process was fragmented and did not enable the department to adequately verify that all potential vulnerabilities are being addressed. The IG recommended that the CIO assign one entity the responsibility to manage the certification and accreditation process. Accordingly, the department now has an effort under way to address the inconsistencies in its certification and accreditation process, which has received positive feedback from internal stakeholders. Although we have not evaluated the new process, if it is implemented consistently across the department, it could reduce potential risks to the department's information systems. Conclusions: Defense, Homeland Security, Justice, and State face challenges in implementing key information security control activities required by FISMA and OMB, which include maintaining complete and accurate system inventories, implementing common security configurations for all system platforms, training personnel, establishing and consistently implementing complete policies and processes for testing security controls, and fully certifying and accrediting information systems. The challenges in implementing these requirements arose from various weaknesses, including inadequate tools and gaps or inconsistencies in guidance. These departments recognize the need to improve their implementation processes and have begun various steps to do so. For example, State is addressing the inconsistencies with its certification and accreditation process, and Defense is in the process of developing a departmentwide remediation process. Until each department improves its performance of key FISMA activities, the likelihood of fully implementing an effective information security program is diminished. Recommendations for Executive Action: To assist the Departments of Defense, Homeland Security, Justice, and State in addressing challenges to implementing FISMA requirements, we are making the following 15 recommendations. We recommend that the Secretary of Defense direct the Department of Defense's CIO to take the following six actions: * Develop and implement a plan with milestones to finalize and implement a departmentwide definition of a major information system that is accepted by the Defense IG. * Develop and implement a plan with milestones to achieve full implementation of common security configurations across all system platforms. * Develop and implement a plan with milestones to implement a mechanism to track information security training of personnel (i.e., security awareness and specialized training). * Address the weaknesses in security control testing policies as described in this report, and ensure that components complete required annual security control and contingency plan testing on all systems. * Complete development of the departmentwide remediation process and finalize the remediation guidance. * Develop and implement a plan with milestones to ensure that all information systems receive a full authorization to operate, and to improve the department's certification and accreditation process. We recommend that the Secretary of Homeland Security direct the Department of Homeland Security's CIO to take the following four actions: * Develop and implement a plan with milestones to achieve full implementation of common security configurations across all system platforms. * Coordinate with Homeland Security's Office of Human Capital to finalize implementation of the centralized Web-based learning management system for tracking the information security training of personnel. * Address the weaknesses in security control testing policies as described in this report, and ensure that components complete required annual security control and contingency plan testing on all systems. * Determine whether the department's FISMA reporting tool meets the requirements of different users, such as those at components, and take any necessary corrective action. We recommend that the Attorney General direct the Department of Justice's CIO to take the following three actions: * Develop and implement a plan with milestones to achieve full implementation of common security configurations across all system platforms. * Address the weaknesses in security control testing policies as described in this report. * Reconcile redundancies in the department's remediation plan tracking tool. Finally, we recommend that the Secretary of State direct State's CIO to take the following two actions: * Improve mechanisms for tracking information security awareness training of personnel. * Address the weaknesses in security control testing policies as described in this report, and ensure that components complete required annual security control and contingency plan testing on all systems. Agency Comments and Our Evaluation: We received written comments on a draft of this report from Defense's Deputy Assistant Secretary of Defense Information and Identity Assurance (reproduced in app. II), from the Director of Homeland Security's Departmental GAO/OIG Liaison Office (reproduced in app. III), from Justice's Assistant Attorney General for Administration (reproduced in app. IV), and from State's Assistant Secretary for Resource Management and Chief Financial Officer (reproduced in app. V). In these comments, officials from Homeland Security, Justice, and State generally agreed with our recommendations to their respective departments, and stated that they had implemented or were in the process of implementing them. Defense generally agreed with two recommendations, partially agreed with a third, and did not agree with the other three. All four departments provided technical comments, which we have incorporated as appropriate. In its comments, Defense did not concur with our recommendation to develop and implement a departmentwide definition of a major information system that is accepted by the Defense IG. Defense stated that it has a standard definition for FISMA reporting and has informed the Defense IG that it will continue to use the definition in the annual data call. While Defense does have a definition of a major information system specified in its annual IT repository guidance, as we discuss in our report, Defense's own guidance provides at least two definitions of a system. This forces the components, and the Defense IG, to make independent interpretations of what should be included in the inventory for FISMA reporting purposes, leading to inconsistent results. Thus, we continue to believe our recommendation has merit. Defense partially concurred with our recommendation to achieve full implementation of common security configurations across all system platforms, noting that it was spearheading a federal initiative and that the policy is planned for implementation by February 2008. Defense concurred in principle with our recommendation to implement a mechanism to track information security training of personnel and stated that the department has already initiated actions to complete the recommendation. Defense also concurred in principle with our recommendation to address the weaknesses in security control testing policies and ensure that components complete required security control and contingency plan testing for all systems. Defense did not concur with our recommendation to complete the development of the departmentwide remediation process and finalize the remediation guidance. However, officials commented that the interim guidance, discussed in our report, will be finalized in September 2007. Defense also did not concur with our recommendation to ensure that all information systems receive a full authorization to operate and to improve the department's certification and accreditation process. Defense stated that it believes an interim authorization to operate represents a sound risk management practice and balances operational requirements with acceptable risk, while further noting that its combined interim and full authorizations to operate total 91.9 percent of Defense systems. Although interim authorizations to operate represent some level of accepting risk, we believe that without a full authorization to operate, there is an increased risk to the department's operations and continue to believe our recommendation has merit. In addition, Defense stated that the report does not accurately reflect the current security posture of the department and the progress it has made in implementing the provisions of FISMA. Throughout our report, where appropriate, we acknowledge the progress made by the department in implementing the provisions of FISMA and have deleted certain outdated information contained in the draft report. Nonetheless, Defense still faces challenges in individual areas of FISMA as noted in our report. In its comments, Homeland Security noted that the report does not provide common solutions that could be applied to large agencies across the federal government. Our review was not governmentwide in scope; rather, it was limited to challenges faced by Defense, Homeland Security, Justice, and State. Accordingly, our recommendations are addressed individually to these four departments. State also provided several comments related to the contents of our report. First, the department did not agree with the report's implication that the issues associated with the recommendations serve as challenges or obstacles that inhibit the implementation of FISMA. Rather, State characterizes them as weaknesses that are receiving the proper attention. We believe that the issues identified in our report are appropriately characterized as the challenges State faces with regard to verifying whether all of its employees received the required FISMA security awareness training and with regard to certifying and accrediting its systems. Our report also discusses the progress State has made in these two areas. Second, in response to the recommendation to improve mechanisms for tracking information security awareness training of all personnel, State asserted that the report declared that it is unable to identify all of its employees. However, our report does not make this claim; instead, we note that State has not been able to verify that all of its employees and contractors have received the required training. Finally, State also noted in its comments that prior GAO reports and testimonies discussed the lack of a common IG reporting framework and that current FISMA reporting does not take full account of an agency's ability to detect, respond to, and react to cyber security threats and manage vulnerabilities. While State officials told us that these issues inhibit the department from implementing the provisions of FISMA, we emphasize that despite external factors, which may influence measurement or perception of an agency's performance, the department still controlled the internal processes that effectively execute all of the information security program activities required by FISMA, which constituted the scope of this report. These issues were addressed, as noted by State in its comments, on a governmentwide basis in other GAO reports and testimonies that had a broader scope. As we agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution of it until 30 days from the date of this letter. At that time, we will send copies of this report to interested congressional committees; the Secretaries of Defense, Homeland Security, and State; and the U.S. Attorney General. We will also make copies available to others on request. In addition, this report will be available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. If you have any questions regarding this report, please contact me at (202) 512-6244 or by e-mail at wilshuseng@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix VI. Sincerely yours, Signed by: Gregory C. Wilshusen: Director, Information Security Issues: [End of section] Appendix I: Objective, Scope, and Methodology: Our objective was to determine the challenges or obstacles that inhibit the implementation of the information security provisions of the Federal Information Security Management Act of 2002 (FISMA) at the Departments of Defense, Homeland Security, Justice, and State. To do this, we reviewed and analyzed FISMA (Public Law 107-347) and mapped these requirements to (1) National Institute of Standards and Technology (NIST) guidelines and (2) Office of Management and Budget (OMB) reporting requirements. We also reviewed and analyzed relevant NIST special publications and federal information processing standards that were created and modified due to FISMA, as well as guidance and reports issued by OMB. For example, we reviewed and analyzed its Fiscal Year 2005 Report to Congress on Implementation of The Federal Information Security Management Act of 2002 and OMB Circular A-130, Management of Federal Information Resources. In addition, we reviewed our previous information security work. We also interviewed individuals from OMB's Office of Information and Regulatory Affairs and Office of General Counsel and interviewed officials from the NIST Computer Security Division to discuss their FISMA implementation project work as mandated by FISMA. We also reviewed and analyzed chief information officer (CIO) and inspectors general FISMA reports for fiscal years 2003 through 2006 at Defense, Homeland Security, Justice, and State. In addition, we reviewed and analyzed various plans, policies, and procedures at the four departments. These included strategic plans, risk management policies, and budget documentation. We also held structured interviews with individuals who had FISMA implementation as their primary responsibility at each department and at selected department components. Specifically, at Defense we interviewed individuals from the Office of the Secretary of Defense as well as three Defense service components--the Departments of the Army and Navy, and the U.S. Air Force--and individuals from the Defense Information Systems Agency. At Homeland Security, we interviewed officials within the Office of the CIO as well as from the U.S. Coast Guard, Federal Emergency Management Agency, U.S. Citizenship and Immigration Services, Transportation Security Administration, and U.S. Immigration and Customs Enforcement. At Justice, we interviewed officials within the Bureau of Alcohol, Tobacco, Firearms and Explosives; the Justice Management Division; the Federal Bureau of Investigation; the Executive Office of United States Attorneys; and the Drug Enforcement Administration. At State, we interviewed officials of the Office of the Chief Information Officer, the Office of Foreign Missions, the Bureau of Diplomatic Security, and the Bureau of Information Resources Management. Finally, we met with the Office of the Inspector General at each of the four departments to discuss what challenges its department has encountered in implementing FISMA. Our work was conducted in Washington, D.C., from July 2006 through May 2007. All work was performed in accordance with generally accepted government auditing standards. [End of section] Appendix II: Comments from the Department of Defense: Department Of Defense: 6000 Defense Pentagon: Washington DC 20301-6000: August 1, 2007: Mr. Gregory C. Wilshusen: Director, Information Security Issues: U.S. Government Accountability Office: 441 G Street, N.W., Washington, DC 20548: Subject: Department of Defense (DoD) Response to the GAO Draft Report 07-528, "Information Security: Selected Agencies Need to Address Challenges in Implementing Statutory Requirements" dated June 29, 2007 (GAO Code 310578) The Department of Defense (DoD) appreciates the opportunity to comment on draft GAO Report GAO-07-528, " Information Security: Selected Agencies Need to Address Challenges in Implementing Statutory Requirements". In general, this office does not believe the draft report accurately reflects the current security posture of the Department of Defense nor does it consider initiatives undertaken and progress the Department has made in implementing the provisions of the Federal Information Security Management Act (FISMA) of 2002 over the last five years. Specific comments on the six recommendations in the draft report are provided in the attachment. The Primary Action Officer is Mr. John Hunter, 703 602-9927, (DSN) 332- 9927, john.hunter@osd.mil or john.hunter@osd.smil.mil. Signed by: Robert F. Lentz: Deputy Assistant Secretary of Defense: Attachment: As stated: GAO Draft Report Dated June 29, 2007: GAO-07-528 (GAO CODE 310578): "Information Security: Selected Agencies Need To Address Challenges In Implementing Statutory Requirements": Department Of Defense Comments To The Gao Recommendations Recommendation 1: The GAO recommends that the Secretary of Defense direct the Department of Defense's Chief Information Officer (CIO), to develop and implement a plan with milestones to finalize and implement a departmentwide definition of a major information system that is accepted by the Defense Inspector General. (p. 23/GAO Draft Report): DoD Response: Nonconcur. The DoD CIO position is that a standard definition of a DoD information system appropriate for FISMA reporting purposes is provided in DoD 8500.1, "Information Assurance," dated October 24, 2002. The definition was provided to the GAO as a DoD input to this review. The DoD IG has been informed of this position and understands that the DoD CIO will continue to use this definition in its annual FISMA data call. Recommendation 2: The GAO recommends that the Secretary of Defense direct the Department of Defense's CIO, to develop and implement a plan with milestones to achieve full implementation of common security configurations across all system platforms. (p. 23/GAO Draft Report): DoD Response: Partially concur. While the Department has issued extensive standard configuration guidance, the FY06 DoD FISMA Report showed that 80-95% of the Windows NT, HP-UX, and Linux system platforms fully meet the configuration guidance, as reported by the DoD Components. This is short of the 96% plus goal and the Department will develop a plan with milestones to achieve full implementation of common security configuration on all platforms. The GAO Report erroneously indicated weakness in Windows XP Professional Systems when, in fact, this most significant and commonly-deployed product has 96 to 100 percent implementation of common security configurations, as reported by the DoD Components. Also, DoD is spearheading the Federal initiative to implement a single security configuration for Windows XP and Vista, which begins in the acquisitions phase of the Systems Development Life Cycle. The policy implementation is planned for completion by February 2008, when the related directive from The Office of Management and Budget (OMB) goes into effect, mandating government agencies and military branches conform to this security configuration. Recommendation 3: The GAO recommends that the Secretary of Defense direct the Department of Defense's CIO, to develop and implement a plan with milestones to implement a mechanism to track information security training of personnel (i.e., security awareness and specialized training. (p. 24/GAO Draft Report): DoD Response: Concur-in-principle. DoD Directive 8570.1, "Information Assurance Training, Certification and Workforce Management, " (Aug 15, 2004) and its implementing manual DoD8570.01-M, "Information Assurance Workforce Improvement Program," (Dec 19, 2005) mandate tracking of specialized IA training and annual security awareness training. The Department has already initiated actions to complete this GAO Recommendation. The Under Secretary of Defense for Personnel and Readiness (USD(P&R)) is in the process of developing the requirements that will provide OSD visibility into the status of the Department's workforce, including IA awareness training and specialized security training for DoD personnel performing IA functions. USD(P&R) is working with the appropriate agencies to support the development of solutions to address populating/storing/information security training data of DoD IA personnel and to generate DoD management information systems reports. In addition, as reported in the DoD FY06 FISMA Report and per DoD policy and the GAO survey interviews with NII, DISA, and the Services, each of these components has, or in the process of, implementing a tracking mechanism to document the required awareness and specialized training. USD(P&R) also is in the process of determining requirements for a Civilian DoD Enterprise Learning Management System (LMS) solution for Defense Agencies and Field Activities that currently may not have an automated mechanism to capture and report on the status of personnel training and awareness. The statement in the GAO Report on page 12 that "Defense officials reported that the department's components have not been able to document and track whether their 2.3 million users (who are distributed worldwide) have received the required awareness training" is somewhat misleading since the named organizations, which account for the vast majority of DoD personnel, reported that 88% of personnel with IT system access received the required training. Recommendation 4: The GAO recommends that the Secretary of Defense direct the Department of Defense's CIO, to address the weaknesses in security control testing policies as described in this report, and ensure that components complete required annual security control and contingency plan testing on all systems. (p. 24/GAO Draft Report): DoD Response: Concur-in-principle. DoD does agree that all components must complete the required annual security control and contingency plan testing for all systems in accordance with DoD policy. DoD does not concur with the GAO statement that ".the Department of Defense's CIO address the weaknesses in security control testing policies as described in this report." In fact, the Department has distributed Department-wide policies and guidance (DoDI 8500.2, FY06 and FY07 FISMA Guidance) describing the security controls and contingency plan testing process and the periodicity by which these controls are to be tested. The Department does not concur with the GAO Report, page 15, statement, "However, the departments have not demonstrated adequate and effective monitoring and evaluation of information security controls." Based on the metrics reported on the FY06 FISMA Report and the above policies and guidance, the DoD CIO believes that we have met the requirement of the FISMA Legislation and this GAO Recommendation. DoD made significant progress, as reported in the DoD FY06 Annual FISMA Report, with more than 30 DoD Components exceeding 80% rates of security control and contingency plan testing. This translates to 1,664 additional systems tested this year. The Department also does not concur with the GAO Report, page 16, statement, "In particular, Defense, Homeland Security, Justice, and State had not established adequate instructions for determining the depth and breadth of periodic tests." The DoD CIO believes the guidance and policies referenced above fully satisfy this issue. Recommendation 5: The GAO recommends that the Secretary of Defense direct the Department of Defense's CIO, to complete development of the department wide remediation process and finalize the remediation guidance. (p. 24/GAO Draft Report): DoD Response: Nonconcur. Interim Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) Guidance, issued on July 6, 2006, provides specific remediation process guidance. This mandatory guidance includes a requirement for the DoD Components to develop and manage an IT security Plan of Action and Milestone process to prioritize and track IT security remediation efforts. The interim guidance will be incorporated into DoD Instruction that should be issued in September 2007. Recommendation 6: The GAO recommends that the Secretary of Defense direct the Department of Defense's CIO, to develop and implement a plan with milestones to ensure that all information systems receive a full authorization to operate and improve the department's certification and accreditation process. (p. 24/GAO Draft Report): DoD Response: Nonconcur. The Department believes that an Interim Authorization to Operate (IATO) represents a sound risk management practice that balances operational requirements with acceptable risk. For example, some mission critical systems must always be operational. An IATO accreditation decision must specify an Authorization Termination Date (ATD) within 180 days of the authorization date, and a Designated Accrediting Authority (DAA) may not grant consecutive IATOs totaling more than 360 days. With mandated time constraints on IATOs, they typically receive ATO or denial of continued operation within a year, thus minimizing risk while allowing required support to critical mission operations. As of today, the combined ATO/IATO percentage of DoD information systems is 91.9 percent. The DoD CIO takes exception to the use of dated statistics in the GAO Report, page 21, statement, "A review by Defense IG determined that 50 of 171 (29 percent) of the IT investments.were not fully certified and accredited or contained incomplete answers", (putting them on the OMB watch list). This is a 2005 statistic and misrepresents the current status of investments. DoD has improved from having 50 of 171 Exhibit 300s being on the OMB watch list for budget year 2006, to 3 of 76 for budget year 2007, and 1 of 59 for budget year 2008. As indicated in the response to Recommendation 5 above, the Department released Interim Department of Defense (DoD) Certification and Accreditation (C&A) Process Guidance on July 6, 2006. This rapidly evolving process is streamlining the implementation and reporting of enterprise-wide C&A processes. DoD is in process of coordinating the DIACAP with the DoD IG. [End of section] Appendix III Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: July 27, 2007: Mr. Gregory C. Wilshusen: Director, Information Security Issues: U.S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Mr. Wilshusen, Thank you for the opportunity to review and comment on the U.S. Government Accountability Office (GAO's) draft report GAO-07-528 entitled; Information Security, Selected Agencies Need to Address Challenges in Implementing Statutory Requirements. While DHS fully participated in GAO's data call "Review of Obstacles for Implementing FISMA," we believe the recommendations directed to the agencies did not provide the Committee on Oversight and Government Reform with common solutions which could be applied to large agencies across the federal government. DHS Response Draft Report Recommendations: DHS Recommendation 1: Develop and implement a plan with milestones to achieve full implementation of common security configurations across all system platforms. Response: Concur. In its Fiscal Year 2008 Information Security Performance Plan, DHS will provide a plan with milestones to support compliance monitoring of common DHS security configurations across all COTS system platforms starting in FY09. Funding has been requested in the CIO's FY09 information security budget to support this requirement. DHS Recommendation 2: Finalize implementation of the centralized Web- based learning management system for tracking the information security training of personnel. Response: Concur. The DHS implementation of a centralized Web-based Learning Management System (LMS), as a common enterprise solution, is the responsibility of the DHS Office of Human Capital. The DHScovery - LMS, will track courses that have been taken by DHS employees, becoming the training system of record for government employees. The office of the Chief Information Security Officer is targeting DHScovery to track awareness training at Headquarters in FY08 and for all DHS Components by FY10. The DHS IT Security Training Office is in the process of identifying specialized role based training requirements and outlining recommended course content. DHS Recommendation 3: Address the weaknesses in security control testing policies as described in this report, and ensure that components complete required annual security control and contingency plan testing on all systems. Response: Concur. As described in the report, DHS will update Certification and Accreditation guidance to clarify the depth and breath of periodic testing to include: * Frequency of Periodic Testing. * Instructions for Selecting Minimum Security Controls evaluated During Periodic Testing. DHS Recommendation 4: Determine whether the department's remediation tool meets the requirements of different users, such as those at components, and take any necessary corrective action. Response: Concur. Since 2004, DHS has regularly held Security Application Working Group (SAWG) meetings. This meeting, open to all components, regularly addresses working level tool implementation issues. DHS continues to tailor our tools and reporting to serve Component users. At the DHS Security Conference in August 2007 a survey will be handed out at all POA&M training sessions to request user recommendations for improvements. DHS will review any feedback and recommendations for further corrective actions. Thank you again for the opportunity to comment on the draft report. Sincerely, Signed by: Steven J. Pecinovsky: Director: Departmental GAO/OIG Liaison Office: Attachment A: DHS Comment Form – GAO-07-528 Draft Report: [End of section] Appendix IV Comments from the Department of Justice: U.S. Department of Justice: August 2, 2007: Washington, D.C. 20530: Mr. Gregory C. Wilshusen: Director, Information Security Issues: Government Accountability Office: Washington, D.C. 20548: Dear Mr. Wilshusen: Thank you for the opportunity to review the final draft of the Government Accountability Office (GAO) report entitled "Information Security: Selected Agencies Need to Address Challenges in Implementing Statutory Requirements, GAO-07-528." This draft report was reviewed by the Department of Justice (the Department) components that participated in the review. This letter constitutes the Department's formal comments. I request that the GAO include this letter in the final report. The Department's technical comments were provided under separate cover. Since the start of the review, the Department has completed several of the recommendations that pertained to the Department and continues to make significant progress on the remaining recommendations. This year the Department was pleased to receive a Federal Computer Security Grade of A- from the office of the Honorable Tom Davis. Although we have made progress in implementing the Federal Information Security Management Act (FISMA) during the past several years, we do recognize weaknesses in our information technology (IT) systems where security can be improved. The Department's Chief Information Officer and Chief Information Security Officer remain committed to ensuring IT security is fully integrated within our systems and the Department successfully implements all the requirements of FISMA. If you have any questions, please contact Mr. Richard Theis, Audit Liaison Group, on (202) 514-0469 or Richard.P.Theis@usdoj.gov. Sincerely, Signed by: Lee J. Lofthus: Assistant Attorney General for Administration: [End of section] Appendix V: Comments from the Department of State: United States Department of State: Assistant Secretary for Resource Management: and Chief Financial Officer: Ms. Jacquelyn Williams-Bridgers: Managing Director: International Affairs and Trade: Government Accountability Office: 441 G Street, N.W.: Washington, D.C. 20548-0001: Washington, D.C. 20520: July 30, 2007: Dear Ms. Williams-Bridgers: We appreciate the opportunity to review your draft report, "Information Security: Selected Agencies Need to Address Challenges in Implementing Statutory Requirements," GAO Job Code 310578. The enclosed Department of State comments are provided for incorporation with this letter as an appendix to the final report. If you have any questions concerning this response, please contact Jason Kerben, Senior Analyst, Bureau of Information Resource Management, Office of Information Assurance at (703) 812-2378. Sincerely, Signed by: Bradford R. Higgins: cc: GAO – Gregory Wilshusen: IRM – James Van Derhoff: State/OIG – Mark Duda: Department of State Comments on GAO Draft Report: Information Security: Selected Agencies Need to Address Challenges in Implementing Statutory Requirements (GAO-07-528, GAO Code 310578): Thank you for the opportunity to review the draft report "Information Security: Selected Agencies Need to Address challenges in Implementing Statutory Requirements." In this draft report, the Government Accountability Office's (GAO) objective was to determine the challenges or obstacles that inhibit the implementation of the information security provisions of FISMA at the Departments of Defense, Homeland Security, Justice and State. GAO's draft report includes two recommendations for the Department of State regarding mechanisms for tracking security awareness training and reported weakness associated with security control testing policies. As explained below, the Department agrees with the substance of GAO's recommendations and is in the process of effectively addressing them. We would note, however, the Department does not agree with the report's implication that the issues associated with the recommendations serve as challenges or obstacles that inhibit the implementation of the information security provisions of FISMA. Rather, we characterize these to be weaknesses, which merit and are receiving the proper attention. As an initial matter, the Department would like to highlight two particular areas not currently identified in the draft GAO report, but that have been identified in previous applicable GAO reports and findings. We believe these two areas are significant challenges or obstacles inhibiting the Department from implementing the information security provisions of FISMA, and respectfully request they be included in the final report. First, the absence of a common/standardized Inspector General reporting framework hinders the Department in its efforts to implement FISMA requirements. As we reported on numerous occasions throughout the GAO review, we find the lack of a common framework for the IG's annual reviews an obstacle because of inconsistent interpretations. Prior GAO reports in April 2005[Footnote 10], July 2005[Footnote 11], and June 2007[Footnote 12] have identified the lack of a common Inspector General reporting framework as a deficiency of the FISMA evaluation process. Second, the current FISMA reporting and evaluation framework does not take full account of an agency's ability to detect, respond to and react to cyber security threats and manage vulnerabilities. For example, the Department of State's Bureau of Diplomatic Security (DS) provides an interdependent array of security services including continuous network monitoring, countermeasures, counter intelligence, threat analysis, and physical and technical security programs, related to a separate mandate to protect life, information and property around the world. As we reported throughout the GAO review process, the absence of recognition of these efforts misrepresents and undervalues the intended purpose of FISMA. Prior GAO reports in April 2005 and June 2007 have likewise identified the lack of reporting on incident response metrics as a shortcoming in the FISMA evaluation process. Accordingly, we urge that the final GAO report identify the need for both a common framework for Inspector General evaluations and greater recognition of operational security measures as valuable and necessary elements of the FISMA evaluation process. Turning to the GAO draft report's two recommendations for the Department of State, the Department agrees in substance with the recommendations. First, the GAO draft report recommends that the Department improve mechanisms for tracking information security awareness and training of personnel, and declares that "State has not been able to identify all employees and contractors who are required to receive the annual awareness training." As reported to the GAO throughout the interview process, the Department has identified all employees and contractors who are to receive the annual awareness training. Department employees and contractors who access the Department's information systems and fail to complete the annual awareness training in a timely manner are denied access to the Department's information systems and face other disciplinary sanctions. In a complementary fashion, the Department ensures Department employees and contractors who do not access the Department's information systems receive an awareness orientation related to information security. Second, the GAO draft report recommends that the Department of State address the weaknesses in security control testing policies described in this report, and ensure that its components complete required annual security control and contingency plan testing on all systems. In addition to the efforts outlined during the GAO review process, the Department employs and is in the process of employing additional measures to ensure its policies and practices address applicable federal standards and guidelines: * Increased frequency of automated testing - The Department performs security control testing on an annual basis, as specified by the applicable NIST standards and guidelines. Wherever automated testing is possible and practical, the Department uses a more frequent testing schedule – currently at least monthly, and moving toward weekly. * Oversight of roles and responsibilities –Annual testing is performed by the system owner. The operational aspects of automated security control testing are centralized. The oversight of both the system owner and automation activities is centrally managed under the oversight of the Department's Chief Information Security Officer. * New guidance on selection of controls – During FY 07, the Department issued specific guidance on the appropriate NIST SP 800-53 security controls that where to be tested at the system level for information systems categorized pursuant to the FIPS 199 process as either low, moderate, or high systems, as compared to those controls that were to be tested at the enterprise level, as part of Department-wide programs. The Department is continuing to monitor the implementation of this guidance and stands ready to fine-tune as necessary. The Department guidance is in the form of practical tools, which the system owner may use to record, track and monitor test results (and lists of controls for each department- wide program). * Increased depth and breadth of testing – During FY 07, systems owners self-assessed 100% of the applicable NIST SP 800-53 security controls for compliance for 100% of applicable systems in FISMA inventory. To corroborate these self assessments, the Department's Chief Information Security Officer has developed a formal process of "lot-acceptance sampling" validating the quality of the system owner assessments. Formal methods are used to determine the sample size and randomness of the sampling. The sample size dictates the depth and breadth of the independent testing. Thank you for the opportunity to review and comment on your draft report on this important issue of information security. The Department is making effective progress addressing the issues associated with the two GAO recommendations, and requests the two above-referenced obstacles be incorporated in the final report, in the interests of assuring that a complete and accurate representation of the challenges agencies face in implementing the requirements of FISMA is reported. [End of section] Appendix VI: GAO Contact and Staff Acknowledgments: GAO Contact: Gregory C. Wilshusen, (202) 512-6244, wilshuseng@gao.gov: Staff Acknowledgments: In addition to the contact named above, key contributions to this report were made by Barbara Collier, Nancy DeFrancesco (Assistant Director), Neil Doherty, Timothy Eagle, Jennifer Franks, Nancy Glover, Anjalique Lawrence, Stephanie Lee, David Plocher, and Jonathan Ticehurst. [End of section] Footnotes: [1] OMB Circular A-130, Management of Federal Information Resources (Washington, D.C.: November 2000), defines the term "major information system" as an information system that requires special management attention because of its importance to a department mission; its high development, operating, or maintenance costs; or its significant role in the administration of department programs, finances, property, or other resources. [2] Memorandum from the Chief Information Officer, Department of Defense (DOD) Information Technology (IT) Portfolio Repository (DITPR) and DOD SIPRNet IT Registry Annual Guidance for 2006 (May 17, 2006). [3] NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems, as amended (Washington, D.C.: December 2006). [4] NIST Special Publications 800-16, Information Technology Security Training Requirements: A Role-and Performance-Based Model (Gaithersburg, Md.: April 1998), and 800-50, Building an Information Technology Security Awareness and Training Program (Gaithersburg, Md.: October 2003). [5] GAO, Information Security: Agencies Need to Develop and Implement Adequate Policies for Periodic Testing, GAO-07-65 (Washington, D.C.: Oct. 20, 2006). [6] GAO-07-65. [7] Initially, NIST Special Publication 800-26, Security Self- Assessment Guide for Information Technology Systems (Washington, D.C.: November 2001), provided the information security control framework for federal agencies. It was replaced in 2006 by the information security control framework described in NIST Special Publication 800-53. [8] This process also requires, among other things, that security planning be documented. Such documentation includes risk assessments, contingency plans, incident response plans, security awareness and training plans, information systems rules of behavior, configuration management plans, security configuration checklists, privacy impact assessments, and system interconnection agreements. [9] If systems are shown to have an acceptable level or risk, they may receive authorization to operate; if not, authorization may be denied. The approving official may also give systems an interim authorization to operate. If systems are shown to have an acceptable level of residual risk after controls are implemented to mitigate unacceptable vulnerabilities, they may then receive a full authorization to operate. [10] In April 2005, the GAO report, "Information Security: Continued Efforts Needed to Sustain Progress in Implementing Statutory Requirements" warned that the lack of a commonly accepted framework for IG FISMA reviews results in "inconsistency" and can "affect the consistency and comparability of reported results, potentially reducing the usefulness of the IG reviews." [11] In July 2005, the GAO report "Information Security: Weaknesses Persist at Federal Agencies Despite Progress Made in Implementing Related Statutory Requirements" asserted that IGs "may not be performing their evaluations with peak effectiveness, efficiency, and adequate quality control." GAO recommended "the usefulness and comparability of the IG's annual evaluations for oversight bodies may be improved by the adoption of a framework for the FISMA independent evaluations." [12] In June 2007, the GAO report "Information Security: Agencies Report Progress, but Sensitive Data Remain at Risk" asserted that the "lack of a common methodology, or framework, has culminated in disparities in audit scope, methodology, and content." GAO cautioned "the collective IG community may be performing their evaluations without optimal effectiveness and efficiency." As supporting evidence, GAO cited "one IG noted that the agency's inventory was missing certain web applications and concluded that the agency's inventory was only 0- 50 complete." GAO recommended "a commonly used framework or methodology for the FISMA independent evaluations is a mechanism that could provide improved effectiveness, increased efficiency, and consistency of application." GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Susan Becker, Acting Manager, Beckers@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.