Information Security
Federal Agency Efforts to Encrypt Sensitive Information Are Under Way, but Work Remains
Gao ID: GAO-08-525 June 27, 2008
Many federal operations are supported by automated systems that may contain sensitive information such as national security information that, if lost or stolen, could be disclosed for improper purposes. Compromises of sensitive information at numerous federal agencies have raised concerns about the extent to which such information is vulnerable. The use of technological controls such as encryption--the process of changing plaintext into ciphertext--can help guard against the unauthorized disclosure of sensitive information. GAO was asked to determine (1) how commercially available encryption technologies can help agencies protect sensitive information and reduce risks; (2) the federal laws, policies, and guidance for using encryption technologies; and (3) the extent to which agencies have implemented, or plan to implement, encryption technologies. To address these objectives, GAO identified and evaluated commercially available encryption technologies, reviewed relevant laws and guidance, and surveyed 24 major federal agencies.
Commercially available encryption technologies can help federal agencies protect sensitive information that is stored on mobile computers and devices (such as laptop computers, handheld devices such as personal digital assistants, and portable media such as flash drives and CD-ROMs) as well as information that is transmitted over wired or wireless networks by reducing the risks of its unauthorized disclosure and modification. For example, information stored in individual files, folders, or entire hard drives can be encrypted. Encryption technologies can also be used to establish secure communication paths for protecting data transmitted over networks. While many products to encrypt data exist, implementing them incorrectly------such as failing to properly configure the product, secure encryption keys, or train users------can result in a false sense of security and render data permanently inaccessible. Key laws frame practices for information protection, while federal policies and guidance address the use of encryption. The Federal Information Security Management Act of 2002 mandates that agencies implement information security programs to protect agency information and systems. In addition, other laws provide guidance and direction for protecting specific types of information, including agency-specific information. For example, the Privacy Act of 1974 requires that agencies adequately protect personal information, and the Health Insurance Portability and Accountability Act of 1996 requires additional protections for sensitive health care information. The Office of Management and Budget has issued policy requiring federal agencies to encrypt all data on mobile computers and devices that carry agency data and use products that have been approved by the National Institute for Standards and Technology (NIST) cryptographic validation program. Further, NIST guidance recommends that agencies adequately plan for the selection, installation, configuration, and management of encryption technologies. The extent to which 24 major federal agencies reported that they have implemented encryption and developed plans to implement encryption of sensitive information varied across agencies. From July through September 2007, the major agencies collectively reported that they had not yet installed encryption technology to protect sensitive information on about 70 percent of their laptop computers and handheld devices. Additionally, agencies reported uncertainty regarding the applicability of OMB's encryption requirements for mobile devices, specifically portable media. While all agencies have initiated efforts to deploy encryption technologies, none had documented comprehensive plans to guide encryption implementation activities such as installing and configuring appropriate technologies in accordance with federal guidelines, developing and documenting policies and procedures for managing encryption technologies, and training users. As a result federal information may remain at increased risk of unauthorized disclosure, loss, and modification.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-08-525, Information Security: Federal Agency Efforts to Encrypt Sensitive Information Are Under Way, but Work Remains
This is the accessible text file for GAO report number GAO-08-525
entitled 'Information Security: Federal Agency Efforts to Encrypt
Sensitive Information Are Under Way, but Work Remains' which was
released on July 29, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States Government Accountability Office:
GAO:
June 2008:
Information Security:
Federal Agency Efforts to Encrypt Sensitive Information Are Under Way,
but Work Remains:
GAO-08-525:
GAO Highlights:
Highlights of GAO-08-525, a report to congressional requesters.
Why GAO Did This Study:
Many federal operations are supported by automated systems that may
contain sensitive information such as national security information
that, if lost or stolen, could be disclosed for improper purposes.
Compromises of sensitive information at numerous federal agencies have
raised concerns about the extent to which such information is
vulnerable. The use of technological controls such as encryption”the
process of changing plaintext into ciphertext”can help guard against
the unauthorized disclosure of sensitive information. GAO was asked to
determine (1) how commercially available encryption technologies can
help agencies protect sensitive information and reduce risks; (2) the
federal laws, policies, and guidance for using encryption technologies;
and (3) the extent to which agencies have implemented, or plan to
implement, encryption technologies. To address these objectives, GAO
identified and evaluated commercially available encryption
technologies, reviewed relevant laws and guidance, and surveyed 24
major federal agencies.
What GAO Found:
Commercially available encryption technologies can help federal
agencies protect sensitive information that is stored on mobile
computers and devices (such as laptop computers, handheld devices such
as personal digital assistants, and portable media such as flash drives
and CD-ROMs) as well as information that is transmitted over wired or
wireless networks by reducing the risks of its unauthorized disclosure
and modification. For example, information stored in individual files,
folders, or entire hard drives can be encrypted. Encryption
technologies can also be used to establish secure communication paths
for protecting data transmitted over networks. While many products to
encrypt data exist, implementing them incorrectly------such as failing
to properly configure the product, secure encryption keys, or train
users------can result in a false sense of security and render data
permanently inaccessible.
Key laws frame practices for information protection, while federal
policies and guidance address the use of encryption. The Federal
Information Security Management Act of 2002 mandates that agencies
implement information security programs to protect agency information
and systems. In addition, other laws provide guidance and direction for
protecting specific types of information, including agency-specific
information. For example, the Privacy Act of 1974 requires that
agencies adequately protect personal information, and the Health
Insurance Portability and Accountability Act of 1996 requires
additional protections for sensitive health care information. The
Office of Management and Budget has issued policy requiring federal
agencies to encrypt all data on mobile computers and devices that carry
agency data and use products that have been approved by the National
Institute for Standards and Technology (NIST) cryptographic validation
program. Further, NIST guidance recommends that agencies adequately
plan for the selection, installation, configuration, and management of
encryption technologies.
The extent to which 24 major federal agencies reported that they have
implemented encryption and developed plans to implement encryption of
sensitive information varied across agencies. From July through
September 2007, the major agencies collectively reported that they had
not yet installed encryption technology to protect sensitive
information on about 70 percent of their laptop computers and handheld
devices. Additionally, agencies reported uncertainty regarding the
applicability of OMB‘s encryption requirements for mobile devices,
specifically portable media. While all agencies have initiated efforts
to deploy encryption technologies, none had documented comprehensive
plans to guide encryption implementation activities such as installing
and configuring appropriate technologies in accordance with federal
guidelines, developing and documenting policies and procedures for
managing encryption technologies, and training users. As a result
federal information may remain at increased risk of unauthorized
disclosure, loss, and modification.
What GAO Recommends:
GAO is making recommendations to (1) the Director of the Office of
Management and Budget (OMB) to clarify guidance and (2) selected
agencies to strengthen practices for planning and implementing the use
of encryption. In comments on a draft of this report, OMB and the
agencies generally agreed with the recommendations.
To view the full product, including the scope and methodology, click on
GAO-08-525. For more information, contact Gregory C. Wilshusen at (202)
512-6244 or wilshuseng@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
Commercially Available Encryption Technologies Can Help Agencies Reduce
Risks:
Key Laws Frame Practices for Information Protection, while Federal
Policies and Guidance Address Use of Encryption:
Efforts to Encrypt Sensitive Information Varied among Agencies:
Conclusions:
Recommendations for Executive Action:
Agency Comments:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Important Considerations for Implementing Encryption to
Effectively Reduce Agency Risks:
Appendix III: Hindrances Faced by Agencies when Implementing
Encryption:
Appendix IV: GSA SmartBUY Program for Data-at-Rest Encryption Products:
Appendix V: Comments from the Office of Management and Budget:
Appendix VI: Comments from the Department of Education:
Appendix VII: Comments from the Department of Housing and Urban
Development:
Appendix VIII: Comments from the Department of State:
Appendix IX: Comments from the General Services Administration:
Appendix X: Comments from the National Aeronautics and Space
Administration:
Appendix XI: GAO Contact and Staff Acknowledgments:
Glossary:
Tables:
Table 1: Commercially Available Encryption Technologies:
Table 2: Key Laws That Provide a Framework for Agencies to Use in
Protecting Sensitive Information:
Table 3: Major OMB Memorandums Related to the Use of Encryption:
Table 4: Key NIST Publications for Implementing Encryption Technology:
Table 5: Agency Policies and Procedures That Address NIST Encryption
Controls:
Table 6: Hindrances to Implementing Encryption at Federal Agencies:
Table 7: Examples of Volume Discount Pricing Available through
SmartBUY:
Figures:
Figure 1: Incidents Reported to US-CERT in Fiscal Years 2005 through
2007:
Figure 2 : Encryption and Decryption:
Figure 3: Percentage of Encrypted Laptop Computers and Handheld
Computing Devices at 24 Major Federal Agencies:
Figure 4: Agency Status of Encrypting Sensitive Information Transmitted
Over Wired and Wireless Networks:
Abbreviations:
CD-ROM: compact disc read only memory:
DVD: digital versatile disc:
FIPS: federal information processing standards:
FISMA: Federal Information Security Management Act of 2002:
GSA: General Services Administration:
HUD: Department of Housing and Urban Development:
IT: information technology:
NASA: National Aeronautics and Space Administration:
NIST: National Institute of Standards and Technology:
OMB: Office of Management and Budget:
PKI: public key infrastructures:
SmartBUY: Software Managed and Acquired on the Right Terms:
USB: universal serial bus:
US-CERT: U.S. Computer Emergency Readiness Team:
USDA: U.S. Department of Agriculture:
United States Government Accountability Office:
Washington, DC 20548:
June 27, 2008:
The Honorable Bennie G. Thompson:
Chairman:
Committee on Homeland Security:
House of Representatives:
The Honorable Jane Harman:
Chairwoman:
Subcommittee on Intelligence, Information Sharing and Terrorism Risk
Assessment:
Committee on Homeland Security:
House of Representatives:
The Honorable Zoe Lofgren:
House of Representatives:
In 2006, the Department of Veterans Affairs reported that a laptop
computer and external hard drive--that had not been encrypted or
password protected and that contained the personal information of
approximately 26.5 million veterans and United States military
personnel--had been stolen from an employee's home. This incident and
the increasing number of data breaches reported by other government
agencies--such as the Departments of Defense and Health and Human
Services and the Transportation Security Administration--have raised
concerns about the extent to which sensitive information maintained by
the federal government is vulnerable and what current laws, policies,
and practices are in place to protect that information.[Footnote 1]
In June 2006, GAO testified that federal agencies should consider the
use of encryption technologies to improve their ability to protect
information from improper disclosure,[Footnote 2] particularly when
data must be stored on mobile computers and devices such as laptop
computers, handheld personal digital assistants, and portable media
such as flash drives and CD-ROMs. Encryption protects data through a
process of transforming ordinary data (commonly referred to as
plaintext) into code form (ciphertext) using a special value known as a
key and a mathematical process called an algorithm.[Footnote 3]
Encryption technologies include commercially available products (such
as hardware or software) that create the capability to encrypt data.
In response to your request, our objectives were to determine (1) how
commercially available encryption technologies could help federal
agencies protect sensitive information and reduce risks; (2) the
federal laws, policies, and guidance for using encryption technologies
to protect sensitive information; and (3) the extent to which agencies
have implemented, or planned to implement, encryption technologies to
protect sensitive information.
To address these objectives, we identified commercially available
encryption technologies by reviewing prior GAO reports on technology,
researching products approved by the National Institute of Standards
and Technology (NIST), and interviewing NIST encryption experts. We
also reviewed relevant laws, policies, and guidance to identify the
mandatory and optional practices for protecting sensitive information
(including personally identifiable information[Footnote 4]) that
federal agencies collect and handle. In addition, we surveyed 24 major
federal agencies and examined supporting documentation regarding agency
efforts to implement encryption.[Footnote 5] We also examined
encryption practices at six of these agencies to determine whether
these practices met federal requirements for installation and
configuration of Federal Information Processing Standards (FIPS)-
validated cryptographic modules, encryption products, and associated
management controls. We conducted this performance audit from February
2007 through June 2008 in accordance with generally accepted government
auditing standards. These standards require that we plan and perform
the audit to obtain sufficient, appropriate evidence to provide a
reasonable basis for our findings and conclusions based on our audit
objectives. We believe that the evidence obtained provides a reasonable
basis for our findings and conclusions based on our audit objectives.
Appendix I contains additional details on the objectives, scope, and
methodology of our review.
Results in Brief:
Many types of commercially available encryption technologies can help
federal agencies protect sensitive information and reduce the risks to
the sensitive data stored on agency equipment or transmitted across a
network. Data stored in individual files, folders, or entire drives can
be encrypted when not in use. Types of technologies to protect stored
data include full disk encryption, hardware-based encryption, and file,
folder, or virtual disk encryption. In addition, encryption
technologies can be used to establish secure communication paths for
protecting data transmitted over networks through the use of virtual
private networks and digital certificates. While many technologies to
encrypt data exist, implementing them incorrectly--such as failing to
properly configure the product, secure encryption keys, or train users-
-can create a false sense of security and even render data permanently
inaccessible.
Although key federal laws do not specifically address the use of
encryption, they provide a framework of information protection
activities and direct the Office of Management and Budget (OMB) and
NIST to develop policies, standards, and guidance for federal agencies
to use in implementing technologies, such as encryption, to protect
sensitive information. Among these laws is the Federal Information
Security Management Act of 2002 (FISMA), which mandates that agencies
implement information security programs to protect agency information
and systems. In addition, the Privacy Act of 1974 requires that
agencies adequately protect personal information maintained in federal
systems of records,[Footnote 6] and the Health Insurance Portability
and Accountability Act of 1996 addresses the protection of personal
medical information. To specifically direct agencies' use of
encryption, OMB issued a policy in 2006 recommending, and in 2007
requiring, that all agencies encrypt all data on mobile computers and
devices that carry sensitive agency data and also reinforced the long-
standing requirement that agencies use products that have been approved
by NIST's cryptographic module validation program. Further, NIST has
published guidelines for federal agencies to use in planning and
implementing encryption technologies; these guidelines address the
documentation of comprehensive implementation plans; the installation
and configuration of selected encryption technologies, policies and
procedures for managing encryption; and user training.
The extent to which 24 major federal agencies reported that they have
implemented encryption and to which they have developed plans to
implement encryption varied across the agencies. While all agencies had
initiated efforts to encrypt sensitive agency information, the
encryption of information stored on mobile devices lagged behind
efforts to encrypt information transmitted over networks. For example,
overall, agencies reported in July through September 2007 that they had
not yet installed encryption software on about 70 percent of their
laptop computers and handheld mobile computing devices combined.
Although progress was under way at agencies governmentwide, agencies
reported uncertainty regarding the applicability of OMB's encryption
requirements. In addition, none of the agencies had documented
comprehensive plans to guide encryption implementation activities, such
as inventorying information to determine encryption needs; documenting
how the agency plans to select, install, configure, and monitor
encryption technologies; developing and documenting encryption policies
and procedures; and training personnel in the use of installed
encryption. Further, our tests at 6 selected agencies revealed
weaknesses in the encryption implementation practices involving the
installation and configuration of FIPS-validated cryptographic modules,
encryption products, monitoring the effectiveness of installed
encryption technologies, the development and documentation of policies
and procedures for managing these technologies, and training of
personnel in the proper use of installed encryption products. As a
result of these weaknesses, federal information may remain at increased
risk of unauthorized disclosure, loss, and modification.
We are recommending that OMB clarify governmentwide encryption policy
to address agency efforts to plan for and implement encryption
technologies. We are also making recommendations to selected agencies
to properly install and configure FIPS-compliant encryption
technologies, to develop policies and procedures to manage encryption,
and to provide encryption training to personnel.
We obtained written comments on a draft of this report from OMB, the
Departments of Education, Housing and Urban Development, and State, as
well as the General Services Administration and the National
Aeronautics and Space Administration; these comments are reproduced in
appendixes V to X, respectively. We also obtained comments from the
Department of Agriculture via e-mail. OMB generally agreed with the
report's contents and stated that it would carefully consider our
recommendations. The other six agencies also agreed with the report's
findings and recommendations. In addition, NIST and the Social Security
Administration provided technical comments, which we have incorporated
as appropriate.
Background:
Virtually all federal operations are supported by automated systems,
mobile devices, and electronic media that may contain sensitive
information such as Social Security numbers, medical records, law
enforcement data, national or homeland security information, and
proprietary information that could be inappropriately disclosed,
browsed, or copied for improper or criminal purposes.
In our survey of 24 major federal agencies, 10 agencies reported having
systems that contain sensitive medical information, 16 reported having
systems that contain sensitive regulatory information, 19 reported
having systems that contain sensitive personal information, and 20
reported having systems that contain sensitive program-specific
information. It is important for agencies to safeguard sensitive
information because, if left unprotected, the information could be
compromised--leading to loss or theft of resources (such as federal
payments and collections), modification or destruction of data, or
unauthorized use of computer resources, including launching attacks on
other computer systems.
Factors Placing Sensitive Information at Risk:
Many factors can threaten the confidentiality, integrity, and
availability of sensitive information. Cyber threats to federal systems
and critical infrastructures containing sensitive information can be
intentional or unintentional, targeted or nontargeted, and can come
from a variety of sources.[Footnote 7] Intentional threats include both
targeted and nontargeted attacks. A targeted attack occurs when a group
or individual specifically attacks an information system. A nontargeted
attack occurs when the intended target of the attack is uncertain, such
as when a virus, worm, or malware is released on the Internet with no
specific target. Unintentional threats can be caused by software
upgrades or maintenance procedures that inadvertently disrupt systems.
The Federal Bureau of Investigation has identified multiple sources of
threats to our nation's critical information systems, including those
from foreign nation states engaged in information warfare, domestic
criminals, hackers, virus writers, and disgruntled current and former
employees working within an organization. There is increasing concern
among both government officials and industry experts regarding the
potential for a cyber attack. According to the Director of National
Intelligence, ''our information infrastructure--including the Internet,
telecommunications networks, computer systems, and embedded processors
and controllers in critical industries--increasingly is being targeted
for exploitation and potentially for disruption or destruction by a
growing array of state and non-state adversaries. Over the past year,
cyber exploitation activity has grown more sophisticated, more
targeted, and more serious. The intelligence community expects these
trends to continue in the coming year."[Footnote 8]
Threats to mobile devices are posed by people with malicious
intentions, including causing mischief and disruption as well as
committing identity theft and other forms of fraud. For example,
malware threats can infect data stored on devices, and data in transit
can be intercepted through many means, including from e-mail, Web
sites, file downloads, file sharing, peer-to-peer software, and instant
messaging. Another threat to mobile devices is the loss or theft of the
device. Someone who has physical access to an electronic device can
attempt to view the information stored on it.
Incidents at Federal Agencies Demonstrate That Sensitive Information Is
at Risk:
Examples of Data Breaches at Federal Agencies:
Defense:
February 2008:
A laptop computer containing personally identifiable information for
as many as 4,000 participants in the Marine Corps community services'
New Parent Support Program was stolen.
Energy:
December 2007:
A hacker gained access to an Energy computer by embedding a program,
in an e-mail sent to staff, that allowed the hacker to copy and retrieve
information.
Transportation Security Administration:
May 2007:
An external hard drive, discovered missing from a controlled area at
agency headquarters human capital office, contained personal data for
100,000 archived employment records of individuals employed by the
agency from January 2002 until August 2005.
Source: GAO based on agency-reported incidents.
[End of figure]
The need for effective information security policies and practices is
further illustrated by the increasing number of security incidents
reported by federal agencies that put sensitive information at risk.
Personally identifiable information about millions of Americans has
been lost, stolen, or improperly disclosed, thereby potentially
exposing those individuals to loss of privacy, identity theft, and
financial crimes. Reported attacks and unintentional incidents
involving critical infrastructure systems demonstrate that a serious
attack could be devastating. Agencies have experienced a wide range of
incidents involving data loss or theft, computer intrusions, and
privacy breaches, underscoring the need for improved security
practices.
When incidents occur, agencies are to notify the federal information
security incident center--the U.S. Computer Emergency Readiness Team
(US-CERT). As shown in figure 1, the number of incidents reported by
federal agencies to US-CERT has increased dramatically over the past 3
years, increasing from 3,634 incidents reported in fiscal year 2005 to
13,029 incidents in fiscal year 2007 (about a 259 percent increase).
Figure 1: Incidents Reported to US-CERT in Fiscal Years 2005 through
2007:
This figure is a vertical bar graph is showing incidents reported to US-
CERT in fiscal years 2005 through 2007. The X axis represents the
fiscal year, and the Y axis represents the number of incidents
reported.
Year: FY05;
Number of incidents: 3,634.
Year: FY06;
Number of incidents: 5,503.
Year: FY07;
Number of incidents: 13,029.
[See PDF for image]
Source: GAO analysis of US-CERT data.
[End of figure]
Data breaches present federal agencies with potentially serious and
expensive consequences; for example, a security breach might require an
agency to fund the burdensome costs of notifying affected individuals
and associated credit monitoring services or it could jeopardize the
agency's mission. Implementation of a risk-based framework of
management, operational, and technical controls that includes controls
such as encryption technology can help guard against the inadvertent
compromise of sensitive information. While encrypting data might add to
operational burdens by requiring individuals to enter pass codes or use
other means to encrypt and decrypt data, it can also help to mitigate
the risk associated with the theft or loss of computer equipment that
contains sensitive data.
Workforce Mobility Introduces Additional Risks to Sensitive
Information:
Protecting information has become more challenging in today's IT
environment of highly mobile workers and decreasing device size. Using
small, easily pilferable devices such as laptop computers, handheld
personal digital assistants, thumb-sized Universal Serial Bus (USB)
flash drives, and portable electronic media such as CD-ROMs and DVDs,
employees can access their agency's systems and information from
anywhere. When computers were larger and stationary, sensitive
information that was stored on mainframe computers was accessible by
only a limited number of authorized personnel via terminals that were
secured within the physical boundaries of the agency's facility. Now,
mobile workers can process, transport, and transmit sensitive
information anywhere they work. This transition from a stationary
environment to a mobile one has changed the type of controls needed to
protect the information.[Footnote 9] Encryption technologies, among
other controls, provide agencies with an alternate method of protecting
sensitive information that compensates for the protections offered by
the physical security controls of an agency facility when the
information is removed from, or accessed from, outside of the agency
location.
Encryption Can Help Protect Sensitive Information:
Data breaches can be reduced through the use of encryption, which is
the process of transforming plaintext into ciphertext using a special
value known as a key and a mathematical process called an algorithm
(see fig. 2).
Figure 2: Encryption and Decryption:
This figure is a visual diagram of encryption and decryption.
Plaintext;
Key Encryption;
Ciphertext;
Key Decryption;
Original plaintext.
[See PDF for image]
Source: GAO analysis.
[End of figure]
Cryptographic algorithms are designed to produce ciphertext that is
unintelligible to unauthorized users. Decryption of ciphertext--
returning the encoded data to plaintext--is possible by using the
proper key. Encryption can protect sensitive information in storage and
during transmission. Encryption of data in transit hides information as
it moves, for example, between a database and a computing device over
the Internet, local networks, or via fax or wireless networks. Stored
data include data stored in files or databases, for example, on a
personal digital assistant, a laptop computer, a file server, a DVD, or
a network storage appliance. Encryption may also be used in system
interconnection devices such as routers, switches, firewalls, servers,
and computer workstations to apply the appropriate level of encryption
required for data that pass through the interconnection.[Footnote 10]
Commercially Available Encryption Technologies Can Help Agencies Reduce
Risks:
Commercially available encryption technologies can help federal
agencies protect sensitive information and reduce the risks of its
unauthorized disclosure and modification. These technologies have been
designed to protect information stored on computing devices or other
media and transmitted over wired or wireless networks.
Because the capability of each type of encryption technology to protect
information is limited by the boundaries of the file, folder, drive, or
network covered by that type of technology, a combination of several
technologies may be required to ensure that sensitive information is
continuously protected as it flows from one point, such as a remote
mobile device, to another point, such as a network or portable
electronic media. For example, one product that encrypts a laptop's
hard drive may not provide any protection for files copied to portable
media, attached to an e-mail, or transmitted over a network.
Encryption Technologies to Protect Stored Information Are Available:
Agencies have several options available when selecting an encryption
technology for protecting stored data. According to NIST guidance on
encrypting stored information,[Footnote 11] these include full disk,
hardware-based, file, folder, or virtual disk encryption. Through the
use of these technologies, encryption can be applied granularly, to an
individual file that contains sensitive information, or broadly, by
encrypting an entire hard drive. The appropriate encryption technology
for a particular situation depends primarily on the type of storage,
the amount of information that needs to be protected, and the threats
that need to be mitigated. Storage encryption technologies require
users to authenticate successfully before accessing the information
that has been encrypted. The combination of encryption and
authentication controls access to the stored information.
Full Disk Encryption:
Full disk encryption software encrypts all data on the hard drive used
to boot a computer, including the computer's operating system, and
permits access to the data only after successful authentication to the
full disk encryption software. The majority of current full disk
encryption products are implemented entirely within a software
application. The software encrypts all information stored on the hard
drive and installs a special environment to authenticate the user and
begin decrypting the drive. Users enter their user identification and
password before decrypting and starting the operating system. Once a
user authenticates to the operating system by logging in, the user can
access the encrypted files without further authentication, so the
security of the solution is heavily dependent on the strength of the
operating system authenticator.
When a computer is turned off, all the information encrypted by full
disk encryption is protected, assuming that pre-boot authentication is
required. After the computer is booted, full disk encryption provides
no protection and the operating system becomes fully responsible for
protecting the unencrypted information.
Hardware-Based Encryption:
Full disk encryption can also be built into a hard drive. Hardware and
software-based full disk encryption offer similar capabilities through
different mechanisms. When a user tries to boot a device protected with
hardware-based full disk encryption, the hard drive prompts the user to
authenticate before it allows an operating system to load. The full
disk encryption capability is built into the hardware in such a way
that it cannot be disabled or removed from the drive. The encryption
code and authenticators, such as passwords and cryptographic
keys,[Footnote 12] are stored securely on the hard drive. Because the
encryption and decryption are performed by the hard drive itself,
without any operating system participation, typically there is very
little performance impact.
A major difference between software-and hardware-based full disk
encryption is that software-based full disk encryption can be centrally
managed, but hardware-based full disk encryption can usually be managed
only locally. This makes key management and recovery actions
considerably more resource-intensive and cumbersome for hardware-based
full disk encryption than for software-based. Another major difference
is that because hardware-based full disk encryption performs all
cryptographic processing within the hard drive's hardware, it does not
need to place its cryptographic keys in the computer's memory,
potentially exposing the keys to malware and other threats. A third
significant difference is that hardware-based full disk encryption does
not cause conflicts with software that modifies the master boot record,
for example, software that allows the use of more than one operating
system on a hard drive.
File, Folder, and Virtual Disk Encryption:
File, folder, and virtual disk encryption are all used to encrypt
specified areas of data on a storage medium such as a laptop hard
drive. File encryption encrypts files, a collection of information
logically grouped into a single entity and referenced by a unique name,
such as a file name. Folder encryption encrypts folders, a type of
organizational structure used to group files. Virtual disk encryption
encrypts a special type of file--called a container--that is used to
encompass and protect other files.
File encryption is the process of encrypting individual files on a
storage medium and permitting access to the encrypted data only after
proper authentication is provided. Folder encryption is very similar to
file encryption, except that it addresses individual folders instead of
files. Some operating systems offer built-in file and/or folder
encryption capabilities, and many third-party programs are also
commercially available. File/folder encryption does not provide any
protection for data outside the protected files or folders such as
unencrypted temporary files that may contain the contents of any
unencrypted files being held in computer memory.
Virtual disk encryption is the process of encrypting a container. The
container appears as a single file but can hold many files and folders
that are not seen until the container is decrypted. Access to the data
within the container is permitted only after proper authentication is
provided, at which point the container appears as a logical disk drive
that may contain many files and folders. Virtual disk encryption does
not provide any protection for data created outside the protected
container, such as unencrypted temporary files, that could contain the
contents of any unencrypted files being held in computer memory.
Agency Information Can Be Encrypted while in Transit over a Network:
Sensitive data are also at risk during transmission across unsecured--
untrusted--networks such as the Internet. For example, as reported by
NIST,[Footnote 13] transmission of e-mail containing sensitive
information or direct connections for the purpose of processing
information between a mobile device and an internal trusted system can
expose sensitive agency data to monitoring or interception. According
to both NIST[Footnote 14] and an industry source,[Footnote 15] agencies
can use commercially available encryption technologies such as virtual
private networks and digital signatures to encrypt sensitive data while
they are in transit over a wired or wireless network.
Virtual Private Networks:
According to NIST,[Footnote 16] a virtual private network is a data
network that enables two or more parties to communicate securely across
a public network by creating a private connection, or "tunnel," between
them. Because a virtual private network can be used over existing
networks such as the Internet, it can facilitate the secure transfer of
sensitive data across public networks. Virtual private networks can
also be used to provide a secure communication mechanism for sensitive
data such as Web-based electronic transactions and to provide secure
remote access to an organization's resources.
Digital Signatures and Digital Certificates:
Properly implemented digital signature technology uses public key
cryptography to provide authentication, data integrity, and
nonrepudiation for a message or transaction. As NIST states,[Footnote
17] public key infrastructures[Footnote 18] (PKI) can be used not only
to encrypt data but also to authenticate the identity of specific
users. Just as a physical signature provides assurance that a letter
has been written by a specific person, a digital signature is an
electronic credential created using a party's private key with an
encryption algorithm.[Footnote 19] When it is added to a document, it
can be used to confirm the identity of a document's sender since it
also contains the user's public key and name of the encryption
algorithm. Validating the digital signature not only confirms who
signed it, but also ensures that there have been no alterations to the
document since it was signed.
Digital signatures may also be employed in authentication protocols to
confirm the identity of the user before establishing a session.
Specifically, digital signatures can be used to provide higher
assurance authentication (in comparison with passwords) when
establishing virtual private networks.
Digital signatures are often used in conjunction with digital
certificates. A digital certificate is an electronic credential that
guarantees the association between a public key and a specific entity,
such as a person or organization. As specified by NIST, the signature
on the document can be validated by using the public key from the
digital certificate issued to the signer. Validating the digital
certificate, the system can confirm that the user's relationship to the
organization is still valid. The most common use of digital
certificates is to verify that a user sending a message is who he or
she claims to be and to provide the receiver with a means to encode a
reply. For example, an agency virtual private network could use these
certificates to authenticate the identity of the user, verify that the
key is still good, and that he or she is still employed by the agency.
Encryption Technologies Available for Handheld Mobile Computing
Devices:
NIST guidance further states that encryption software can be used to
protect the confidentiality of sensitive information stored on handheld
mobile computing devices and mirrored on the desktop computer.[Footnote
20] The information on the handheld's add-on backup storage modules can
also be encrypted when not in use. This additional level of security
can be added to provide an extra layer of defense, further protecting
sensitive information stored on handheld devices.
In addition, encryption technologies can protect data on handheld
devices while the data are in transit. Users often subscribe to third-
party wireless Internet service providers, which use untrusted
networks; therefore, the handheld device would require virtual private
network software and a supporting corporate system to create a secure
communications tunnel to the agency.
Table 1 describes the types of commercial encryption technologies
available to agencies.
Table 1: Commercially Available Encryption Technologies:
Technology: Full disk encryption (software);
Use: Stored data;
Description: Full disk encryption software encrypts all data on the
hard drive that is used first when a computer is turned on, including
the computer's operating system, and permits access to the data only
after successful authentication to the full disk encryption software.
Technology: Hardware-based encryption;
Use: Stored data;
Description: Full disk encryption can also be built into a hard drive.
Technology: File encryption;
Use: Stored data;
Description: File encryption is the process of encrypting individual
files on a storage medium and permitting access to the encrypted data
only after proper authentication is provided.
Technology: Folder encryption;
Use: Stored data;
Description: Folder encryption is very similar to file encryption, only
it addresses individual folders instead of files.
Technology: Virtual disk encryption;
Use: Stored data;
Description: Virtual disk encryption is the process of encrypting a
file called a container, which can hold many files and folders. Access
to the data within the container is permitted only after proper
authentication is provided.
Technology: Virtual private networks;
Use: Data in transit;
Description: A virtual private network serves as an encrypted tunnel to
provide a secure communications mechanism for data in transit between
networks.
Technology: Digital signatures and digital certificates;
Use: Stored data and data in transit;
Description: A digital signature is an electronic credential created
using a party's private key with an encryption algorithm. A digital
certificate is an electronic credential that guarantees the association
between a public key and a specific entity.
Technology: Handheld mobile computing devices;
Use: Stored data and data in transit;
Description: Commercial encryption technologies allow users to send and
receive encrypted e-mail and access data wirelessly using secure NIST-
approved algorithms. Data stored on the handheld mobile computing
devices (for example, e-mail messages, contacts, and appointments) can
also be encrypted.
Source: GAO analysis, Defense Information Systems Agency, Vendor
Technical Overview, and NIST special publications.
[End of table]
While many technologies exist to protect data, implementing them
incorrectly--such as failing to properly configure the product, secure
encryption keys, or train users--can result in a false sense of
security or even render data permanently inaccessible. See appendix II
for a discussion of decisions agencies face and important
considerations for effectively implementing encryption to reduce agency
risks.
Key Laws Frame Practices for Information Protection, while Federal
Policies and Guidance Address Use of Encryption:
Although federal laws do not specifically require agencies to encrypt
sensitive information, they give federal agencies responsibilities for
protecting it. Specifically, FISMA, included within the E-Government
Act of 2002,[Footnote 21] provides a comprehensive framework for
ensuring the effectiveness of information security controls over
federal agency information and information systems. In addition, other
laws frame practices for protecting specific types of sensitive
information. OMB is responsible for establishing governmentwide
policies and for providing guidance to agencies on how to implement the
provisions of FISMA, the Privacy Act, and other federal information
security and privacy laws. In the wake of recent security breaches
involving personal data, OMB issued guidance in 2006 and 2007
reiterating the requirements of these laws and guidance. In this
guidance, OMB directed, among other things, that agencies encrypt data
on mobile computers or devices and follow NIST security guidelines. In
support of federal laws and policies, NIST provides federal agencies
with planning and implementation guidance and mandatory standards for
identifying and categorizing information types, and for selecting
adequate controls based on risk, such as encryption, to protect
sensitive information.
Key Laws Provide Framework for Protecting Sensitive Information:
Although federal laws do not specifically address the use of
encryption, they provide a framework for agencies to use to protect
their sensitive information. FISMA, which is Title III of the E-
Government Act of 2002, emphasizes the need for federal agencies to
develop, document, and implement programs using a risk-based approach
to provide information security for the information and information
systems that support their operations and assets. Its purposes include
the following:
* providing a comprehensive framework for ensuring the effectiveness of
information security controls over information resources that support
federal operations and assets;
* recognizing the highly networked nature of the current federal
computing environment and providing effective governmentwide management
and oversight of the related information security risks, including
coordination of information security efforts throughout the civilian,
national security, and law enforcement communities;
* providing for development and maintenance of minimum controls
required to protect federal information and information systems;
* acknowledging that commercially developed information security
products offer advanced, dynamic, robust, and effective information
security solutions, reflecting market solutions for the protection of
critical information infrastructures important to the national defense
and economic security of the nation that are designed, built, and
operated by the private sector; and:
* recognizing that the selection of specific technical hardware and
software information security solutions should be left to individual
agencies choosing from among commercially developed products.
This act requires agencies to provide cost-effective controls to
protect federal information and information systems from unauthorized
access, use, disclosure, disruption, modification, or destruction, and
it directs OMB and NIST to establish policies and standards to guide
agency implementation of these controls, which may include the use of
encryption.
The E-Government Act of 2002 also strives to enhance protection for
personal information in government information systems by requiring
that agencies conduct privacy impact assessments. A privacy impact
assessment is an analysis of how personal information is collected,
stored, shared, and managed in a federal system.
Additionally, the Privacy Act of 1974 regulates agencies' collection,
use, and dissemination of personal information maintained in systems of
records. In this regard, the Privacy Act requires agencies to establish
appropriate administrative, technical, and physical safeguards to
ensure the security and confidentiality of records and to protect
against any threats or hazards to their security or integrity that
could result in substantial harm, embarrassment, inconvenience, or
unfairness to any individual on whom information is maintained.
Congress has also passed laws requiring protection of sensitive
information that are agency-specific or that target a specific type of
information. These laws include the Health Insurance Portability and
Accountability Act of 1996,[Footnote 22] which requires additional
protections to sensitive health care information and the Veterans
Benefits, Health Care, and Information Technology Act,[Footnote 23]
enacted in December 2006, which establishes information technology
security requirements for personally identifiable information that
apply specifically to the Department of Veterans Affairs.
Table 2 summarizes the laws that provide a framework for agencies to
use in protecting sensitive information.
Table 2: Key Laws That Provide a Framework for Agencies to Use in
Protecting Sensitive Information:
Law: Federal Information Security Management Act of 2002;
Security elements: Governs information security in the federal
government. Defines roles and responsibilities for OMB and NIST in
developing federal policies and guidance. Also addresses the protection
of sensitive information in the context of securing federal agency
information and information systems.
Law: E-Government Act of 2002;
Security elements: Enhances protection of personal information in
government information systems by requiring that agencies conduct
privacy impact assessments.
Law: The Privacy Act of 1974;
Security elements: Places privacy restrictions on data collected by
government agencies maintained in systems of records. Also requires
agencies to secure and protect information using adequate technical and
physical safeguards.
Law: Health Insurance Portability and Accountability Act of 1996;
Security elements: Requires privacy regulations that establish
standards for protecting medical records and other personal health
information of individuals. Resulting regulations include encryption as
an addressable (not required) implementation specification.
Law: Veterans Benefits, Health Care, and Information Technology Act of
2006;
Security elements: Authorizes information technology security
requirements for personally identifiable information at the Department
of Veterans Affairs, including the requirement to develop procedures
for detecting, reporting, and responding to security incidents.
Source: GAO analysis of key laws that frame protection of sensitive
information.
[End of table]
OMB Policy Requires Encryption of Sensitive Government Information on
Mobile Devices:
OMB is responsible for establishing governmentwide policies and for
providing guidance to agencies on how to implement the provisions of
FISMA, the Privacy Act, and other federal information security and
privacy laws. OMB policy expands on the risk-based information security
program requirements of FISMA in its 2002 and 2004 guidance[Footnote
24] and in the wake of recent security breaches involving personal
data, outlines minimum practices for implementation of encryption
required by federal agencies in guidance issued in 2006 and 2007.
Specifically:
* OMB memorandum M-04-04, E-Authentication Guidance for Federal
Agencies, requires that agencies implement specific security controls
recommended by NIST,[Footnote 25] including the use of approved
cryptographic techniques for certain types of electronic transactions
that require a specified level of protection.
* OMB memorandum M-06-16, Protection of Sensitive Agency Information,
recommends, among other things, that agencies encrypt all agency data
on mobile computers and devices or obtain a waiver from the Deputy
Secretary of the agency that the device does not contain sensitive
information. The memorandum also recommends that agencies use a NIST
checklist[Footnote 26] provided in the memorandum that states agencies
should verify that information requiring protection is appropriately
categorized and assigned an appropriate risk impact category.
* OMB memorandum M-07-16, Safeguarding Against and Responding to the
Breach of Personally Identifiable Information, restated the M-06-16
recommendations as requirements, and also required the use of NIST-
certified cryptographic modules.
These OMB memorandums significant to the use of encryption are briefly
described in table 3.
Table 3: Major OMB Memorandums Related to the Use of Encryption:
OMB memorandum: Reporting Instructions for the Government Information
Security Reform Act and Updated Guidance on Security Plans of Action
and Milestones, (M-02-09), July 2, 2002;
Description: Requires that agencies document and track plans of actions
and milestones necessary to implement security controls including the
use of encryption if required.
OMB memorandum: E-Authentication Guidance for Federal Agencies, (M-04-
04), Dec. 16, 2003;
Description: Requires agencies with systems using remote authentication
to conduct electronic authentication risk assessments and select proper
controls, including the use of cryptographic components, as recommended
by NIST, to protect sensitive information on those systems.
OMB memorandum: Protection of Sensitive Agency Information, (M-06-16),
June 23, 2006;
Description: Recommends that agencies encrypt all data on mobile
computers/devices.
OMB memorandum: Safeguarding Against and Responding to the Breach of
Personally Identifiable Information, (M-07-16), May 22, 2007;
Description: Restates the recommendations of OMB M-06-16 as
requirements and requires that agencies use NIST-certified
cryptographic modules in encryption efforts.
Source: GAO analysis of OMB memorandums on encryption.
[End of table]
NIST Provides Guidance and Standards for Encryption Use:
In support of federal laws and policies, NIST provides federal agencies
with implementation guidance and mandatory standards for identifying
and categorizing information types and for selecting adequate controls
based on risk, such as encryption, to protect sensitive information.
Specifically, NIST Special Publication 800-53 instructs agencies to
follow the implementation guidance detailed in supplemental NIST
publications, including the following:[Footnote 27]
* NIST Special Publication 800-21, Guideline for Implementing
Cryptography in the Federal Government, guides the implementation of
encryption by agencies. It recommends that prior to selecting a
cryptographic method, or combination of methods, agencies address
several implementation considerations when formulating an approach and
developing requirements for integrating cryptographic methods into new
or existing systems, including installing and configuring appropriate
cryptographic components associated with selected encryption
technologies; monitoring the continued effectiveness and functioning of
encryption technologies; developing policies and procedures for life
cycle management of cryptographic components (such as procedures for
management of encryption keys, backup and restoration of services, and
authentication techniques); and training users, operators, and system
engineers.
* Special Publication 800-57, Recommendation for Key Management,
provides guidance to federal agencies on how to select and implement
cryptographic controls for protecting sensitive information by
describing cryptographic algorithms, classifying different types of
keys used in encryption, and providing information on key management.
* Special Publication 800-60, Guide for Mapping Types of Information
and Information Systems to Security Categories, provides implementation
guidance on the assignment of security categories to information and
information systems using FIPS 199.[Footnote 28]
* Special Publication 800-63, Electronic Authentication Guideline,
addresses criteria for implementing controls that correspond to the
assurance levels of OMB memorandum M-04-04 such that, if agencies
assign a level 2, 3, or 4 to an electronic transaction, they are
required to implement specific security controls, including the use of
approved cryptographic techniques.
* Special Publication 800-77, Guide to IPsec VPNs, provides technical
guidance to agencies in the implementation of virtual private networks,
such as identifying needs and designing, deploying, and managing the
appropriate solution, including the use of Federal Information
Processing Standards (FIPS)-compliant encryption algorithms.
NIST also issues FIPS, which frame the critical elements agencies are
required to follow to protect sensitive information and information
systems. Specifically:
* FIPS 140-2, Security Requirements for Cryptographic Modules.[Footnote
29] Agencies are required to encrypt agency data, where appropriate,
using NIST-certified cryptographic modules.[Footnote 30] This standard
specifies the security requirements for a cryptographic module used
within a security system protecting sensitive information in computer
and telecommunication systems (including voice systems) and provides
four increasing, qualitative levels of security intended to cover a
wide range of potential applications and environments.
* Several standards describe the technical specifications for
cryptographic algorithms, including those required when using digital
signatures.[Footnote 31]
* FIPS 199 provides agencies with criteria to identify and categorize
all of their information and information systems based on the
objectives of providing appropriate levels of information security
according to a range of risk levels.[Footnote 32]
* FIPS 200 requires a baseline of minimum information security controls
for protecting the confidentiality, integrity, and availability of
federal information systems and the information processed, stored, and
transmitted by those systems.[Footnote 33] FIPS 200 directs agencies to
implement the baseline control recommendations of NIST Special
Publication 800-53. The following security-related areas in FIPS 200
whose controls are further detailed in Special Publication 800-53
pertain to the use of encryption:
- Access control--describes controls for developing and enforcing
policies and procedures for access control including remote access,
wireless access, and for portable and mobile devices using mechanisms
such as authentication and encryption.
- Contingency planning--includes controls to ensure that the
organization protects system backup information from unauthorized
modification by employing appropriate mechanisms such as digital
signatures.
- Identification and authentication--describes controls for developing
and documenting identification and authentication policies and
procedures.
* Maintenance--includes remote maintenance control that addresses how
an organization approves, controls, and monitors remotely executed
maintenance and diagnostic activities including using encryption and
decryption of diagnostic communications.
* Media protection--describes developing policies and procedures for
media protection including media storage (which may include encrypting
stored data) and transport.
* System and communications protection--includes controls to ensure the
integrity and confidentiality of information in transit by employing
cryptographic mechanisms if required, including establishing and
managing cryptographic keys.
NIST publications pertaining to the use of encryption in federal
agencies are briefly described in table 4.
Table 4: Key NIST Publications for Implementing Encryption Technology:
NIST publication: Guideline for Implementing Cryptography In the
Federal Government (Special Publication 800-21);
Description: Directs agencies on how to select and implement
cryptographic controls for protecting sensitive information.
NIST publication: Recommended Security Controls for Federal Information
Systems (Special Publication 800-53, Revision 2);
Description: Recommends that agencies select and specify security
controls for information systems, including controls for implementing
cryptographic components.
NIST publication: Recommendation for Key Management (Special
Publication 800-57);
Description: Recommends technical guidance to agencies in the proper
management and protection of cryptographic keys and the information
associated with the keys.
NIST publication: Guide for Mapping Types of Information and
Information Systems to Security Categories (Special Publication 800-60,
Revision 1);
Description: Directs agencies to categorize information and information
systems, helping agencies determine their needs for encryption.
NIST publication: Electronic Authentication Guideline (Special
Publication 800-63);
Description: Directs agencies to properly implement electronic
authentication,[A] including use of cryptographic components where
required by the level of electronic authentication assurance.
NIST publication: Guide to IPsec VPNs (Special Publication 800-77);
Description: Directs agencies to properly implement virtual private
networks, such as with the use of FIPS-compliant encryption algorithms.
NIST publication: Security Requirements for Cryptographic Modules (FIPS
140-2);
Description: Requires agencies to employ this standard when designing
and implementing cryptographic modules that federal agencies operate or
are operated for them under contract.
NIST publication: Secure Hash Standard (FIPS 180-2);
Description: Mandates that agencies implement this standard whenever a
secure hash algorithm is required for federal applications, including
use by other cryptographic algorithms and protocols.
NIST publication: Digital Signature Standard (FIPS 186-3);
Description: Requires agencies to use this standard when designing and
implementing public key-based signatures systems.
NIST publication: Advanced Encryption Standard (FIPS 197);
Description: Requires use of this or other FIPS-compliant cryptographic
algorithms when an agency determines that sensitive (unclassified)
information requires cryptographic protection.
NIST publication: Standards for Security Categorization of Federal
Information and Information Systems (FIPS 199);
Description: Requires agencies to use risk-based criteria for the
security categorization of information and information systems, helping
agencies determine their needs for encryption.
NIST publication: Minimum Security Requirements for Federal Information
and Information Systems (FIPS 200);
Description: Requires agencies to select and implement minimum
information security controls based on risk.
Source: GAO analysis of NIST publications.
[A] The process of electronically establishing confidence in a user's
identity.
[End of table]
Efforts to Encrypt Sensitive Information Varied among Agencies:
The extent to which 24 major federal agencies reported that they had
implemented encryption and developed plans to implement encryption
varied across agencies. Although all agencies had initiated efforts to
encrypt stored and transmitted sensitive agency information, none had
completed these efforts or developed and documented comprehensive plans
to guide their implementation of encryption technologies. Our tests at
6 selected agencies revealed weaknesses in the encryption
implementation practices involving the installation and configuration
of FIPS-validated cryptographic modules encryption products, monitoring
the effectiveness of installed encryption technologies, the development
and documentation of policies and procedures for managing these
technologies, and the training of personnel in the proper use of
installed encryption products. As a result of these weaknesses, federal
information may remain at increased risk of unauthorized disclosure,
loss, and modification.
Reported Efforts to Encrypt Stored Information Lagged behind Efforts to
Encrypt Transmitted Information:
All 24 major federal agencies reported varying degrees of progress in
their efforts to encrypt stored and transmitted sensitive agency
information. While most of the agencies reported that they had not
completed efforts to encrypt stored sensitive information, they
reported being further along with efforts to encrypt transmitted
sensitive information. Preparing for the implementation of encryption
technologies involves numerous considerations. In response to our
survey, agencies reported that they had encountered challenges that
hinder the implementation of encryption. See appendix III for a
discussion of the hindrances identified by agencies.
Few Agencies Have Encrypted All Sensitive Information Stored on Mobile
Devices:
OMB requires agencies to encrypt all agency data on mobile computers
and devices or obtain a waiver from the Deputy Secretary of the agency
stating that the device does not contain sensitive information. Of 24
agencies that reported from July through September 2007 on the status
of their efforts to encrypt sensitive information stored on their
laptops and handheld mobile devices, 8 agencies reported having
encrypted information on less than 20 percent of these devices and 5
agencies reported having encrypted information on between 20 and 39
percent of these devices (see fig. 3). Overall, the 24 agencies
reported that about 70 percent of laptop computers and handheld devices
had not been encrypted.
Figure 3: Percentage of Encrypted Laptop Computers and Handheld
Computing Devices at 24 Major Federal Agencies:
This figure is a bar graph showing the percentage of encrypted laptop
computers and handheld computing devices at 24 major federal agencies.
The X axis is the percentage encrypted.
Number of agencies: 0-19;
Percentage encrypted: 8.
Number of agencies: 20-39;
Percentage encrypted: 5.
Number of agencies: 40-59;
Percentage encrypted: 2.
Number of agencies: 60-79;
Percentage encrypted: 3.
Number of agencies: 80-100;
Percentage encrypted: 6.
[See PDF for image]
Source: GAO analysis of agency-supplied data.
[End of figure]
In addition, 10 of 22 agencies reported having encrypted information on
less than 20 percent of portable storage media taken offsite, and 3 of
22 reported having encrypted between 20 and 39 percent. Further, 9 of
17 agencies reported encrypting sensitive information on less than 20
percent of offsite backup storage media. However, while agencies were
encrypting sensitive data on mobile computers and devices such as
laptop computers and handheld devices (e.g. personal digital
assistants), 6 agencies reported having other storage devices, such as
portable storage media, that could contain sensitive data. Of the 6
agencies, 4 had not encrypted these additional devices. Further,
officials at 1 agency had no plans to encrypt sensitive data contained
on their portable media.
In response to our query in April 2008, OMB officials stated that the
term "mobile computers and devices" was intended to include all agency
laptops, handheld devices, and portable storage devices such as
portable drives and CD-ROMs that contain agency data. Nevertheless,
this description is not clear in any of its memorandums. Until OMB
clarifies the applicability of the encryption requirement so that
agencies can complete encrypting sensitive agency information stored on
applicable devices, the information will remain at risk of unauthorized
disclosure.
Most Agencies Are Encrypting Sensitive Transmitted Information:
Most agencies reported that they had encrypted sensitive information
transmitted over wired and wireless networks. Of 23 agencies reporting
on their efforts to encrypt wired Internet transmissions of sensitive
information, 18 agencies reported encrypting nearly all or all (80
percent to 100 percent), of their transmissions over wired Internet
networks. In addition, of 21 agencies reporting on their efforts to
encrypt wireless transmissions of sensitive information, 12 reported
having encrypted all or nearly all such transmissions (see fig. 4).
Figure 4: Agency Status of Encrypting Sensitive Information Transmitted
Over Wired and Wireless Networks:
This figure is a combination bar graph showing agency status of
encrypting sensitive information transmitted over wired and wireless
networks.
Number of agencies: 0-19;
Wired Internet transmissions: 1;
Wireless network transmissions: 2.
Number of agencies: 20-39;
Wired Internet transmissions: 1;
Wireless network transmissions: 2.
Number of agencies: 40-59;
Wired Internet transmissions: 0;
Wireless network transmissions: 0.
Number of agencies: 60-79;
Wired Internet transmissions: 3;
Wireless network transmissions: 5.
Number of agencies: 80-100;
Wired Internet transmissions: 18;
Wireless network transmissions: 12.
[See PDF for image]
Source: GAO analysis of survey data reported July through September
2007 by 21 agencies regarding encryption of sensitive information
transmitted by wireless networks, and by 23 agencies regarding
encrypting such information transmitted by the Internet.
[End of figure]
Encryption Efforts Had Not Been Adequately Planned at Most Agencies:
Although 24 major federal agencies reported having encryption efforts
under way, none of the agencies had documented a comprehensive plan
that considered the security control implementation elements
recommended by NIST. According to NIST, cryptography is best designed
as an integrated part of a comprehensive information security program
rather than as an add-on feature and it suggests that implementing
technical approaches without a plan to guide the process is the least
effective approach to making use of cryptography. Specifically, as part
of an effective information security program, NIST Special Publication
800-53 requires agencies to inventory and categorize information and
systems according to risk as well as to document the baseline security
controls--such as encryption--selected to adequately mitigate risks to
information. However, of the 24 agencies we surveyed, 18 reported that
they had not completed efforts to inventory sensitive information that
they hold.
Further, NIST recommends that agencies follow NIST Special Publication
800-21 guidance when formulating their approach for integrating
cryptographic methods into new or existing systems and documenting
plans for implementing encryption, such plans consist of the following
minimum elements:
* installing and properly configuring FIPS-validated cryptographic
modules associated with selected encryption technologies;
* monitoring the continued effectiveness of installed cryptographic
controls, including the proper functioning of encryption technologies;
* documenting and implementing policies and procedures for management
of cryptographic components, such as the effective implementation and
use of FIPS-compliant encryption technologies and the establishment and
management of encryption keys; and:
* providing training to users, operators, and system engineers.
Although several agencies had developed ad hoc encryption technology
acquisition or deployment plans, none of the agencies had documented
comprehensive plans that addressed the elements recommended by NIST.
In response to our query, OMB officials stated that they monitor
agencies' progress toward implementing encryption through quarterly
data submitted by the agencies as part of the President's Management
Agenda scorecard. However, OMB did not provide us with evidence to
demonstrate monitoring of the agencies' efforts to inventory the
sensitive information they hold or to develop implementation plans. As
previously noted, agencies did not have such plans and often did not
have inventories. Until agencies develop and document comprehensive
plans to guide their approach for implementing encryption, including
completing an inventory of the sensitive information they hold,
agencies will have limited assurance that they will be able to
effectively complete implementation and manage life cycle maintenance
of encryption technologies, as we observed at selected agencies and
discuss later in this report.
Weaknesses in Encryption Implementation Practices Exist at Selected
Agencies:
Practices for implementing encryption displayed weaknesses at the 6
federal agencies we reviewed for testing.[Footnote 34] Specifically, 2
of the 6 agencies had not installed FIPS-validated cryptographic
modules encryption technologies and 4 had not configured installed
encryption technologies in accordance with FIPS 140-2 specifications.
In addition, all of the 6 agencies had not either developed or
documented policies and procedures for managing encryption
implementation, and 3 of these agencies had not adequately trained
personnel in the effective use of installed encryption technologies.
Protection of information and information systems relies not only on
the technology in place but on establishing a foundation for effective
implementation, life cycle management, and proper use of the
technologies. Until agencies resolve these weaknesses, their data may
not be fully protected.
FIPS-Compliant Encryption Products Had Not Been Installed on All Agency
Devices:
OMB requires agencies to protect sensitive agency data stored on mobile
devices by installing a FIPS-validated cryptographic modules product,
and NIST Special Publication 800-53 recommends that agencies install
FIPS-compliant products when the agency requires encryption of stored
or transmitted sensitive information. Agencies can now acquire FIPS-
validated cryptographic module products for encrypting stored
information through the General Services Administration's (GSA)
SmartBUY program (see app. IV for a description of this program). Use
of encryption technologies approved by NIST as compliant with FIPS 140-
2 provides additional assurance that the product implemented--if
configured correctly--will help protect sensitive information from
unauthorized disclosure.
Laptop computers. The Department of Housing and Urban Development (HUD)
had not installed encryption products on any of its laptop computers
despite an agency official's assertions to the contrary. HUD officials
explained that they had planned to implement FIPS-compliant encryption
in fiscal year 2008 but that implementation was delayed until late in
fiscal year 2008 due to lack of funding and it is now part of their
fiscal year 2009 budget request. In addition, the Department of
Education had not installed a FIPS-validated cryptographic modules
product to encrypt sensitive information on any of the 15 laptop
computers that we tested at one of its components. Of the 4 remaining
agencies, 3--the Department of Agriculture (USDA), the State
Department,[Footnote 35] and GSA--had installed FIPS-compliant
technologies on all 58 of the laptop computers that we tested at
specific locations within each agency. At the National Aeronautics and
Space Administration (NASA) location we tested, we confirmed that the
agency's selected FIPS-compliant encryption software had been installed
on 27 of 29 laptop computers. Although the agency asserted that it had
installed it on all 29 laptops, officials explained that they did not
have a mechanism to detect whether the encryption product was
successfully installed and functioning.
Handheld devices. All 6 of the agencies had deployed FIPS-compliant
handheld mobile devices (specifically, BlackBerry® devices) for use by
personnel. BlackBerry software and the BlackBerry enterprise server
software enable users to store, send, and receive encrypted e-mail and
access data wirelessly using FIPS-validated cryptographic modules
encryption algorithms.
Virtual private networks. One of three virtual private networks
installed by the Department of Education was not a FIPS-compliant
product. The remaining 5 agencies had installed FIPS-validated
cryptographic modules products to protect transmissions of sensitive
information.
Certain Agencies Did Not Consistently Configure or Install Encryption
Technologies in Accordance with NIST Requirements:
Although most agencies had installed FIPS-compliant products to encrypt
information stored on devices and transmitted across networks, some did
not monitor whether the product was functioning or configure the
product to operate only in a FIPS-validated cryptographic modules
secure mode. Until agencies configure FIPS-compliant products in a
secure mode as directed by NIST--for example, by enabling only FIPS-
validated cryptographic module encryption algorithms--protection
against unauthorized decryption and disclosure of sensitive information
will be diminished.
Laptop computers. Of the 4 agencies with FIPS-compliant products
installed on laptop computers, 3 had configured the product to operate
in a secure mode as approved by NIST on all devices that we examined.
However, a component of the Department of Agriculture had not
effectively monitored the effectiveness and continued functioning of
encryption products on 5 of the 52 laptop computers that we examined.
Agency officials were unaware that the drives of these devices had not
been correctly encrypted. The drives, while having the encryption
software installed, did not encrypt the data on the drive. This
agency's system administrator attributed the noncompliance to the
failure of a step in the installation process; specifically, the laptop
had not been connected to the agency's network for a sufficient period
of time to complete activation of the user's encryption key by the
central server, and the agency had no mechanism in place to monitor
whether the installed product was functioning properly.
Handheld devices. Three of the 6 agencies--the Department of Education,
HUD, and NASA--had not configured their handheld BlackBerry devices to
encrypt the data contained on the devices. All six of the agencies
encrypted data in transit because FIPS-validated cryptographic modules
encryption was built into the BlackBerry device software. However,
agencies must enable the encryption to protect information stored on
the device itself by making a selection to do so and requiring the user
to input a password. Officials at these 3 agencies stated that they had
not enabled this protective feature on all their BlackBerry devices due
to operational issues with enabling content protection and that they
are awaiting a solution from the vendor.
Virtual private networks. Two of the 6 agencies--the Department of
Education and HUD--had not configured their virtual private networking
technologies to use only strong, FIPS-validated cryptographic modules
encryption algorithms for encrypting data and to ensure message
integrity. The use of weak encryption algorithms--ones that have not
been approved by NIST or that have explicitly been disapproved by NIST-
-provides limited assurance that information is adequately protected
from unauthorized disclosure or modification.
Agencies Had Not Developed or Documented Encryption Policies and
Procedures:
The weaknesses in encryption practices identified at the 6 selected
agencies existed in part because agencywide policies and procedures did
not address federal guidelines related to implementing and using
encryption. NIST Special Publication 800-53 recommends that agencies
develop a formal, documented policy that addresses the system and
communications controls as well as a formal, documented procedure to
facilitate implementation of these controls. While policies should
address the agency's position regarding use of encryption and
management of encryption keys, the implementation procedures should
describe the steps for performance of specific activities such as user
registration, system initialization, encryption key generation, key
recovery, and key destruction. However, 4 of the 6 agencies did not
have a policy that addressed the establishment and management of
cryptographic keys as directed by NIST, and none of the 6 agencies had
detailed procedures for implementing this control.
Furthermore, according to NIST guidance, agency policies and procedures
are to address how agencies will install and configure FIPS-compliant
encryption products. All agencies' policies addressed how the agency
planned to comply with these requirements. However, 4 agencies did not
have detailed procedures requiring installation and configuration of
FIPS-compliant cryptography (see table 5).
Table 5: Agency Policies and Procedures That Address NIST Encryption
Controls:
Agency: USDA;
Encryption key establishment and management control: Policy: Yes;
Encryption key establishment and management control: Procedures: No;
Installation and configuration of FIPS-compliant encryption products:
Policy: Yes;
Installation and configuration of FIPS-compliant encryption products:
Procedure: Yes.
Agency: Education;
Encryption key establishment and management control: Policy: No;
Encryption key establishment and management control: Procedures: No;
Installation and configuration of FIPS-compliant encryption products:
Policy: Yes;
Installation and configuration of FIPS-compliant encryption products:
Procedure: No.
Agency: HUD;
Encryption key establishment and management control: Policy: Yes;
Encryption key establishment and management control: Procedures: No;
Installation and configuration of FIPS-compliant encryption products:
Policy: Yes;
Installation and configuration of FIPS-compliant encryption products:
Procedure: No.
Agency: State;
Encryption key establishment and management control: Policy: No;
Encryption key establishment and management control: Procedures: No;
Installation and configuration of FIPS-compliant encryption products:
Policy: Yes;
Installation and configuration of FIPS-compliant encryption products:
Procedure: No.
Agency: GSA;
Encryption key establishment and management control: Policy: No;
Encryption key establishment and management control: Procedures: No;
Installation and configuration of FIPS-compliant encryption products:
Policy: Yes;
Installation and configuration of FIPS-compliant encryption products:
Procedure: No.
Agency: NASA;
Encryption key establishment and management control: Policy: No;
Encryption key establishment and management control: Procedures: No;
Installation and configuration of FIPS-compliant encryption products:
Policy: Yes;
Installation and configuration of FIPS-compliant encryption products:
Procedure: Yes.
Source: GAO analysis of agency policies and procedures for NIST
encryption controls.
[End of table]
Policies and procedures for installing and configuring encryption
technologies and for managing encryption keys provide the foundation
for the effective implementation and use of encryption technologies and
are a necessary element of agency implementation plans. Until these
agencies develop, document, and implement these policies and
procedures, the agencies' implementation of encryption may be
ineffective in protecting the confidentiality, integrity, and
availability of sensitive information.
Three Agencies Had Not Adequately Trained Personnel to Use Installed
Encryption Products:
Also contributing to the weaknesses at 3 of 6 agencies was the failure
to adequately train personnel in the proper use of installed encryption
technology. Specifically:
* USDA officials stated that users had not been trained to check for
continued functioning of the software after installation but that they
were in the process of including encryption concepts in its annual
security awareness training required for all computer users. At the
conclusion of our review, USDA had not yet completed this effort.
* At the component of the Department of Education where testing was
conducted, some users were unaware that the agency had installed
encryption software on their laptop computers. These users, therefore,
had never used the software to encrypt sensitive files or folders.
Further, while an agency official asserted that encryption training was
provided, the training documents provided pertained only to the
protection of personally identifiable information and did not provide
specifics on how to use the available encryption products. Users we
spoke with were unaware of any available training.
* At NASA, several users stated that they had refused to allow the
encryption software to be installed on their devices, while other users
said they were unfamiliar with the product. Although NASA requires
users to receive training when encryption is installed and has
developed a training guide, there was no mechanism in place to track
whether users complete the necessary training.
Until these agencies provide effective training to their personnel in
the proper management and use of installed encryption technologies,
they will have limited confidence in the ability of the installed
encryption technologies to function as intended.
Conclusions:
Despite the availability of numerous types of commercial encryption
technologies and federal policies requiring encryption, most federal
agencies had just begun to encrypt sensitive information on mobile
computers and devices. In addition, agencies had not documented
comprehensive plans to guide activities for effectively implementing
encryption. Although governmentwide efforts were under way, agency
uncertainty with OMB requirements hampered progress. In addition,
weaknesses in encryption practices at six selected federal agencies--
including practices for installing and configuring FIPS-validated
cryptographic modules products, monitoring the effectiveness of these
technologies, developing encryption policies and procedures, and
training personnel--increased the likelihood that the encryption
technologies used by the agencies will not function as intended. Until
agencies address these weaknesses, sensitive federal information will
remain at increased risk of unauthorized disclosure, modification, or
loss.
Recommendations for Executive Action:
We are making 20 recommendations to the Director of the Office of
Management and Budget and six federal departments and agencies to
strengthen encryption of federal systems.
To assist agencies with effectively planning for and implementing
encryption technologies to protect sensitive information, we recommend
that the Director of the Office of Management and Budget take the
following two actions:
* clarify governmentwide policy requiring agencies to encrypt sensitive
agency data through the promulgation of additional guidance and/or
through educational activities and:
* monitor the effectiveness of the agencies' encryption implementation
plans and efforts to inventory the sensitive information they hold.
To assist the Department of Agriculture as it continues to deploy its
departmentwide encryption solutions and to improve the life cycle
management of encryption technologies, we recommend that the Secretary
of Agriculture direct the chief information officer to take the
following three actions:
* establish and implement a mechanism to monitor the successful
installation and effective functioning of encryption products installed
on devices,
* develop and implement departmentwide procedures for encryption key
establishment and management, and:
* develop and implement a training program that provides technical
support and end-user personnel with adequate training on encryption
concepts, including proper operation of the specific encryption
products used.
We also recommend that the Secretary of the Department of Education
direct the chief information officer to take the following five actions
to improve the life cycle management of encryption technologies:
* evaluate, select, and install FIPS 140-compliant products for all
encryption needs and document a plan for implementation that addresses
protection of all sensitive information stored and transmitted by the
agency;
* configure installed FIPS-compliant encryption technologies in
accordance with FIPS-validated cryptographic modules security settings
for the product;
* develop and implement departmentwide policy and procedures for
encryption key establishment and management;
* develop and implement departmentwide procedures for use of FIPS-
compliant cryptography; and:
* develop and implement a training program that provides technical
support and end-user personnel with adequate training on encryption
concepts, including proper operation of the specific encryption
products used.
To ensure that the Department of Housing and Urban Development is
adequately protecting its sensitive information and to improve the life
cycle management of encryption technologies at the department, we
recommend that the Secretary of Housing and Urban Development direct
the chief information officer to take the following three actions:
* evaluate, select, and install FIPS 140-compliant products for all
encryption needs and document a plan for implementation that addresses
protection of all sensitive information stored and transmitted by the
agency;
* configure installed FIPS-compliant encryption technologies in
accordance with FIPS-validated cryptographic modules security settings
for the product; and:
* develop and implement departmentwide procedures for the use of FIPS-
compliant cryptography and for encryption key establishment and
management.
To improve the life cycle management of encryption technologies at the
Department of State, we recommend that the Secretary of State direct
the chief information officer to take the following two actions:
* develop and implement departmentwide policy and procedures for
encryption key establishment and management and:
* develop and implement departmentwide procedures for use of FIPS-
compliant cryptography.
To improve the life cycle management of encryption technologies at the
General Services Administration, we recommend that the Administrator of
the General Services Administration direct the chief information
officer to take the following two actions:
* develop and implement departmentwide policy and procedures for
encryption key establishment and management and:
* develop and implement departmentwide procedures for use of FIPS-
compliant cryptography.
As the National Aeronautics and Space Administration continues to plan
for a departmentwide encryption solution and to improve the life cycle
management of encryption technologies, we recommend that the
Administrator of the National Aeronautics and Space Administration
direct the chief information officer to take the following three
actions:
* establish and implement a mechanism to monitor the successful
installation and effective functioning of encryption products installed
on devices,
* develop and implement departmentwide policy and procedures for
encryption key establishment and management, and:
* develop and implement a training program that provides technical
support and end-user personnel with adequate training on encryption
concepts, including proper operation of the specific encryption
products used.
Agency Comments:
We received written comments on a draft of this report from the
Administrator, Office of E-Government and Information Technology at OMB
(reproduced in app. V). OMB generally agreed with the report's contents
and stated that it would carefully consider our recommendations. We
also received written comments from Education's Chief Information
Officer (reproduced in app. VI), from HUD's Acting Chief Information
Officer (reproduced in app. VII), from the Department of State
(reproduced in app. VIII), from the Acting Administrator of the GSA
(reproduced in app. IX), and from the Deputy Administrator of NASA
(reproduced in app. X). We received comments via email from the
Department of Agriculture.
In these comments, the Departments of Agriculture, Education, HUD, and
State; the GSA; and NASA agreed with our recommendations to their
respective departments. Agencies also stated that they had implemented
or were in the process of implementing our recommendations. In
addition, NIST and the Social Security Administration provided
technical comments, which we have incorporated as appropriate.
As we agreed with your offices, unless you publicly announce the
contents of this report earlier, we plan no further distribution of it
until 30 days from the date of this letter. At that time, we will send
copies of this report to interested congressional committees and the
agency heads and inspectors general of the 24 major federal agencies.
We will also make copies available to others on request. In addition,
this report will be available at no charge on the GAO Web site at
[hyperlink, http://www.gao.gov].
If you have any questions or wish to discuss this report, please
contact me at (202) 512-6244 or wilshuseng@gao.gov. Contact points for
our Offices of Congressional Relations and Public Affairs may be found
on the last page of this report. GAO staff who made major contributions
to this report are listed in appendix XI.
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
The objectives of our review were to determine (1) how commercially
available encryption technologies could help federal agencies protect
sensitive information and reduce risks; (2) the federal laws, policies,
and guidance for using encryption technologies to protect sensitive
information; and (3) the extent to which agencies have implemented, or
planned to implement, encryption technologies to protect sensitive
information.
To address the first objective, we reviewed prior GAO reports and
reviewed documentation regarding products validated by the National
Institute of Standards and Technology (NIST) Cryptographic Module
Validation Program to identify commercially available encryption
technologies. Additionally, we met with a vendor of an encryption
product and interviewed NIST encryption experts regarding the
characteristics of products that can reduce risks to agencies.
To address the second objective, we reviewed prior GAO and agency
inspector general reports to identify relevant laws and guidance such
as the Federal Information Security Management Act of 2002 (FISMA) and
the Privacy Act of 1974 to identify mandatory and optional practices
for protecting sensitive information (including personally identifiable
information but excluding classified national security information)
that federal agencies collect, process, store, and transmit. We
examined the laws to identify federal agencies responsible for
promulgating federal policies and standards on the use of encryption.
Additionally, we researched official publications issued by the Office
of Management and Budget and NIST and interviewed officials from these
agencies to identify the policies, standards, and guidance on
encryption that have been issued.
To address the third objective, we collected and analyzed agency-
specific policies, plans, and practices through a data request and also
conducted a survey of the 24 major federal agencies. A survey
specialist designed the survey instrument in collaboration with subject
matter experts. Then, the survey was pretested at 4 of these agencies
to ensure that the questions were relevant and easy to comprehend. For
each agency surveyed, we identified the appropriate point of contact,
notified each one of our work, and distributed the survey along with a
data request to each via e-mail in June 2007. In addition, we discussed
the purpose and content of the survey and data request with agency
officials when requested. All 24 agencies responded to our survey and
data request from June to September 2007; results are reported as of
this date. We contacted agency officials when necessary for additional
information or clarification of agencies' status of encryption
implementation. We did not verify the accuracy of the agencies'
responses; however, we reviewed supporting documentation that agencies
provided to corroborate information provided in their responses. We
then analyzed the results from the survey and data request to identify:
* the types of information encrypted in data when stored and in
transit;
* technologies used by the agency to encrypt information;
* whether the technologies implemented by the agency met federal
guidelines;
* the extent to which the agency has implemented, or plans to
implement, encryption; and:
* any challenges faced and lessons learned by agencies in their efforts
to encrypt sensitive but unclassified information.
Conducting any survey may introduce errors. For example, differences in
how a particular question is interpreted, the sources of information
that are available to respondents, or how the data are entered or were
analyzed can introduce variability into the survey results. We took
steps in the development of the survey instrument, the data collection,
and the data analysis to minimize errors.
In addition, we tested the implementation of encryption technologies at
6 agencies to determine whether each agency was complying with federal
guidance that required agencies to use NIST-validated encryption
technology. Out of 24 major federal agencies, we selected 6 that met
one or more of the following conditions: they (1) had not been tested
under a recent GAO engagement, (2) had reported having initiated
efforts to install FIPS-validated cryptographic modules encryption
technologies, (3) had experienced publicized incidents of data
compromise, or (4) were reasonably expected to collect, store, and
transmit a wide range of sensitive information. Specifically, we tested
the implementation of encryption for BlackBerry servers, virtual
private networks, or a random selection of laptop computers at specific
locations at the following 6 agencies within the Washington, D.C.
area:[Footnote 36]
* U.S. Department of Agriculture,
* Department of Education,
* Department of Housing and Urban Development,
* Department of State,[Footnote 37]
* General Services Administration, and:
* National Aeronautics and Space Administration:
At each of these agencies, we requested an inventory of laptop
computers that were located at agency facilities in the Washington,
D.C., metro area and that were encrypted. For each agency, we
nonstatistically selected one location at which to perform testing, and
thus the encryption test results for each agency cannot be projected to
the entire agency. We performed the testing between September and
December 2007. At each location where laptop computers were tested,
there were a small number of laptop computers that were requested as
part of our sample but which were not made available to us for testing.
Department officials cited several reasons for this, including that the
user of the device could not bring it to the location in time for our
testing.
In testing the laptop computers, we determined whether encryption
software had been installed on the device and whether the software had
been configured properly to adhere to federally required standards.
Although we identified unencrypted laptop computers at each agency, we
were not able to make statistical estimates of the percentage of
unencrypted devices at each location. The small number of devices in
each sample not made available to us for our testing compromised the
randomness of each sample.
Additionally, for each of the selected locations among the 6 agencies,
we requested information on their BlackBerry servers, chose the server
with the greatest number of users for testing, and reviewed through
observation the specific security configuration settings. We also
requested and examined agency-provided information for their virtual
private networks to determine if encrypted networks were using products
validated by NIST. Finally, we interviewed agency officials regarding
their practices for encrypting stored data as well as data in transit,
and for encryption key establishment and management.
Furthermore, we reviewed and analyzed data on the General Services
Administration's SmartBUY program to determine the extent of savings
the program provides to federal agencies and how certain agencies have
already benefited from the program.
We conducted this performance audit from February 2007 through June
2008 in accordance with generally accepted government auditing
standards. Those standards require that we plan and perform the audit
to obtain sufficient, appropriate evidence to provide a reasonable
basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for
our findings and conclusions based on our audit objectives.
[End of section]
Appendix II: Important Considerations for Implementing Encryption to
Effectively Reduce Agency Risks:
Encryption technology may help protect sensitive information from
compromise; however, there are several important implementation and
management considerations when selecting and implementing this
technology. Encryption can be a powerful tool, but implementing it
incorrectly--such as by failing to properly configure the product,
secure encryption keys, or train users--can, at best, result in a false
sense of security and, at worst, render data permanently inaccessible.
Designing, building, and effectively implementing commercially
available cryptographic technologies involves more than installing the
technology. Decisions must be made for managing encryption keys and
related cryptographic components, as well as for managing mobile
devices and using public key infrastructure (PKI) technologies.
Ultimately, the effectiveness of the encryption technologies used to
protect agency information and reduce risk depends on how an agency
implements and manages these technologies and the extent to which they
are an integral part of an effectively enforced information security
policy that includes sound practices for managing encryption keys.
Encryption Key Management Considerations:
Policies and procedures. Comprehensive policies for the management of
encryption and decryption keys--the secret codes that lock and unlock
the data--are an important consideration. Providing lifetime management
of private keys and digital certificates across hundreds of
applications and thousands of servers, end-users, and networked devices
can quickly strain an agency's resources. For example, if a key is lost
or damaged, it may not be possible to recover the encrypted data.
Therefore, it is important to ensure that all keys are secured and
managed properly by planning key management processes, procedures, and
technologies before implementing storage encryption technologies.
According to NIST, this planning would include all aspects of key
management, including key generation, use, storage, and destruction. It
would also include a careful consideration of how key management
practices can support the recovery of encrypted data if a key is
inadvertently destroyed or otherwise becomes unavailable (for instance,
because a user unexpectedly resigns or loses a cryptographic token
containing a key). An example of recovery preparation is storing
duplicates of keys in a centralized, secured key repository or on
physically secured removable media. Additional considerations for the
encryption of removable media are how changing keys may affect access
to encrypted storage on the media and what compensating controls could
be developed, such as retaining the previous keys in case they are
needed.
Key storage location. Another consideration that NIST describes is
deciding where the local keys will be stored. For some encryption
technologies, such as full disk encryption and many file/folder
encryption products, there are often several options for key location,
including the local hard drive, a flash drive, a cryptographic token,
or a trusted platform module chip. Some products also permit keys to be
stored on a centralized server and retrieved automatically after the
user authenticates successfully. For virtual disk encryption, the main
encryption key is often stored encrypted within the disk or container
itself.
Access to encryption keys. Another consideration is properly
restricting access to encryption keys. According to NIST, storage
encryption technologies should require the use of one or more
authentication mechanisms, such as passwords, smart cards, and
cryptographic tokens, to decrypt or otherwise gain access to a storage
encryption key. The keys themselves should be logically secured
(encrypted) or physically secured (stored in a tamper-resistant
cryptographic token). The authenticators used to retrieve keys should
also be secured properly.
Managing cryptographic components related to encryption keys. In
addition to key management, NIST describes several other considerations
when planning a storage encryption technology. Setting the cryptography
policy involves choosing the encryption algorithm, mode of
cryptographic operation, and key length. Federal agencies must also use
NIST-validated cryptographic modules configured for FIPS-compliant
algorithms and key lengths. In addition, several FIPS-compliant
algorithms are available for integrity checking. Another consideration
for managing cryptographic components is how easily an encryption
product can be updated when stronger algorithms and key sizes become
available in the future.
Other Implementation Considerations:
Centralized management of mobile devices. NIST recommends centralized
management for most storage encryption deployments because of its
effectiveness and efficiency for policy verification and enforcement,
key management, authenticator management, data recovery, and other
management tasks. Centralized management can also automate these
functions: deployment and configuration of storage encryption software
to end user devices, distribution and installation of updates,
collection and review of logs, and recovery of information from local
failures.
PKI technology. Because PKI technology uses a public key as part of its
encryption system, PKI systems with key management can be used to avoid
the problem of lost keys. Data encrypted with PKI relies on one public
key, so the private key of the person encrypting the data isn't
necessarily required to decrypt it. However, if an unauthorized user is
able to obtain a private key, the digital certificate could then be
compromised. Agencies considering PKI technology must ensure that the
key systems of different agencies are compatible for cross-agency
collaboration on tasks such as security incident information sharing.
Further, users of certificates are dependent on certification
authorities to verify the digital certificates. If a valid
certification authority is not used, or a certification authority makes
a mistake or is the victim of a cyber attack, a digital certificate may
be ineffective.
Ongoing maintenance of encryption technologies. Systems administrators
responsible for encryption technology maintenance should be able to
configure and manage all components of the technology effectively and
securely. According to NIST, it is particularly important to evaluate
the ease of deployment and configuration, including how easily the
technology can be managed as the technology is scaled to larger
deployments. Another consideration is the ability of administrators to
disable configuration options so that users cannot circumvent the
intended security. Other maintenance considerations NIST describes
include the effects of patching/upgrading software, changing software
settings (changing cryptographic algorithms or key sizes), uninstalling
or disabling encryption software, changing encryption/decryption keys,
and changing user or administrator passwords.
[End of section]
Appendix III: Hindrances Faced by Agencies when Implementing
Encryption:
Preparing an agency for encryption presents numerous challenges to
agencies, including selecting an adequate combination of cost-effective
baseline security controls, properly configuring the networks and user
devices within the information technology (IT) infrastructure to
accommodate selected encryption technologies, providing training to
personnel, and managing encryption keys. In response to our survey,
agencies reported several conditions that hinder their ability to
encrypt sensitive information as required by the Office of Management
and Budget.
In response to our survey, all 24 agencies reported hindrances with
implementing encryption. These hindrances included prohibitive costs;
user acceptance; user training; data backup and recovery; data archival
and retrieval; interoperability; infrastructure; vendor support for
encryption products acquired; availability of FIPS-compliant products
to meet the needs of uncommon or unique devices, applications, or
environments within the agency's IT infrastructure; and management
support for migration to encryption controls. Agencies noted the level
of hindrance caused by these challenges ranged from little or no
hindrance to great or very great hindrance. The most challenging
conditions are discussed below.
Prohibitive costs. Nine agencies reported that the cost of acquiring
and implementing encryption was their greatest hindrance, and 13
agencies cited this condition as somewhat of a hindrance or a moderate
hindrance. As reported in appendix IV, a governmentwide initiative
(SmartBUY) has been established to assist agencies with overcoming this
hindrance.
User acceptance and training. Some encryption technologies can be
burdensome to users and can require specialized training on encryption
concepts and proper installation, maintenance, and use of encryption
products. Sixteen agencies reported facing somewhat of a hindrance or a
moderate hindrance in obtaining user acceptance of encryption
implementations and in training personnel. Four agencies reported a
great or very great hindrance from lack of user acceptance, and 2
agencies reported a great hindrance from insufficient training.
Data backup, recovery, archiving, and retrieval. Agencies must
establish policies and procedures for management of encryption keys,
which are necessary to recover data from back-ups in the event of a
service interruption or disaster, or to retrieve data in archived
records, perhaps many years in the future. For example, if the key is
not properly backed up and is on a server that has been destroyed in a
fire or the key used to encrypt archived records changes over time,
data encrypted with the key may be irretrievably lost. Sixteen agencies
reported facing somewhat of a hindrance or a moderate hindrance with
backup and recovery, and 15 agencies reported the same level of
hindrance with data archiving and retrieval.
Interoperability. Key systems and technologies of different agencies
need to be compatible with each other for cross-agency collaboration.
Five agencies reported that lack of interoperability was a great or
very great hindrance, and 13 reported somewhat of a hindrance or a
moderate hindrance.
Infrastructure considerations. Six agencies reported facing a great or
very great hindrance in readying their IT infrastructure for encryption
and 11 reported this was somewhat of a hindrance or a moderate
hindrance.
Table 6 summarizes the number of agencies reporting the extent to which
10 conditions affect their agency's ability to implement encryption.
Table 6: Hindrances to Implementing Encryption at Federal Agencies:
Hindrance: Prohibitive costs;
Little or no hindrance: 2;
Some hindrance: 8;
Moderate hindrance: 5;
Great or very great hindrance: 9.
Hindrance: Lack of user acceptance;
Little or no hindrance: 3;
Some hindrance: 12;
Moderate hindrance: 4;
Great or very great hindrance: 4.
Hindrance: Difficulties with data backup and recovery;
Little or no hindrance: 5;
Some hindrance: 10;
Moderate hindrance: 6;
Great or very great hindrance: 3.
Hindrance: Insufficient training;
Little or no hindrance: 4;
Some hindrance: 13;
Moderate hindrance: 3;
Great or very great hindrance: 2.
Hindrance: Difficulties with archiving and retrieving;
Little or no hindrance: 5;
Some hindrance: 12;
Moderate hindrance: 3;
Great or very great hindrance: 3.
Hindrance: Lack of interoperability;
Little or no hindrance: 3;
Some hindrance: 6;
Moderate hindrance: 7;
Great or very great hindrance: 5.
Hindrance: Lack of infrastructure readiness;
Little or no hindrance: 7;
Some hindrance: 2;
Moderate hindrance: 9;
Great or very great hindrance: 6.
Hindrance: Lack of vendor support;
Little or no hindrance: 8;
Some hindrance: 8;
Moderate hindrance: 6;
Great or very great hindrance: 1.
Hindrance: Lack of FIPS-compliant products;
Little or no hindrance: 7;
Some hindrance: 6;
Moderate hindrance: 4;
Great or very great hindrance: 4.
Hindrance: Lack of management acceptance;
Little or no hindrance: 7;
Some hindrance: 9;
Moderate hindrance: 1;
Great or very great hindrance: 2.
Source: GAO analysis of agency-reported data. Respondents were
permitted to select more than one condition.
[End of table]
Although agencies reported facing hindrances to implementing
encryption, a new program (GSA SmartBUY specific to encryption
products) established after we started our review, offers agencies
options to overcome key hindrances. For example, prohibitive costs and
acquiring FIPS-compliant products are two hindrances that agencies may
be able to address through SmartBUY. As discussed in appendix IV,
discounted pricing is available for data-at-rest encryption software.
In addition, all products available through SmartBUY use cryptographic
modules validated under FIPS 140-2 security requirements.
[End of section]
Appendix IV: GSA SmartBUY Program for Data-at-Rest Encryption Products:
To help agencies comply with OMB requirements for encrypting
information on mobile devices, a governmentwide acquisition vehicle was
established for encryption products for stored data. Through a
governmentwide program known as SmartBUY (Software Managed and Acquired
on the Right Terms), agencies can procure encryption software at
discounted prices. According to the General Services Administration
(GSA), SmartBUY is a federal government procurement vehicle designed to
promote effective enterprise-level software management. By leveraging
the government's immense buying power, SmartBUY could save taxpayers
millions of dollars through governmentwide aggregate buying of
commercial off-the-shelf software products.
SmartBUY officially began in 2003, when OMB issued a memo emphasizing
the need to reduce costs and improve quality in federal purchases of
commercial software.[Footnote 38] The memo designates GSA as the
executive agent to lead the interagency initiative in negotiating
governmentwide enterprise licenses for software. SmartBUY establishes
strategic enterprise agreements with software publishers (or resellers)
via blanket purchase agreements.
OMB Memorandum 04-08, Maximizing Use of SmartBUY and Avoiding
Duplication of Agency Activities with the President's 24 E-Gov
Initiatives, requires agencies to review SmartBUY contracts to
determine whether they satisfy agency needs--such as for products to
encrypt stored data--and, absent a compelling justification for doing
otherwise, acquire their software requirements from the SmartBUY
program.
The issuance of OMB's May 2006 recommendation to encrypt mobile devices
contributed to the addition of 11 SmartBUY agreements for stored data
encryption products established in June 2007. The products offered fall
into one of three software and hardware encryption product categories:
full disk encryption, file encryption, or integrated full disk/file
encryption products. All products use cryptographic modules validated
under FIPS 140-2 security requirements.
Volume discounts on encryption products are available when purchasing
in tiers of 10,000, 33,000, and 100,000 users. Each of the 11
agreements has its own pricing structure, which may include maintenance
and training in addition to licenses for users. Discounts on volume
pricing can range up to 85 percent off GSA schedule prices.
Table 7 provides an example of the discounted pricing available from 1
of the 11 SmartBUY agreements for encryption software.
Table 7: Examples of Volume Discount Pricing Available through
SmartBUY:
Order quantity: 1-99;
Commercial list price: $199.00;
GSA schedule price: $171.08;
SmartBUY price: $133.52.
Order quantity: 100-499;
Commercial list price: 164.00;
GSA schedule price: 140.99;
SmartBUY price: 102.47.
Order quantity: 500-999;
Commercial list price: 149.00;
GSA schedule price: 128.10;
SmartBUY price: 94.19.
Order quantity: 1,000-1,999;
Commercial list price: 133.00;
GSA schedule price: 114.34;
SmartBUY price: 81.77.
Order quantity: 2,000-2,999;
Commercial list price: 119.00;
GSA schedule price: 102.31;
SmartBUY price: 76.59.
Order quantity: 3,000-4,999;
Commercial list price: 111.00;
GSA schedule price: $95.43;
SmartBUY price: 71.42.
Order quantity: 5,000-9,999;
Commercial list price: 98.00;
GSA schedule price: [Empty];
SmartBUY price: 67.50.
Order quantity: 10,000-24,999;
Commercial list price: $83.00;
GSA schedule price: [Empty];
SmartBUY price: 54.75.
Order quantity: 25,000-49,999;
Commercial list price: [Empty];
GSA schedule price: [Empty];
SmartBUY price: 44.00.
Order quantity: 50,000-99,999;
Commercial list price: [Empty];
GSA schedule price: [Empty];
SmartBUY price: 37.00.
Order quantity: 100,000-199,999;
Commercial list price: [Empty];
GSA schedule price: [Empty];
SmartBUY price: $30.00.
Source: GSA supplied documentation.
[End of table]
As of January 2008, 10 agencies had purchased encryption products--such
as software licenses, annual maintenance services, and training--from
the stored data SmartBUY list, realizing significant cost savings. One
of those agencies--the Social Security Administration--purchased
250,000 licenses of one of the stored data products at a savings of
$6.7 million off the GSA schedule prices. Additionally, USDA negotiated
an agreement for 180,000 licenses at $9.63 each, as opposed to the GSA
unit price of $170 per license. The large number of licenses acquired
allowed USDA to negotiate the low price. Several agencies noted that
considering an enterprisewide deployment of encryption can be helpful
with issues of standardization, interoperability, and infrastructure
readiness. While 10 agencies have already acquired encryption products
through the SmartBUY program, several agencies are still in the process
of assessing which encryption products (including those available under
the SmartBUY program) will best suit agency needs.
[End of section]
Appendix V Comments from the Office of Management and Budget:
Executive Office Of The President:
Office Of Management And Budget:
Washington, DC. 20503
June 19, 2008
Gregory C. Wilshusen:
Director, Information Security Issues:
United States Government Accountability Office:
441 G St., NW:
Washington, D.C. 20548:
Dear Mr. Wilshusen:
Thank your for the opportunity to review and comment on General
Accountability Office's (GAO's) draft report entitled, "Federal Agency
Efforts to Encrypt Sensitive Information Are Under Way, but Work
Remains." The Office of Management and Budget (OMB) appreciates the
work GAO has devoted to this issue.
As the draft report indicates, OMB has been working to provide Federal
Departments and agencies with the tools and guidance necessary for the
implementation and use of encryption appropriately to protect Federal
information. In OMB Memorandum M-06- 16, dated June 23, 2006,
"Protection of Sensitive Agency Information," OMB recommended agencies
"encrypt all data on mobile computers/devices which carry agency data
unless the data is determined to be non-sensitive, in writing, by your
Deputy Secretary or an individual he/she may designate in writing."
In OMB Memorandum M-07-16, dated May 22, 2007, "Safeguarding Against
and Responding to the Breach of Personally Identifiable Information,"
OMB required agencies to implement this policy for personally
identifiable information.
In order to help agencies implement encryption requirements, OMB has
been working with both the Commerce Department's National Institute of
Standards and Technology (NIST) and the General Services Administration
(GSA) to provide agencies with guidance and tools. GSA and the
Department of Defense established a Software Managed and Acquired on
the Right Terms (SmartBUY) agreement for products certified through the
NIST Federal Information Processing Standards (F1PS) 140-2 Cryptomodule
Validation Program. Agencies are using these certified products to
encrypt data on agency information systems. SmartBUY is a Federal
government procurement vehicle designed to promote effective enterprise
level software acquisition and management. By leveraging the
government's immense buying power, SmartBUY has saved taxpayers
millions of dollars through government wide aggregate buying of
Commercial off-the-shelf (COTS) software products, and agencies are
utilizing new SmartBUY agreements to acquire quality security products
at lower costs. To date, the Federal government has avoided and/or
saved more than $600 million dollars ($133 million in 2007) through the
use of this program.
Benefits of the SmartBUY program are not confined solely to Federal
agencies; the encryption Blanket Purchase Agreement (BPA) was written
so that state and local governments can also take advantage of this
opportunity. The state and local governments are participating under
GSA's Cooperative Purchasing Program, which allows them to purchase IT
products and services from both GSA's Multiple Award Schedule 70 and
Consolidated Schedules that have IT special item numbers. To date
127,296 licenses have been issued across 15 states (including local
governments). This has resulted in savings of $24 million on purchases
of encryption software through use of these Federal contracts and
approximately $8 million using the special state and local government
offers -- for a total of more than $32 million in savings/cost
avoidance to date.
In addition to ensuring agencies have appropriate guidance and tools,
OMB closely monitors agency progress on policy implementation through a
variety of mechanisms, including the President's Management Agenda
(PMA) E-Government Scorecard. The PMA E-Government Scorecard process
includes ongoing staff-level dialogue between OMB and the agencies, and
quarterly oversight assessments which OMB discusses with agency
managers.
The draft GAO report makes two recommendations to the OMB Director.
These draft recommendations are for OMB to:
* Clarify government-wide policy requiring agencies to encrypt
sensitive agency data through the promulgation of additional guidance
and/or through educational activities.
* Monitor the effectiveness of agency encryption implementation plans
and agency efforts to inventory the sensitive information it holds. OMB
will carefully consider these recommendations to determine whether or
not any additional activities in these areas will help to improve the
effective implementation and use of encryption products across the
Federal government. In particular, we will attempt to leverage existing
government wide educational vehicles and forums, such as the CIO
Council's Best Practices Committee.
Thank you again for the opportunity to comment on the draft report.
Sincerely,
Karen S. Evans:
Administrator, Office of E-Government and Information Technology:
[End of section]
Appendix VI: Comments from the Department of Education:
United States Department Of Education:
Office Of The Chief Information Officer:
The Chief Information Officer:
400 Maryland Avenue, S.W. Washington D.C. 20202:
[hyperlink, http://www.ed.gov]:
May 28, 2008:
Mr. Gregory C. Wilshusen:
Director, Information Security Issues:
Government Accountability Office:
441 G Street, NW:
Washington, DC 20548:
Dear Mr. Wilshusen:
I am providing comments on behalf of the U.S. Department of Education
(Department) on the five recommendations listed on page 40 of the DRAFT
report by the General Accountability Office (GAO) (GAO-08-525),
"Federal Agency Efforts to Encrypt Sensitive Information Are Under Way,
but Work Remains." The draft report includes recommendations that the
Secretary of the Department of Education direct the chief information
officer to take five actions to improve the management of encryption
technologies throughout the agency. We have the following responses
regarding the recommendations:
Recommendation 1. Evaluate, select, and install FIPS 140-compliant
products for all encryption needs and document a plan for
implementation that addresses protection of all sensitive information
stored and transmitted by the agency.
The Department has already implemented many solutions with regard to
encryption technologies to safeguard data. We plan to further evaluate
current safeguards and determine what improvements would be
appropriate. Thus, we agree with GAO's recommendation to evaluate,
select, and install additional Federal Information Processing Standards
(FIPS) 140-2 compliant solutions for all encryption needs and for
documenting plans for addressing the protection of all sensitive
information stored and transmitted by the Department.
Recommendation 2. Configure installed FIPS-compliant encryption
technologies in accordance with NIST-approved security settings for the
product.
The Department agrees with GAO's recommendation for configuring all
currently installed FIPS-compliant encryption technologies in
accordance with National Institute of Standards and Technology (NIST)-
approved security settings. The Department further intends to develop
plans to ensure that all virtual private network (VPN) devices/software
are FIPS certified. We have directed the Department's contractor under
the "Educate contract," our contract for information technology (IT),
to provide various plans, including a sequence plan with milestones, a
compliance plan, an interoperability plan, and a risk management plan.
We will ask the contractor to provide recommendations and milestones
for our review and concurrence.
Recommendation 3. Develop and implement departmentwide policy and
procedures for encryption key establishment and management.
The Department agrees with GAO's recommendation to develop and
implement a department-wide policy and procedures for encryption key
establishment and management, including procedures for the use of FIPS-
compliant cryptography. We expect that our policy and procedures for
addressing encryption key establishment, key management, and use of
FIPS-compliant cryptography technologies will be in final form in July
o f 2008.
Recommendation 4. Develop and implement departmentwide procedures for
use of FIPS-compliant cryptography.
The Department agrees with GAO's recommendation to develop and
implement department-wide procedures for use of FIPS-compliant
cryptography. In addition to our efforts for developing policies, the
Department's Office of the Chief Information Officer has been reviewing
emerging (and "disruptive") technologies that provide encryption on an
"enterprise" basis for both "data at rest" and "data in motion." The
Department is also encouraging its primary IT services contractor to
consider those technologies that go beyond the current standard of care
in the "encryption" industry. Some of these technologies may solve the
expensive "key-logger" problem by encrypting data at the "bit/byte"
level, thereby making administration of encryption keys much less
cumbersome. Because the EDUCATE contract that the Department has with
its primary IT service provider is a "performance based" contract, the
Department may not direct the specific "means and methods" of
performance there under. However, we are expecting that performance
under the contract will result in appropriate department-wide
procedures for use of FIPS-compliant cryptography.
Recommendation 5. Develop and implement a training program that
provides technical support and end-user personnel with adequate
training on encryption concepts, including proper operation of the
specific encryption products used.
The Department agrees with GAO's recommendation to develop and
implement a training program on encryption with regard to its direct
application to us, and we are already enhancing our training in this
area. The Department's on-line security awareness and specialized
training program is reviewed and updated annually to help ensure that
appropriate improvements are made, including coverage of additional
relevant topics. The Department also intends to include encryption as
part of its annual security awareness and specialized training program
under the Federal Information Security Management Act in Fiscal Year
2009. This training will include how to use encryption technologies
implemented department-wide, how encryption works and what capabilities
it can provide, what encryption is, what it can and cannot do, and
where it fits into the securing of the Department's vital information
assets.
We appreciate the information provided in the draft report. Please let
us know if you have any questions about our comments.
Sincerely,
Signed by:
Bill Vajda:
Chief Information Officer:
[End of section]
Appendix VII Comments from the Department of Housing and Urban
Development:
U.S. Department Of Housing And Urban Development:
Washington, DC 20410-3000:
Chief Information Officer:
May 28, 2008:
Mr. Gregory C. Wilshusen:
Director, Information Security Issues:
Government Accountability Office:
441 G Street, NW:
Washington, DC 20548:
Dear Mr. Wilshusen:
Thank you for the opportunity to comment on the Government
Accountability Office (GAO) draft report entitled "Federal Agencies
Efforts to Encrypt Sensitive Information Are Under Way, but Work
Remains, job code 310590.
The Department of Housing and Urban Development has reviewed the draft
report and is providing the following comments to the recommendations:
Evaluate, select, and install FIPS 140-compliant products for all
encryption needs and document a plan for implementation that addresses
protection of all sensitive information stored and transmitted by the
agency.
To date, HUD has implemented a FIPS-compliant encrypted flash drive as
the enterprise standard, and identified a FIPS-compliant laptop
encryption solution which will be implemented in FY2009. HUD will
continue to implement FIPS compliant products, in accordance with NIST-
approved security settings, to safeguard stored and transmitted
sensitive information.
Configure installed FIPS-compliant encryption technologies in
accordance with NIST- approved security settings for the product.
All FIPS compliant encryption technologies security settings are and
will be configured in accordance with NIST.
Develop and implement department-wide procedures for the use of BPS-
compliant cryptography and for encryption key establishment and
management. Department-wide procedures will be reviewed to ensure
references to use of FIPS- compliant cryptography and encryption key
establishment and management are current.
In conclusion, HUD agrees with the GAO recommendations and remains
committed to strengthen the encryption of sensitive information by
implementing plans for fully satisfying each of the conditions
identified in GAO's review. More definitive information with timelines
will be provided once the final report has been issued If you have any
questions or require additional information, please contact Shelia
Fitzgerald, Acting Director, Office of Investments, Strategy, Policy
and Management at (202)-402-2432.
Sincerely,
Signed by:
Joseph M. Milazzo:
Acting Chief Information Officer:
[End of section]
Appendix VIII: Comments from the Department of State:
United States Department of State:
Assistant Secretary for Resource Management and Chief Financial
Officer:
Washington, D.C. 20520:
Ms. Jacquelyn Williams-Bridgers:
Managing Director:
International Affairs and Trade:
Government Accountability Office:
441 G Street, N.W.:
Washington, D.C. 20548-0001:
May 28 2008:
Dear Ms. Williams-Bridgers:
We appreciate the opportunity to review your draft report, "Information
Security: Federal Agency Efforts to Encrypt Sensitive Information Are
Under Way, but Work Remains," GAO Job Code 310590.
The enclosed Department of State comments are provided for
incorporation with this letter as an appendix to the final report.
If you have any questions concerning this response, please contact
Peter Gouldmann, Systems Authorization Chief, Bureau of Information
Resource Management at (703) 812-2500.
Sincerely,
Signed by:
Bradford R. Higgins:
cc: GAO – Greg Wilshesen:
IRM – Susan Swart:
State/OIG ” Mark Duda:
Department of State Comments on GAO Draft Report:
Information Security: Federal Agency Efforts to Encrypt Sensitive
Information Are Under Way, but Work Remains (GAO-08-525, GAO Code
310590)
The Department of State appreciates the opportunity to comment on GAO's
draft report entitled "Information Security: Federal Agency Efforts to
Encrypt Sensitive Information Are Under Way, but Work Remains."
The subject GAO report recommends the following to the Secretary of
State.
"To improve the life cycle management of encryption technologies at the
Department of State, we recommend that the Secretary of State direct
the chief information officer to take the following two actions:
Develop and implement department-wide policy and procedures for
encryption key establishment and management.
Develop and implement department-wide procedures for use of Federal
Information Processing Standards (FIPS)-compliant cryptography."
The Department of State concurs with the GAO recommendations and is
working towards completing the suggested actions.
With regard to the first recommendation, the Department has effectively
managed the Department's military grade, Type 1 encryption for several
decades. Additionally, the Department effectively manages an
enterprise- wide Public Key Cryptography program. Several All
Diplomatic and Consular Post cables (ALDACs), accompanied by
memorandums for domestic offices provided interim policy guidance
mandating the encryption of government owned mobile devices.
On May 1, 2007, the Department sent an ALDAC that mandated the use of
encryption on all Department owned laptop hard drives, regardless of
whether they held sensitive information or not. On December 14, 2007,
in a second ALDAC, the Department expanded requirements to all mobile
devices and media. Subsequently, on April 3, 2008 a third ALDAC was
sent announcing availability of a Department acquired FIPS 140-2
compliant encryption solution with central management capabilities.
Work is underway to codify this interim guidance and expand it to
encompass all unclassified key establishment and management into the
Foreign Affairs Manual.
With regard to the second recommendation, as previously referenced, the
third ALDAC sent April 3, 2008, announced the availability of adequate
licenses of a FIPS 140-2 compliant encryption product to encrypt the
hard drives of all Department-owned unclassified laptops.
In addition to laptops, remote access to the Department's unclassified
network is provided using FIPS 140-2 compliant encryption employed in
two VPN access solutions.
For removable media, the Department has FIPS 140-2 compliant encryption
software for some applications, and is evaluating other software for
the remaining uses. Policy and procedures for effective central
management are being developed.
[End of section]
Appendix IX: Comments from the General Services Administration:
GSA:
May 29, 2008:
The Honorable Gene L. Dodaro:
Acting Comptroller General of the United States:
Government Accountability Office:
Washington, DC 20548:
Dear Mr. Dodaro:
The General Services Administration (GSA) appreciates the opportunity
to review and comment on the draft report, "Information Security:
Federal Agency Efforts to Encrypt Sensitive Information Are Under Way,
but Work Remains" (GAO-08-525). The Government Accountability Office
recommends that GSA improve its life cycle management of encryption
technologies by developing and implementing agency-wide policy and
procedures for encryption key establishment and management along with
developing procedures for use of FIPS compliant cryptography.
We agree with the findings and recommendations and will use the report
findings to improve GSA's life cycle management of encryption
technologies.
Enclosed is GSA's response to the referenced recommendations. If you
have any questions, please contact me. Staff inquiries can be directed
to Mr. Kevin Messner, Associate Administrator, Office of Congressional
and Intergovernmental Affairs, at (202) 501-0563.
Sincerely,
Signed by:
David L. Bibb:
Acting Administrator:
Enclosure
cc:
Mr. Gregory C. Wilshusen
Director:
Information Technology Issues:
U.S. Government Accountability Office:
Washington, DC 20548:
Government Accountability Office (GAO) Draft Report Information
Security: Federal Agency Efforts to Encrypt Sensitive Information Are
Under Way, but Work Remains:
GAO-08-525 – Dated June 2008 General Services Administration Comments
to the Recommendations:
Recommendation 1: GAO recommends that the Acting Administrator direct
the Chief Information Officer to develop and implement department-wide
policy and procedures for encryption key establishment and management.
GSA Response: Concur with recommendation. GSA agrees with the
recommendation and will develop and implement agency-wide policy and
procedures for encryption key establishment and management.
Recommendation 2: GAO recommends that the Acting Administrator direct
the Chief Information Officer to develop and implement department-wide
procedures for use of FIPS-compliant cryptography.
GSA Response: Concur with recommendation. GSA agrees with the
recommendation and will develop and implement agency-wide procedures
for use of FIPS-compliant cryptography.
[End of section]
Appendix X Comments from the National Aeronautics and Space
Administration:
National Aeronautics and Space Administration:
Office of the Administrator:
Washington, DC 20546-0001:
June 3, 2008:
Mr. Gregory C. Wilshusen:
Director, Information Security Issues:
United States Government Accountability Office:
Washington, DC 20548:
Dear Mr. Wilshusen:
Thank you for the opportunity to review and comment on the draft report
entitled, Information Security: Federal Agency Efforts to Encrypt
Sensitive Information Are Under Way, but Work Remains (GAO-08-525).
In its draft report, the GAO reports several findings from its audit of
systems at NASA, followed by three recommended actions. The GAO
recommends that, "As the National Aeronautics and Space Administration
continues to plan for a departmentwide encryption solution and to
improve the life cycle management of encryption technologies, we
recommend that the Administrator of National Aeronautics and Space
Administration direct the chief information officer to take the
following three actions."
Recommendation: Establish and implement a mechanism to monitor the
successful installation and effective functioning of encryption
products installed on devices.
Response: NASA concurs with this recommendation. As noted in the GAO
report, successful implementation of an encryption method includes
monitoring the effectiveness of installed cryptographic controls. In
following this guidance, NASA formed an Agency team chartered to
provide a recommendation for an enterprise data-at-rest encryption
solution. In addition to recommendations from NIST SP800-21, the
requirements for this enterprise solution included the ability to
continuously monitor the encryption state of every device.
NASA has selected a vendor to provide an enterprise encryption solution
based on these requirements and has allocated significant resources
(personnel and dollars) this fiscal year to implement a centrally
managed full-disk encryption solution to replace its current solution.
Once this solution is implemented, targeted for April 2009, NASA will
be able to provide central reporting on each laptop and desktop
encrypted with this software. NASA will be able to push new policies to
these systems and remotely disable any laptop or removable media device
that is reported lost or stolen. This state- of-the-art encryption
functionality will significantly improve NASA's ability to meet its
data encryption responsibilities.
Recommendation: Develop and implement departmentwide policy and
procedures for encryption key establishment and management. Response:
NASA concurs with this recommendation. As noted above, the Agency took
great care in using the guidance from Government publications in
selecting the best encryption solution, including guidance on key
establishment and management from NIST SP800-21.
NASA policy and detailed procedures currently exist for how encryption
keys are created, tracked, revoked, and managed. As part of the
implementation of the Agency enterprise solution for data-at-rest
encryption, NASA will further document the procedural framework for
establishing and managing encryption keys and will disseminate existing
and new policies and procedures across the Agency.
Recommendation: Develop and implement a training program that provides
technical support and end-user personnel with adequate training on
encryption concepts, including proper operation of the specific
encryption products used.
Response: NASA concurs with this recommendation. Further, NASA believes
that the most effective encryption technology is completely transparent
to the end user and provides constant protection without end user
intervention. Many of the modem full-disk encryption solutions offer
this level of transparency, including the one selected for deployment
at NASA. Training is, nevertheless, a key requirement of the selected
solution, and product-specific training will be created and made
available to all users as part of the implementation of NASA's
enterprise data-at-rest encryption solution. NASA will work with the
vendor to create training materials for specific audiences. Topics will
include proper use of the product and encryption concepts for the end
user as well as troubleshooting, policy creation, forensic integration,
and administration for the support staff.
My point of contact for this matter is Jerry L. Davis, Deputy Chief
Information Officer for Information Technology Security. He may be
contacted by e-mail at jerry.l.davis@nasa.gov or by telephone at (202)
358-1401.
Sincerely,
Signed by:
Shana Dale:
Deputy Administrator:
[End of section]
Appendix XI GAO Contact and Staff Acknowledgments:
GAO Contact:
Gregory C. Wilshusen, (202) 512-6244, wilshuseng@gao.gov:
Staff Acknowledgments:
In addition to the individual named above, Nancy DeFrancesco (Assistant
Director), James Ashley, Debra Conner; Season Dietrich, Neil Doherty,
Nancy Glover, Joel Grossman, Ethan Iczkovitz, Stanley J. Kostyla,
Lowell Labaro, Rebecca Lapaze, Anjalique Lawrence, Harold Lewis, Lee
McCracken, and Tammi L. Nguyen made key contributions to this report.
[End of section]
Glossary:
Access Control:
Process of determining the permissible activities of users and
authorizing or prohibiting activities by each user.
Authentication:
Process of confirming an asserted identity with a specified or
understood level of confidence.
Authorization:
Granting the appropriate access privileges to authenticated users.
Card Management System:
A system that manages life cycle maintenance tasks associated with the
credentials, such as unlocking the personal identity verification cards
during issuance or updating a personal identification number or digital
certificate on the card.
Certificate:
A digital representation of information that (1) identifies the
authority issuing the certificate; (2) names or identifies the person,
process, or equipment using the certificate; (3) contains the user's
public key; (4) identifies the certificate's operational period; and
(5) is digitally signed by the certificate authority issuing it. A
certificate is the means by which a user is linked--or bound--to a
public key.
Ciphertext:
Data in an encrypted form.
Container:
The file used by a virtual disk encryption technology to encompass and
protect other files.
Credential:
An object, such as a smart card, that identifies an individual as an
official representative of, for example, a government agency.
Digital Signature:
The result of the transformation of a message by means of a
cryptographic system using digital keys, so that a relying party can
determine (1) whether the transformation was created using the private
key that corresponds to the public key in the signer's digital
certificate and (2) whether the message has been altered since the
transformation was made. Digital signatures may also be attached to
other electronic information and programs so that the integrity of the
information and programs may be verified at a later time.
Electronic Credentials:
The electronic equivalent of a traditional paper-based credential--a
document that vouches for an individual's identity.
End-to-End Encryption:
The encryption of information at its origin and decryption at its
intended destination without any intermediate decryption.
File:
A collection of information that is logically grouped into a single
entity and referenced by a unique name, such as a file name.
Folder:
An organizational structure used to group files.
Full Disk Encryption:
The process of encrypting all the data on the hard drive used to boot a
computer, including the computer's operating system, that permits
access to the data only after successful authentication with the full
disk encryption product.
Hardware Based Encryption:
Encryption that is normally performed by dedicated hardware in the
client/host system.
Identification:
The process of determining to what identity a particular individual
corresponds.
Key:
A value used to control cryptographic operations, such as decryption,
encryption, signature generation, or signature verification.
Malware:
A program that is inserted into a system, usually covertly, with the
intent of compromising the confidentiality, integrity, or availability
of the victim's data, applications, or operating system or of otherwise
annoying or disrupting the victim.
Master Boot Record:
A computer's master boot record is a reserved sector on its bootable
media that determines which software (e.g., operating system, utility)
will be executed when the computer boots from the media.
Operating System:
The program that, after being initially loaded into the computer by a
boot program, manages all the other programs in a computer. Examples of
operating systems include Microsoft Windows, MacOS, and Linux. The
other programs are called applications or application programs. The
application programs make use of the operating system by making a
request for service through a defined application program interface. In
addition, users can interact directly with the operating system through
a user interface such as a command language or a graphical user
interface.
Private Key:
The secret part of an asymmetric key pair that is typically used to
digitally sign or decrypt data.
Public Key:
The public part of an asymmetric key pair that is typically used to
verify signatures or encrypt data.
Public Key Infrastructure:
A system of hardware, software, policies, and people that, when fully
and properly implemented, can provide a suite of information security
assurances--including confidentiality, data integrity, authentication,
and nonrepudiation--that are important in protecting sensitive
communications and transactions.
Risk:
The expectation of loss expressed as the probability that a threat will
exploit a vulnerability with a harmful result.
Senstitive Information:
Any information that an agency has determined requires some degree of
heightened protection from unauthorized access, use, disclosure,
disruption, modification, or destruction because of the nature of the
information, e.g., personal information required to be protected by the
Privacy Act of 1974, proprietary commercial information, information
critical to agency program activities, and information that has or may
be determined to be exempt from public release under the Freedom of
Information Act.
Standard:
A statement published on a given topic by organizations such as the
National Institute of Standards and Technology, the Institute of
Electrical and Electronics Engineers, the International Organization
for Standardization, and others specifying characteristics--usually
measurable ones--that must be satisfied to comply with the standard.
Trusted Platform Module Chip:
A tamper-resistant integrated circuit built into some computer
motherboards that can perform cryptographic operations (including key
generation) and protect small amounts of sensitive information such as
passwords and cryptographic keys.
Virtual Disk Encryption:
The process of encrypting a container, which can hold many files and
folders, and of permitting access to the data within the container only
after proper authentication is provided. In this case, the container is
typically mounted as a virtual disk; it appears to the user as a
logical disk drive.
Virtual Private Network:
A virtual private network is a logical network that is established, at
the application layer of the open systems interconnection model, over
an existing physical network and typically does not include every node
present on the physical network.
[End of section]
Footnotes:
[1] As used in this report, the term ’sensitive information“ refers to
any information that an agency has determined requires some degree of
heightened protection from unauthorized access, use, disclosure,
disruption, modification, or destruction because of the nature of the
information, e.g., personal information required to be protected by the
Privacy Act of 1974, proprietary commercial information, information
critical to agency program activities, and information that has or may
be determined to be exempt from public release under the Freedom of
Information Act.
[2] GAO, Privacy: Preventing and Responding to Improper Disclosures of
Personal Information, GAO-06-833T(Washington, D.C.: June 8, 2006).
[3] Encryption is a subset of cryptography, which is used to secure
transactions by providing ways to ensure data confidentiality
(assurance that the information will be protected from unauthorized
access), data integrity (assurance that data have not been accidentally
or deliberately altered), authentication of the message's originator,
electronic certification of data, and nonrepudiation (proof of the
integrity and origin of data that can be verified by a third party).
[4] For purposes of this report, the terms "personally identifiable
information" and "personal information" refer to any information about
an individual maintained by an agency, including (1) any information
that can be used to distinguish or trace an individual's identity, such
as name, Social Security number, date and place of birth, mother's
maiden name, or biometric records, and (2) any other information that
is linked or linkable to an individual, such as medical, educational,
financial, and employment information.
[5] The 24 major federal agencies are the Agency for International
Development; the Departments of Agriculture, Commerce, Defense,
Education, Energy, Health and Human Services, Homeland Security,
Housing and Urban Development, the Interior, Justice, Labor, State,
Transportation, the Treasury, and Veterans Affairs; the Environmental
Protection Agency; the General Services Administration; the National
Aeronautics and Space Administration; the National Science Foundation;
the Nuclear Regulatory Commission; the Office of Personnel Management;
the Small Business Administration; and the Social Security
Administration.
[6] "System of records" is defined as a group of records under the
control of an agency from which information is retrieved by the name of
the individual or by an individual identifier.
[7] Critical infrastructures include cyber and physical, public and
private infrastructures that are essential to national security,
national economic security, or national public health and safety.
[8] J. Michael McConnell, Annual Threat Assessment of the Director of
National Intelligence for the Senate Select Committee on Intelligence,
Feb. 5, 2008.
[9] Security controls--access controls--should provide reasonable
assurance that computer resources (data files, application programs,
and computer-related facilities and equipment) are protected. Such
controls include physical access controls, such as keeping computers in
locked rooms, and logical access controls, such as security software
programs designed to prevent or detect unauthorized access to sensitive
files.
[10] A system interconnection is the direct connection of two or more
IT systems for the purpose of sharing data and other information
resources.
[11] NIST, Special Publication 800-11, Guide to Storage Encryption
Technologies for End User Devices (Gaithersburg, Maryland: November
2007).
[12] A key is a value used to control cryptographic operations, such as
decryption, encryption, signature generation, or signature
verification.
[13] NIST, Information Technology Laboratory Bulletin: Advising Users
on Information Technology, (Gaithersburg, Maryland: March 2007).
[14] NIST, Special Publication 800-11.
[15] Microsoft Corporation, Windows Mobile Devices and Security:
Protecting Sensitive Business Information, (March 2006).
[16] NIST, Special Publication 800-47, Security Guide for
Interconnecting Information Technology Systems, (Gaithersburg,
Maryland: August 2002).
[17] NIST, Special Publication 800-25, Federal Agency Use of Public Key
Technology for Digital Signatures and Authentication, (Gaithersburg,
Maryland: October 2000).
[18] Public key infrastructure is a system of hardware, software,
policies, and people that, when fully and properly implemented, can
provide a suite of information security assurances--including
confidentiality, data integrity, authentication, and nonrepudiation--
that are important in protecting sensitive communications and
transactions. For more information about public key infrastructure, see
GAO, Information Security: Advances and Remaining Challenges to
Adoption of Public Key Infrastructure Technology, GAO-01-277
(Washington, D.C.: Feb. 26, 2001).
[19] A private key is the secret part of an asymmetric key pair that is
typically used to digitally sign or decrypt data.
[20] NIST Special Publication 800-48, Wireless Network Security 802.11,
Bluetooth and Handheld Devices, (Gaithersburg, Maryland: November
2002).
[21] Pub. L. No. 107-347 (Dec. 17, 2002).
[22] Pub. L. No. 104-191 (Aug. 21, 1996).
[23] Pub. L. No. 109-461 (Dec. 22, 2006).
[24] OMB Memorandum 04-04 requires agencies with systems using remote
authentication to conduct special electronic authentication risk
assessments and select proper controls as recommended by NIST to
protect sensitive information on those systems.
[25] NIST, Special Publication 800-63, Electronic Authentication
Guideline (Gaithersburg, Maryland: April 2006).
[26] The checklist provided in M-06-16 provides specific actions to be
taken by federal agencies for the protection of personally identifiable
information categorized in accordance with FIPS 199 as moderate or high
impact that is either accessed remotely or physically transported
outside of the agency's secured physical perimeter. The security
controls and associated control assessment methods/procedures in the
checklist were taken from NIST Special Publication 800-53 and NIST
Special Publication 800-53A.
[27] NIST, Special Publication 800-53 Revision 2, Recommended Security
Controls for Federal Information Systems, (Gaithersburg, Maryland:
December 2007).
[28] FIPS 199, Standards for Security Categorization of Federal
Information and Information Systems (Gaithersburg, Maryland: February
2004).
[29] Supersedes FIPS 140-1, 1994.
[30] OMB M-07-16.
[31] FIPS 180-2, 186-3, and 197.
[32] FIPS 199.
[33] FIPS 200, Minimum Security Requirements for Federal Information
and Information System. (Gaithersburg, Maryland: March 2006).
[34] We selected six agencies that reported having initiated efforts to
install FIPS-validated cryptographic modules encryption technologies on
their laptop computers, BlackBerry® devices, or virtual private
networks or that had either experienced publicized incidents of data
compromise or were expected to collect, store, and transmit a wide
range of sensitive information. The six agencies are the General
Services Administration; the Departments of Education, Agriculture,
Housing and Urban Development, and State; and the National Aeronautics
and Space Administration.
[35] We were unable to test the installation of encryption products on
deployed laptops assigned to State employees because although the
inventory provided by the agency indicated that the employees were
assigned to the location that we visited, they were actually assigned
to posts throughout the world. We instead discussed the encryption
installation process with State officials and verified use of a FIPS-
validated cryptographic modules product on one unassigned laptop (not
from our sample) that agency officials provided for our examination.
Officials stated that the laptop inventory provided for our review
included only those laptop computers that were assigned for
telecommuting and that it did not constitute the entire universe of
State's laptops. A State official asserted that all of the
telecommuting laptops--about 2,100 in total--were encrypted as a
condition for assigning the device to a telecommuting employee and that
approximately 19 percent of their remaining laptops were encrypted.
[36] We conducted testing at the headquarters locations of the
Departments of Housing and Urban Development and State, the General
Services Administration, and the National Aeronautics and Space
Administration. We conducted testing at the Food and Nutrition Service
component of the U.S. Department of Agriculture and at the Federal
Student Aid component of the Department of Education.
[37] At the Departments of Housing and Urban Development and State, we
tested only the BlackBerry server and virtual private networks.
[38] OMB, Reducing Cost and Improving Quality in Federal Purchases of
Commercial Software (M-03-14), (Washington, D.C. June 2, 2003).
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: