Federal Reserve Banks

Areas for Improvement in Information Security Controls Gao ID: GAO-10-640R April 21, 2010

In connection with fulfilling our requirement to audit the financial statements of the U.S. government, we audited and reported on the Schedules of Federal Debt Managed by the Bureau of the Public Debt (BPD) for the fiscal years ended September 30, 2009 and 2008. As part of these audits, we performed a review of the general and application information security controls over key financial systems maintained and operated by the Federal Reserve Banks (FRB) on behalf of the Department of the Treasury's (Treasury) BPD relevant to the Schedule of Federal Debt. As we reported in connection with our audit of the Schedules of Federal Debt for the fiscal years ended September 30, 2009 and 2008, we concluded that BPD maintained, in all material respects, effective internal control over financial reporting relevant to the Schedule of Federal Debt as of September 30, 2009, that provided reasonable assurance that misstatements, losses, or noncompliance material in relation to the Schedule of Federal Debt would be prevented or detected and corrected on a timely basis. However, we identified information security deficiencies affecting internal control over financial reporting, which, while we do not consider them to be collectively either a material weakness or significant deficiency, nevertheless warrant FRB management's attention and action. This report presents the control deficiencies we identified during our fiscal year 2009 testing of the general and application information security controls over key financial systems maintained and operated by the FRBs relevant to BPD's Schedule of Federal Debt. This report also includes the results of our follow-up on the status of FRB's corrective actions to address information security control related recommendations contained in our prior years' audit reports and open as of September 30, 2008.

Our fiscal year 2009 audit procedures identified four new general information security control deficiencies related to security management and access controls. We made five recommendations to address these control deficiencies. None of the control deficiencies we identified represented significant risks to the key financial systems maintained and operated by the FRBs on behalf of BPD. The potential effect of such control deficiencies on financial reporting relevant to the Schedule of Federal Debt was mitigated by FRB's physical security measures and a program of monitoring user and system activity, and BPD's compensating management and reconciliation controls designed to detect potential misstatements in the Schedule of Federal Debt. In addition, during our fiscal year 2009 follow-up on the status of FRB's corrective actions to address 11 open recommendations related to general information security control deficiencies identified in our prior years' audits, we determined that as of September 30, 2009, corrective action on 8 of the 11 recommendations was completed, while corrective action was in progress on the 3 remaining open recommendations, which related to security management. The Board of Governors of the Federal Reserve System provided comments on the detailed findings and recommendations in the separately issued Limited Official Use Only report. In those comments, the Director of Reserve Bank Operations and Payment Systems stated that the agency takes control deficiencies, and actions to address them, seriously. The Director further commented that three deficiencies have already been addressed or remediated, and that the remainder have corrective actions planned or in progress.



GAO-10-640R, Federal Reserve Banks: Areas for Improvement in Information Security Controls This is the accessible text file for GAO report number GAO-10-640R entitled 'Federal Reserve Banks: Areas for Improvement in Information Security Controls' which was released on April 21, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. GAO-10-640R: United States Government Accountability Office: Washington, DC 20548: April 21, 2010: Stephen R. Malphrus: Staff Director for Management: Board of Governors of the Federal Reserve System: Subject: Federal Reserve Banks: Areas for Improvement in Information Security Controls: Dear Mr. Malphrus: In connection with fulfilling our requirement to audit the financial statements of the U.S. government,[Footnote 1] we audited and reported on the Schedules of Federal Debt Managed by the Bureau of the Public Debt (BPD) for the fiscal years ended September 30, 2009 and 2008. [Footnote 2] As part of these audits, we performed a review of the general and application information security controls over key financial systems maintained and operated by the Federal Reserve Banks (FRB) on behalf of the Department of the Treasury's (Treasury) BPD relevant to the Schedule of Federal Debt. As we reported in connection with our audit of the Schedules of Federal Debt for the fiscal years ended September 30, 2009 and 2008, we concluded that BPD maintained, in all material respects, effective internal control over financial reporting relevant to the Schedule of Federal Debt as of September 30, 2009, that provided reasonable assurance that misstatements, losses, or noncompliance material in relation to the Schedule of Federal Debt would be prevented or detected and corrected on a timely basis. However, we identified information security deficiencies affecting internal control over financial reporting, which, while we do not consider them to be collectively either a material weakness or significant deficiency, nevertheless warrant FRB management's attention and action.[Footnote 3] This report presents the control deficiencies we identified during our fiscal year 2009 testing of the general and application information security controls over key financial systems maintained and operated by the FRBs relevant to BPD's Schedule of Federal Debt. This report also includes the results of our follow-up on the status of FRB's corrective actions to address information security control related recommendations contained in our prior years' audit reports and open as of September 30, 2008. In a separately issued Limited Official Use Only report, we communicated detailed information regarding our findings to FRB management. Results in Brief: Our fiscal year 2009 audit procedures identified four new general information security control deficiencies related to security management and access controls. We made five recommendations to address these control deficiencies. None of the control deficiencies we identified represented significant risks to the key financial systems maintained and operated by the FRBs on behalf of BPD. The potential effect of such control deficiencies on financial reporting relevant to the Schedule of Federal Debt was mitigated by FRB's physical security measures and a program of monitoring user and system activity, and BPD's compensating management and reconciliation controls designed to detect potential misstatements in the Schedule of Federal Debt. In addition, during our fiscal year 2009 follow-up on the status of FRB's corrective actions to address 11 open recommendations related to general information security control deficiencies identified in our prior years' audits, we determined that as of September 30, 2009, corrective action on 8 of the 11 recommendations was completed, while corrective action was in progress on the 3 remaining open recommendations, which related to security management. The Board of Governors of the Federal Reserve System provided comments on the detailed findings and recommendations in the separately issued Limited Official Use Only report. In those comments, the Director of Reserve Bank Operations and Payment Systems stated that the agency takes control deficiencies, and actions to address them, seriously. The Director further commented that three deficiencies have already been addressed or remediated, and that the remainder have corrective actions planned or in progress. Background: Many of the FRBs provide fiscal agent services on behalf of BPD, which primarily consist of issuing, servicing, and redeeming Treasury securities held by the public and handling the related transfers of funds. In fiscal year 2009, the FRBs issued about $8.9 trillion in federal debt securities to the public, redeemed about $7.1 trillion of debt held by the public, and processed about $166 billion in interest payments on debt held by the public. FRBs use a number of financial systems to process debt-related transactions. The Federal Reserve Information Technology Computing Centers maintain and operate key financial systems to process and reconcile moneys disbursed and collected on behalf of BPD. Detailed data initially processed at the FRBs are summarized and then forwarded electronically to BPD's data center for matching, verification, and posting to the general ledger. Section 3544(a)(1)(A) of Title 44, United States Code, delineates federal agency responsibilities for (1) information collected or maintained by or on behalf of an agency and (2) information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency. Further, section 3544(b) provides that each agency shall develop, document, and implement an agencywide information security program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source. Office of Management and Budget Memorandum M-07-19, FY 2007 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management clarified that agency information security programs apply to all organizations which possess or use federal information--or which operate, use, or have access to federal information systems--on behalf of a federal agency. In addition, section 3544(a)(1)(B) of Title 44, United States Code, requires federal agencies to comply with information security standards developed by the National Institute of Standards and Technology. Objectives, Scope, and Methodology: Our objectives were to evaluate the general and application information security controls over key financial management systems maintained and operated by the FRBs on behalf of BPD that are relevant to the Schedule of Federal Debt, and to determine the status of corrective actions taken in response to the recommendations in our prior years' reports for which actions were not complete as of September 30, 2008. Our evaluation of the general and application information security controls was conducted using the Federal Information System Controls Audit Manual.[Footnote 4] To evaluate general and application information security controls, we identified and reviewed FRB's information system general and application information security control policies and procedures, observed controls in operation, conducted tests of controls, and held discussions with officials at selected FRB data centers to determine whether controls were adequately designed, implemented, and operating effectively. The scope of our general information security controls work for fiscal year 2009 included following up on open recommendations from our prior years' reports and a risk-based approach to testing all five general control areas in the current year. Based on this approach, our testing focused primarily on access controls and configuration management and, to a lesser extent, on the other areas of security management, segregation of duties, and contingency planning. In addition, we performed security configuration reviews of key Federal Reserve technical infrastructure components. We also reviewed results of security testing performed by FRB Richmond General Audit. We performed application information security control reviews on four key FRB applications to determine whether the applications were designed to provide reasonable assurance that: * all transactions that occurred were input into the system, accepted for processing, processed once and only once by the system, and properly included in output; * transactions were properly recorded in the proper period, key data elements input for transactions were accurate, data elements were processed accurately by applications that produce reliable results, and output was accurate; * all recorded transactions actually occurred, related to the organization, and were properly approved in accordance with management's authorization, and output contained only valid data; * application data and reports and other output were protected against unauthorized access; and: * application data and reports and other relevant business information were readily available to users when needed. The evaluation and testing of certain information security controls, including the follow-up on the status of FRB's corrective actions to address open recommendations from our prior years' reports, were performed by the independent public accounting (IPA) firm of Cotton and Company LLP. We agreed on the scope of the audit work, monitored the IPA firm's progress, and reviewed the related audit documentation to determine that the findings were adequately supported. During the course of our work, we communicated our findings to the Board of Governors of the Federal Reserve System. We plan to follow up to determine the status of corrective actions taken for matters open as of September 30, 2009, during our audit of the fiscal year 2010 Schedule of Federal Debt. We performed our work at the FRB locations where the operations of the systems we reviewed are supported. Our work was performed from February 2009 through October 2009 in accordance with U.S. generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provided a reasonable basis for our findings and conclusions based on our audit objectives. As noted above, we obtained agency comments on the detailed findings and recommendations in a draft of the separately issued Limited Official Use Only report. The Board of Governors of the Federal Reserve System's comments are summarized in the Agency Comments and Our Evaluation section of this report. Assessment of FRB's Information Security Controls: General information security controls are the structure, policies, and procedures that apply to an entity's overall computer operations. General information security controls establish the environment in which application systems and controls operate. They include security management, access controls, configuration management, segregation of duties, and contingency planning. An effective general information security control environment (1) provides a framework and continuing cycle of activity for managing risk, developing security policies, assigning responsibilities, and monitoring the adequacy of the entity's computer-related controls to ensure that an adequate security management program is in place; (2) limits or detects access to computer resources (data, programs, equipment, and facilities), thereby protecting them against unauthorized modification, loss, and disclosure; (3) prevents unauthorized changes to information system resources (for example, software programs and hardware configurations) and provides reasonable assurance that systems are configured and operating securely and as intended; (4) includes policies, procedures, and an organizational structure to manage who can control key aspects of computer-related operations; and (5) protects critical and sensitive data, and provides for critical operations to continue without disruption or be promptly resumed when unexpected events occur. Our fiscal year 2009 testing identified opportunities to strengthen certain information security controls that support key financial systems maintained and operated by the FRBs relevant to BPD's Schedule of Federal Debt. Specifically, our audit procedures identified four new general information security control deficiencies. This consisted of two control deficiencies related to security management and two control deficiencies related to access controls. An entitywide information security management program is important because it provides the foundation for an effective security control structure. The security management program establishes a framework and continuous cycle of activity for assessing risk, developing and implementing effective security procedures, and monitoring the effectiveness of these procedures. Overall policies and plans, including system and application-specific procedures and controls, implement the entitywide policy. Access controls are important because they limit or detect inappropriate access to computer resources (data, equipment, and facilities), thereby protecting them from unauthorized modification, loss, and disclosure. Such controls include logical access controls and physical access controls. The new access control deficiencies we identified related to logical access controls. Logical access controls require users to authenticate themselves through the use of secret passwords or other identifiers, and limit the files and other resources that authenticated users can access and the actions that they can execute. In a separately issued Limited Official Use Only report, we communicated detailed information regarding our new findings to FRB management and made five detailed recommendations. In addition, during our fiscal year 2009 follow-up on the status of FRB's corrective actions to address 11 open recommendations related to information security control deficiencies we identified in our prior years' audits, we determined that as of September 30, 2009, corrective action on 8 of the 11 recommendations was completed, while corrective action was in progress on the 3 remaining open recommendations, which related to security management. Although FRB management has made progress in addressing the remaining 3 general information security control deficiencies, additional actions are still needed. None of the control deficiencies we identified represented significant risks to the financial systems maintained and operated by the FRBs on behalf of BPD. The potential effect of such control deficiencies on financial reporting relevant to the Schedule of Federal Debt was mitigated by FRB's physical security measures and a program of monitoring user and system activity, and BPD's compensating management and reconciliation controls designed to detect potential misstatements in the Schedule of Federal Debt. Nevertheless, these deficiencies warrant management's attention and action to limit the risk of unauthorized access, loss, or disclosure; modification of sensitive data and programs; and disruption of critical operations. Conclusion: FRB has made significant progress in addressing the open information security control recommendations from our prior years' audits, and while actions are still needed in three control areas, it has corrective actions underway or planned. Our fiscal year 2009 audit also identified four new general information security control deficiencies related to security management and access controls. Recommendations for Executive Action: We recommend that the Director of the Division of Reserve Bank Operations and Payment Systems direct the appropriate FRB officials to implement the five new detailed recommendations presented in the separately issued Limited Official Use Only report. Agency Comments and Our Evaluation: The Board of Governors of the Federal Reserve System provided comments on the detailed findings and recommendations in the separately issued Limited Official Use Only report. In those comments, the Director of Reserve Bank Operations and Payment Systems stated that the agency takes control deficiencies, and actions to address them, seriously. Specifically, it commented that of the eight recommendations open as of September 30, 2009, three have been completely resolved and corrective actions for the remaining five are planned or in progress. The Director also stated that the FRBs intend to implement corrective action for four of the five remaining findings by September 2010, and actions to address the other finding over the next several years as part of a transition to a new information security program. We plan to follow up to determine the status of corrective actions taken for these matters during our audit of the fiscal year 2010 Schedule of Federal Debt. In the separately issued Limited Official Use Only report, we requested a written statement on actions taken to address our recommendations not later than 60 days after the date of that report. We are sending copies of this report to interested congressional committees, the Chairman of the Board of Governors of the Federal Reserve System, the Fiscal Assistant Secretary of the Treasury, and the Director of the Office of Management and Budget. In addition, this report will be available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov]. If you have any questions regarding this report, please contact me at (202) 512-3406 or engelg@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report include Jeffrey L. Knott and Dawn B. Simpson, Assistant Directors; Dean D. Carpenter; and Nicole N. Jarvis. Sincerely yours, Signed by: Gary T. Engel: Director: Financial Management and Assurance: [End of section] Footnotes: [1] 31 U.S.C. § 331(e). [2] GAO, Financial Audit: Bureau of the Public Debt's Fiscal Years 2009 and 2008 Schedules of Federal Debt, [hyperlink, http://www.gao.gov/products/GAO-10-88] (Washington, D.C.: Nov. 10, 2009). [3] A significant deficiency is a deficiency, or combination of deficiencies, in internal control that is less severe than a material weakness, yet important enough to merit attention by those charged with governance. A material weakness is a deficiency, or a combination of deficiencies, in internal control such that there is a reasonable possibility that a material misstatement of the entity's financial statements will not be prevented, or detected and corrected on a timely basis. A deficiency in internal control exists when the design or operation of a control does not allow management or employees, in the normal course of performing their assigned functions, to prevent, or detect and correct misstatements on a timely basis. [4] GAO, Federal Information System Controls Audit Manual, [hyperlink, http://www.gao.gov/products/GAO-09-232G] (Washington, D.C.: February 2009). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.