Information Security
Progress Made, but Federal Aviation Administration Needs to Improve Controls over Air Traffic Control Systems
Gao ID: GAO-05-712 August 26, 2005
The Federal Aviation Administration (FAA) performs critical functions that contribute to ensuring safe, orderly, and efficient air travel in the national airspace system. To that end, it operates and relies extensively on an array of interconnected automated information systems and networks that comprise the nation's air traffic control systems. These systems provide information to air traffic controllers and aircraft flight crews to help ensure the safe and expeditious movement of aircraft. Interruptions of service by these systems could have a significant adverse impact on air traffic nationwide. Effective information security controls are essential for ensuring that the nation's air traffic control systems are adequately protected from inadvertent or deliberate misuse, disruption, or destruction. Accordingly, GAO was asked to evaluate the extent to which FAA has implemented information security controls for these systems.
FAA has made progress in implementing information security for its air traffic control information systems; however, GAO identified significant security weaknesses that threaten the integrity, confidentiality, and availability of FAA's systems--including weaknesses in controls that are designed to prevent, limit, and detect access to these systems. The agency has not adequately managed its networks, software updates, user accounts and passwords, and user privileges, nor has it consistently logged security-relevant events. Other information security controls--including physical security, background investigations, segregation of duties, and system changes--also exhibited weaknesses, increasing the risk that unauthorized users could breach FAA's air traffic control systems, potentially disrupting aviation operations. While acknowledging these weaknesses, agency officials stated that the possibilities for unauthorized access were limited, given that the systems are in part custom built and that they run on older equipment that employs special-purpose operating systems, proprietary communication interfaces, and custom-built software. Nevertheless, the proprietary features of these systems cannot fully protect them from attacks by disgruntled current or former employees who are familiar with these features, nor will they keep out more sophisticated hackers. A key reason for the information security weaknesses that GAO identified in FAA's air traffic control systems is that the agency had not yet fully implemented its information security program to help ensure that effective controls were established and maintained. Although the agency has initiatives under way to improve its information security, further efforts are needed. Weaknesses that need to be addressed include outdated security plans, inadequate security awareness training, inadequate system testing and evaluation programs, limited security incident-detection capabilities, and shortcomings in providing service continuity for disruptions in operations. Until FAA has resolved these issues, the information security weaknesses that GAO has identified will likely persist.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-05-712, Information Security: Progress Made, but Federal Aviation Administration Needs to Improve Controls over Air Traffic Control Systems
This is the accessible text file for GAO report number GAO-05-712
entitled 'Information Security: Progress Made, but Federal Aviation
Administration Needs to Improve Controls over Air Traffic Control
Systems' which was released on September 26, 2005.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
August 2005:
Information Security:
Progress Made, but Federal Aviation Administration Needs to Improve
Controls over Air Traffic Control Systems:
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-712]:
GAO Highlights:
Highlights of GAO-05-712, a report to congressional requesters:
Why GAO Did This Study:
The Federal Aviation Administration (FAA) performs critical functions
that contribute to ensuring safe, orderly, and efficient air travel in
the national airspace system. To that end, it operates and relies
extensively on an array of interconnected automated information systems
and networks that comprise the nation‘s air traffic control systems.
These systems provide information to air traffic controllers and
aircraft flight crews to help ensure the safe and expeditious movement
of aircraft. Interruptions of service by these systems could have a
significant adverse impact on air traffic nationwide.
Effective information security controls are essential for ensuring that
the nation‘s air traffic control systems are adequately protected from
inadvertent or deliberate misuse, disruption, or destruction.
Accordingly, GAO was asked to evaluate the extent to which FAA has
implemented information security controls for these systems.
What GAO Found:
FAA has made progress in implementing information security for its air
traffic control information systems; however, GAO identified
significant security weaknesses that threaten the integrity,
confidentiality, and availability of FAA‘s systems”including weaknesses
in controls that are designed to prevent, limit, and detect access to
these systems. The agency has not adequately managed its networks,
software updates, user accounts and passwords, and user privileges, nor
has it consistently logged security-relevant events. Other information
security controls”including physical security, background
investigations, segregation of duties, and system changes”also
exhibited weaknesses, increasing the risk that unauthorized users could
breach FAA‘s air traffic control systems, potentially disrupting
aviation operations. While acknowledging these weaknesses, agency
officials stated that the possibilities for unauthorized access were
limited, given that the systems are in part custom built and that they
run on older equipment that employs special-purpose operating systems,
proprietary communication interfaces, and custom-built software.
Nevertheless, the proprietary features of these systems cannot fully
protect them from attacks by disgruntled current or former employees
who are familiar with these features, nor will they keep out more
sophisticated hackers.
A key reason for the information security weaknesses that GAO
identified in FAA‘s air traffic control systems is that the agency had
not yet fully implemented its information security program to help
ensure that effective controls were established and maintained.
Although the agency has initiatives under way to improve its
information security, further efforts are needed. Weaknesses that need
to be addressed include outdated security plans, inadequate security
awareness training, inadequate system testing and evaluation programs,
limited security incident-detection capabilities, and shortcomings in
providing service continuity for disruptions in operations. Until FAA
has resolved these issues, the information security weaknesses that GAO
has identified will likely persist.
Air Traffic Control System Command Center:
[See PDF for image]
[End of figure]
What GAO Recommends:
GAO is recommending several actions intended to improve FAA‘s
information security program. In providing oral comments on a draft of
this report, FAA‘s Chief Information Officer agreed to consider GAO‘s
recommendations.
www.gao.gov/cgi-bin/getrpt?GAO-05-712.
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Gregory C. Wilshusen at
(202) 512-6244 or wilshuseng@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
Objective, Scope, and Methodology:
Although Progress Has Been Made, Air Traffic Control Systems Remain
Vulnerable:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix:
Appendix I: GAO Contact and Staff Acknowledgments:
Figures:
Figure 1: Thousands of Aircraft Operating in the National Airspace
System:
Figure 2: Air Traffic Control Tower:
Figure 3: Air Traffic Control System Command Center:
Figure 4: Summary of Air Traffic Control over the United States and
Oceans:
Figure 5: Percentage of Staffed Facilities That Have Been Accredited:
Letter August 26, 2005:
The Honorable Tom Davis Chairman:
Committee on Government Reform:
House of Representatives:
The Honorable Adam H. Putnam:
House of Representatives:
The Federal Aviation Administration (FAA) performs critical functions
that contribute to ensuring safe, orderly, and efficient air travel in
the national airspace system. It relies on automated systems and
networks to provide information to air traffic controllers and aircraft
flight crews to work toward ensuring safe and expeditious movement of
aircraft. Interruptions in FAA's ability to fulfill its missions could
have a significant adverse impact on air traffic nationwide.
At your request, we evaluated the extent to which FAA has implemented
information security controls for its air traffic control systems.
Effective information security controls are essential for ensuring that
information technology resources are adequately protected from
inadvertent or deliberate misuse, fraudulent use, or destruction.
This report summarizes the results of our review of information
security controls in the agency's air traffic control systems. We are
also issuing a separate report for limited distribution that contains
sensitive security information. It describes in more detail the
information security weaknesses that we identified and our specific
recommendations for correcting them.
Our review was performed from March 2004 through June 2005 in
accordance with generally accepted government auditing standards.
Results in Brief:
FAA has made progress in implementing information security for its air
traffic control systems by establishing an agencywide information
security program and addressing many of its previously identified
security weaknesses; however, it still has significant weaknesses that
threaten the integrity, confidentiality, and availability of its
systems--including weaknesses in controls that are designed to prevent,
limit, and detect access to those systems. For example, for the systems
we reviewed, the agency was not adequately managing its networks,
system patches, user accounts and passwords, or user privileges, and it
was not always logging and auditing security-relevant events. In
addition, FAA faces risks to its air traffic control systems due to
weaknesses in physical security, background investigations, segregation
of duties, and application change controls. As a result, it is at
increased risk of unauthorized system access, possibly disrupting
aviation operations. While acknowledging these weaknesses, agency
officials stated that because portions of their systems are custom
built and use older equipment with special-purpose operating systems,
proprietary communication interfaces, and custom-built software, the
possibilities for unauthorized access are limited. Nevertheless, the
proprietary features of these systems do not protect them from attack
by disgruntled current or former employees, who understand these
features, or from more sophisticated hackers.
A key reason for the information security weaknesses that we identified
in FAA's air traffic control systems was that the agency had not yet
fully implemented an information security program to ensure that
effective controls were established and maintained. FAA has various
initiatives under way to improve information security; however, key
elements of a security program have not yet been fully implemented. For
example, some of the agency's security plans were outdated; security
awareness training requirements were not being fully met; system
testing and evaluation programs were inadequate; security incident
detection capabilities were limited; and shortcomings existed in
providing service continuity for disruptions in operations. In response
to weaknesses that we had identified, FAA officials told us they
recognized that more work was needed to continue to improve their
information security program and that they had already corrected many
of their electronic access control weaknesses.
We are making recommendations to the Secretary of Transportation to
direct the FAA administrator to fully implement an information security
program. In a separate report, with limited distribution because it
contains sensitive security information, we are making recommendations
to correct the specific weaknesses we identified during our review.
In providing oral comments on a draft of this report, the FAA's Chief
Information Officer (CIO) agreed to consider our recommendations and
provided other specific comments, which we have incorporated, as
appropriate, in the report.
Background:
FAA is an agency of the Department of Transportation (DOT); one of its
central missions is to ensure safe, orderly, and efficient air travel
in the national airspace system. FAA's quarterly administrator's fact
book for March 2005 reports that, in 2004, air traffic in the national
airspace system exceeded 46 million flights and 647 million people.
According to the agency's 2004 annual performance report for its air
traffic organization, Year One--Taking Flight, at any one time as many
as 7,000 aircraft--both civilian and military--could be aloft over the
United States (see fig. 1). More than 36,000 employees support the
operations that help move aircraft through the national airspace
system.
Figure 1: Thousands of Aircraft Operating in the National Airspace
System:
[See PDF for image]
[End of figure]
The agency's ability to fulfill its mission depends on the adequacy and
reliability of its air traffic control systems, a vast network of
computer hardware, software, and communications equipment. These
systems reside at, or are associated with, several types of facilities:
air traffic control towers, Terminal Radar Approach Control facilities,
Air Route Traffic Control Centers (or en route centers), and the Air
Traffic Control System Command Center. According to FAA,
* Four hundred eighty-eight air traffic control towers (see fig. 2)
manage and control the airspace within about 5 miles of an airport.
They control departures and landings as well as ground operations on
airport taxiways and runways.
Figure 2: Air Traffic Control Tower:
[See PDF for image]
[End of figure]
* One hundred seventy Terminal Radar Approach Control facilities
provide air traffic control services for airspace that is located
within approximately 40 miles of an airport and generally up to 10,000
feet above the airport, where en route centers' control begins.
Terminal controllers establish and maintain the sequence and separation
of aircraft.
* Twenty-one en route centers control planes over the United States--in
transit and during approaches to some airports. Each center handles a
different region of airspace. En route centers operate the computer
suite that processes radar surveillance and flight planning data,
reformats it for presentation purposes, and sends it to display
equipment that is used by controllers to track aircraft. The centers
control the switching of voice communications between aircraft and the
center as well as between the center and other air traffic control
facilities. Two en route centers also control air traffic over the
oceans.
* The Air Traffic Control System Command Center (see fig. 3) manages
the flow of air traffic within the United States. This facility
regulates air traffic when weather, equipment, runway closures, or
other conditions place stress on the national airspace system. In these
instances, traffic management specialists at the command center take
action to modify traffic demands in order to keep traffic within system
capacity.
Figure 3: Air Traffic Control System Command Center:
[See PDF for image]
[End of figure]
As aircraft move across the national airspace system, controllers
manage their movements during each phase of flight. See figure 4 for a
visual summary of air traffic control over the United States and its
oceans.
Figure 4: Summary of Air Traffic Control over the United States and
Oceans:
[See PDF for image]
[End of figure]
The air traffic control systems are very complex and highly automated.
These systems process a wide range of information, including radar,
weather, flight plans, surveillance, navigation/landing guidance,
traffic management, air-to-ground communication, voice, network
management, and other information--such as airspace restrictions--that
is required to support the agency's mission.
To support its operational management functions, the agency relies on
several interconnected systems to process and track flights around the
world. In order to successfully carry out air traffic control
operations, it is essential that FAA's systems interoperate,
functioning both within and across facilities as one integrated system
of systems. Each type of facility that we described in the previous
section consists of numerous interrelated systems. For example, each of
the en route centers, according to FAA officials, relies on 16 systems
to perform mission-critical information processing and display,
navigation, surveillance, communications, and weather functions. In
addition, systems from different facilities interact with each other so
that together they can successfully execute the entire air traffic
control process. For example, systems integrate data on aircraft
position from surveillance radars with data on flight destination from
flight planning data systems, for use on controllers' displays.
As FAA modernizes its air traffic control systems, information security
will become even more critical. The agency's modernization efforts are
designed to enhance the safety, capacity, and efficiency of the
national airspace system through the acquisition of a vast network of
radar, navigation, communications, and information processing
systems.[Footnote 1] Newer systems use digital computer networking and
telecommunications technologies that can create new vulnerabilities and
expose them to risks that must be assessed and mitigated to ensure
adequate protection. New vulnerabilities may also result from FAA's
increasing reliance on commercially available hardware and software and
from growing interconnectivity among computer and communication
systems. Increasing interconnection increases the extent to which
systems become vulnerable to intruders, who may severely disrupt
operations or manipulate sensitive information.
The administrator has designated the CIO as the focal point for
information system security within the agency. The CIO is responsible
for overseeing the development of the information security program,
including oversight of information security policies, architectures,
concepts of operation, procedures, processes, standards, training, and
plans. This responsibility is delegated to the Office of Information
Systems Security, whose mission is to protect the agency's
infrastructure through leadership in innovative information assurance
initiatives. In addition, the agency has established Information System
Security Manager positions, with more detailed information security
responsibilities, within FAA's various lines of business, such as the
air traffic organization.
We have previously reported information security weaknesses at
FAA.[Footnote 2] For instance, in December 2000, we reported that the
agency had physical security vulnerabilities, ineffective operational
systems security, inadequate service continuity efforts, an ineffective
intrusion detection capability, and ineffective personnel security. We
also noted that the agency had not yet implemented its information
security program.
Information system controls are an important consideration for any
organization that depends on computerized systems and networks to carry
out its mission or business. These controls should provide adequate
protections against outside as well as inside threats. It is especially
important for government organizations, such as FAA, where maintaining
the public trust is essential. Inadequately protected systems are at
risk of intrusion by individuals or groups with malicious intent, who
could use their illegitimate access to obtain sensitive information,
disrupt operations, or launch attacks against other computer systems
and networks.
Since 1997, we have designated information security as a governmentwide
high-risk area.[Footnote 3] Our previous reports, and those of agency
inspectors general, describe persistent information security weaknesses
that place a variety of federal operations at risk of disruption,
fraud, and inappropriate disclosure. Congress and the executive branch
have taken actions to address the risks associated with persistent
information security weaknesses. In December 2002, Congress enacted the
Federal Information Security Management Act (FISMA),[Footnote 4] which
is intended to strengthen the information security of federal systems.
In addition, the administration has taken important steps to improve
information security, such as integrating it into the President's
Management Agenda Scorecard. Moreover, the Office of Management and
Budget (OMB) and the National Institute of Standards and Technology
(NIST) have issued security guidance to federal agencies.
Objective, Scope, and Methodology:
The objective of our review was to determine the extent to which FAA
had implemented information security for its air traffic control
systems. Our evaluation was based on (1) our Federal Information System
Controls Audit Manual,[Footnote 5] which contains guidance for
reviewing information system controls that affect the integrity,
confidentiality, and availability of computerized data; (2) previous
reports from DOT's Office of Inspector General (OIG); and (3) FISMA,
which sets key elements that are required for an effective information
security program.
Specifically, we evaluated information system controls that are
intended to:
* protect resources, data, and software from unauthorized access;
* prevent the introduction of unauthorized changes to application and
system software;
* provide segregation of duties in the areas of application
programming, system programming, computer operations, information
security, and quality assurance;
* ensure recovery of computer processing operations in case of disaster
or other unexpected interruption; and:
* ensure an adequate information security program.
To evaluate these controls, we identified and reviewed pertinent DOT
and FAA security policies and procedures. In addition, to determine
whether information system general controls were in place, adequately
designed, and operating effectively, we conducted vulnerability testing
and assessments of systems from within the agency's network. We also
held discussions with agency staff to gain an understanding of FAA's
processes and controls. In addition, in order to take advantage of
their prior work in this area, we held discussions with OIG staff and
reviewed recent information security reports pertaining to air traffic
control systems. Because the OIG had recently reviewed the system used
by controllers to ensure the safe separation of aircraft, we did not
include that system in our review.
We performed our review at FAA headquarters and tested operational and
management controls[Footnote 6] at three other sites. At two additional
sites, we tested these controls and, in addition, tested technical
controls for three critical air traffic control systems. The limited
distribution report contains further details on the scope of our
review. This review was performed from March 2004 through June 2005 in
accordance with generally accepted government auditing standards.
Although Progress Has Been Made, Air Traffic Control Systems Remain
Vulnerable:
Although FAA has made progress in implementing information security for
its air traffic control systems by establishing an agencywide
information security program and addressing many of its previously
identified security weaknesses, significant control weaknesses threaten
the integrity, confidentiality, and availability of those systems and
information. In the systems we reviewed, we identified 36 weaknesses in
electronic access controls and in other areas such as physical
security, background investigations, segregation of duties, and
application change controls. A key reason for these weaknesses is that
the agency has not yet fully implemented an information security
program. As a result, FAA's air traffic control systems remain
vulnerable to unauthorized access, use, modification, and destruction
that could disrupt aviation operations.
Electronic Access Controls Were Inadequate:
A basic management objective for any organization is to protect the
resources that support its critical operations from unauthorized
access. Organizations accomplish this objective by designing and
implementing electronic controls that are intended to prevent, limit,
and detect unauthorized access to computing resources, programs, and
information. Electronic access controls include those related to
network management, patch management, user accounts and passwords, user
rights and file permissions, and audit and monitoring of security-
relevant events. Inadequate electronic access controls diminish the
reliability of computerized information, and they increase the risk of
unauthorized disclosure, modification, and destruction of sensitive
information and of disruption of service.
Network Management:
Networks are collections of interconnected computer systems and devices
that allow individuals to share resources such as computer programs and
information. Because sensitive programs and information are stored on
or transmitted along networks, effectively securing networks is
essential to protecting computing resources and data from unauthorized
access, manipulation, and use. Organizations secure their networks, in
part, by installing and configuring network devices that permit
authorized network service requests, deny unauthorized requests, and
limit the services that are available on the network. Devices used to
secure networks include (1) firewalls that prevent unauthorized access
to the network, (2) routers that filter and forward data along the
network, (3) switches that forward information among segments of a
network, and (4) servers that host applications and data. Network
services consist of protocols for transmitting data between network
devices. Insecurely configured network services and devices can make a
system vulnerable to internal or external threats, such as denial-of-
service attacks.[Footnote 7] Because networks often include both
external and internal access points for electronic information assets,
failure to secure these assets increases the risk of unauthorized
modification of sensitive information and systems, or disruption of
service.
For the systems we reviewed, FAA did not consistently configure network
services and devices securely to prevent unauthorized access to and
ensure the integrity of computer systems operating on its networks. We
identified weaknesses in the way the agency restricted network access,
developed application software, segregated its network, protected
information flow, and stored the certificates[Footnote 8] that are used
for authentication. For example:
* Access for system administration was not always adequately
restricted, and unnecessary services were available on several network
systems.
* Application software exhibited several weaknesses that could lead to
unauthorized access or to service disruptions.
* Although FAA implemented controls to segregate network traffic,
weaknesses in the application and infrastructure systems could allow an
external attacker to circumvent network controls in order to gain
unauthorized access to the internal network.
* FAA did not encrypt certain information traversing its internal
network. Instead, it used clear text protocols that made the network
susceptible to eavesdropping.
* FAA did not comply with federal standards for protected handling of
certificates and keys.[Footnote 9] Because certificates are a primary
tool for controlling access to applications, this improper storage puts
major applications at risk of intrusion.
Patch Management:
Patch management is a critical process that can help to alleviate many
of the challenges of securing computing systems.[Footnote 10] As
vulnerabilities in a system are discovered, attackers may attempt to
exploit them, possibly causing significant damage. Malicious acts can
range from defacing Web sites to taking control of entire systems and
thereby being able to read, modify, or delete sensitive information;
destroy systems; disrupt operations; or launch attacks against other
organizations' systems. After a vulnerability is validated, the
software vendor develops and tests a patch or workaround. Incident
response groups and software vendors issue information updates on the
vulnerability and the availability of patches. FAA's patch management
policy assigns organizational responsibilities for the patch management
process--including the application of countermeasures to mitigate
system vulnerability--and requires that patches be kept up to date or
that officials otherwise accept the risk.
For the systems we reviewed, FAA did not consistently install patches
in a timely manner. For example, patches that had been issued in 2002
had not been applied to certain servers that we reviewed. On another
system, the operating system software, from 1991, was outdated and
unpatched, although several vulnerabilities had been identified in the
meantime. The agency did not believe that the system was vulnerable to
unauthorized access or that it was at low risk of exposure to these
vulnerabilities. Because FAA had not yet installed the latest patches
at the time of our review, firewalls, Web servers, and servers used for
other purposes were vulnerable to denial-of-service attacks and to
external attackers' taking remote control of them.
User Accounts and Passwords:
A computer system must be able to identify and differentiate among
users so that activities on the system can be linked to specific
individuals. When an organization assigns unique user accounts to
specific users, the system distinguishes one user from another--a
process called identification. The system must also establish the
validity of a user's claimed identity through some means of
authentication, such as a password, that is known only to its owner.
The combination of identification and authentication--such as user
account/password combinations--provides the basis for establishing
individual accountability and for controlling access to the system.
Accordingly, agencies (1) establish password parameters, such as number
of characters, type of characters, and the frequency with which users
should change their passwords, in order to strengthen the effectiveness
of passwords for authenticating the identity of users; (2) require
encryption for passwords to prevent their disclosure to unauthorized
individuals; and (3) implement procedures to control the use of user
accounts. FAA policy identifies and prescribes minimum requirements for
creating and managing passwords, including how complex the password
must be and how to protect it. DOT policy also addresses the necessity
to assign only one user to a given ID and password.
FAA did not adequately control user accounts and passwords to ensure
that only authorized individuals were granted access to its systems.
Because the agency did not always comply with complexity requirements,
passwords on numerous accounts may be easy for an attacker to guess.
Additionally, one of the databases we reviewed did not require strong
passwords. We also identified database passwords that were not
adequately protected because they were (1) readable by all system users
on two Web servers, (2) in clear text format on multiple shared server
directories, and (3) written into application program code. Such
weaknesses increase the risk that passwords may be disclosed to
unauthorized users and used to gain access to the system. Further,
administrators and/or users shared user IDs and passwords on various
devices, including servers, routers, and switches, thereby diminishing
the effectiveness of the control for attributing system activity to
individuals. As a result, FAA may not be able to hold users
individually accountable for system activity.
User Rights and File Permissions:
The concept of "least privilege" is a basic underlying principle for
securing computer systems and data. It means that users are granted
only those access rights and permissions that they need to perform
their official duties. To restrict legitimate users' access to only
those programs and files that they need to do their work, organizations
establish access rights and permissions. "User rights" are allowable
actions that can be assigned to users or to groups of users. File and
directory permissions are rules that are associated with a particular
file or directory and regulate which users can access them and the
extent of that access. To avoid unintentionally giving users
unnecessary access to sensitive files and directories, an organization
must give careful consideration to its assignment of rights and
permissions. DOT and FAA policies require that access privileges be
granted to users at the minimum level required to perform their job-
related duties.
FAA permitted excessive access to air traffic control systems, granting
rights and permissions that allowed more access than users needed to
perform their jobs. For example, FAA had granted users of a database
system the access rights to create or change sensitive system files--
even though they did not have a legitimate business need for this
access. Further, the permissions for sensitive system files also
inappropriately allowed all users to read, update, or execute them.
Audit and Monitoring of Security-Relevant Events:
To establish individual accountability, monitor compliance with
security policies, and investigate security violations, it is crucial
to determine what, when, and by whom specific actions have been taken
on a system. Organizations accomplish this by implementing system or
security software that provides an audit trail that they can use to
determine the source of a transaction or attempted transaction and to
monitor users' activities. The way in which organizations configure
system or security software determines the nature and extent of
information that can be provided by the audit trail. To be effective,
organizations should configure their software to collect and maintain
audit trails that are sufficient to track security-relevant events. DOT
policy requires that audit logging be enabled on systems so that these
events can be monitored.
For the systems we reviewed, FAA did not consistently audit and monitor
security-relevant system activity on its servers. For example, on key
devices that we reviewed, logging either was disabled or configured to
overwrite, or it did not collect information on important security-
relevant events such as failed login attempts. As a result, if a system
was modified or disrupted, the agency's capability to trace or recreate
events would be diminished.
In response to weaknesses that we identified in electronic access
controls, FAA officials told us that they had already corrected many of
the weaknesses. Agency officials also pointed out that because major
portions of air traffic control systems consist of custom-built, older
equipment with special-purpose operating systems, proprietary
communication interfaces, and custom-built software, the possibilities
for unauthorized access are limited and therefore mitigate the risks.
However, as we noted in our 1998 report[Footnote 11] on FAA information
security, one cannot conclude that old or obscure systems are secure
simply because their configurations may not be commonly understood by
external hackers. In addition, the systems' proprietary features do not
provide protection from attack by disgruntled current and former
employees who understand them, or from more sophisticated hackers. The
weaknesses that we identified could allow unauthorized access to
certain systems.
Other Information System Controls Were Not Sufficient:
In addition to electronic access controls, other important controls
should be in place to ensure the security and reliability of an
organization's data. These controls include policies, procedures, and
control techniques to physically secure computer resources, conduct
suitable background investigations, provide appropriate segregation of
duties, and prevent unauthorized changes to application software.
However, weaknesses existed in each of these areas. These weaknesses
increase the risk of unauthorized access to and modification of FAA's
information systems and of disruption of service.
Physical Security:
Physical security controls are important for protecting computer
facilities and resources from espionage, sabotage, damage, and theft.
These controls restrict physical access to computer resources, usually
by limiting access to the buildings and rooms in which the resources
are housed and by periodically reviewing the access granted, in order
to ensure that access continues to be appropriate. At FAA, physical
access control measures (such as guards, badges, and locks--used alone
or in combination) are vital to protecting the agency's sensitive
computing resources from both external and internal threats.
FAA has implemented a facility security management program that
requires all staffed facilities to undergo a physical security review.
These physical security reviews are part of an overall facility
accreditation program, which requires facilities to meet all required
security measures in order to become accredited. Since our December
2000 report, FAA has made progress with this program and has accredited
about 430 additional facilities for a total of 64.8 percent of its
staffed facilities (see fig. 5).
Figure 5: Percentage of Staffed Facilities That Have Been Accredited:
[See PDF for image]
[End of figure]
Although FAA had taken some actions to strengthen its physical security
environment, certain weaknesses reduced its effectiveness in protecting
and controlling physical access to sensitive areas such as server
rooms. Facility reviews are supposed to determine the overall risk
level at the facility, examine the facility's security procedures, and
discover local threats and vulnerabilities. However, in 2004, DOT's OIG
reported that these physical security reviews generally focused more on
the facility's perimeter than on vulnerabilities within the facility.
We also identified weaknesses in FAA's physical security controls.
Specific examples are listed below:
* FAA did not consistently ensure that access to sensitive computing
resources had been granted to only those who needed it to perform their
jobs.
* At the time of our review, FAA did not have a policy in place
requiring that (1) physical access logs be reviewed for suspicious
activity or (2) access privileges be reviewed to ensure that employees
and contractors who had been granted access to sensitive areas still
needed it. As a result, none of the sites we visited could ensure that
employees and contractors who were accessing sensitive areas had a
legitimate need for access.
* Sensitive computing resources and critical operations areas were not
always secured.
* FAA did not properly control the badging systems used for granting
physical access to facilities. The required information security access
controls regarding password protection were inconsistently implemented,
and division of roles and responsibilities was not enforced in the
automated system.
* The entrances to facilities were not always adequately protected.
Visitor screening procedures were inconsistently implemented, and
available tools were not being used properly or to their fullest
capability.
These weaknesses in physical security increase the risk that
unauthorized individuals could gain access to sensitive computing
resources and data and could inadvertently or deliberately misuse or
destroy them.
Background Investigations:
According to OMB Circular A-130,[Footnote 12] it has long been
recognized that the greatest harm to computing resources has been done
by authorized individuals engaged in improper activities--whether
intentionally or accidentally. Personnel controls (such as screening
individuals in positions of trust) supplement technical, operational,
and management controls, particularly where the risk and magnitude of
potential harm is high. NIST guidelines suggest that agencies determine
the sensitivity of particular positions, based on such factors as the
type and degree of harm that the individual could cause by misusing the
computer system and on more traditional factors, such as access to
classified information and fiduciary responsibilities. Background
screenings (i.e., investigations) help an organization to determine
whether a particular individual is suitable for a given position by
attempting to ascertain the person's trustworthiness and
appropriateness for the position. The exact type of screening that
takes place depends on the sensitivity of the position and any
applicable regulations by which the agency is bound.
In 2000, we testified[Footnote 13] that FAA had failed to conduct
background investigations on thousands of contractor personnel.
Further, according to the testimony, many reinvestigations--which are
required every 5 years for top secret clearances--were never completed.
Since our 2000 testimony, the agency has made improvements to its
background investigation program. For example, according to agency
officials, it has completed background investigations for 90 percent of
its contractor personnel and has implemented an automated system to
track and report when reinvestigations are required.
Although FAA has recently made improvements to its background
investigation program, the agency has not always properly designated
sensitivity levels for positions involving tasks that could have a
major impact on automated information systems. According to the Office
of Personnel Management (OPM), positions with major responsibility for
the design, testing, maintenance, operation, monitoring, or management
of systems hardware and software should be designated as "high
risk."[Footnote 14] However, FAA has designated some of these types of
positions as "moderate risk;" all 20 individuals that we identified as
having system responsibilities with potentially significant access were
designated as moderate risk or below. Further, OPM recommends a minimum
background investigation[Footnote 15] for moderate risk positions.
Nonetheless, FAA had been requiring only a National Agency Check and
Inquiry, a less stringent investigation. Without properly designating
position sensitivity levels and performing the appropriate background
investigations, the agency faces an increased risk that inappropriate
individuals could modify critical information and systems or disrupt
operations.
Segregation of Duties:
Segregation of duties refers to the policies, procedures, and
organizational structure that help ensure that no single individual can
independently control all key aspects of a process or computer-related
operation and thereby gain unauthorized access to assets or records.
Often segregation of duties is achieved by dividing responsibilities
among two or more individuals or organizational groups. This diminishes
the likelihood that errors and wrongful acts will go undetected,
because the activities of one individual or group will serve as a check
on the activities of the other. Inadequate segregation of duties
increases the risk that erroneous or fraudulent transactions could be
processed, improper program changes be implemented, and computer
resources be damaged or destroyed.
For the systems we reviewed, FAA did not properly segregate
incompatible duties in its computer-related operations. Key duties in a
computer environment that are generally segregated include software
design, development, and testing; software change control; computer
operations; and computer production control. However, on one of the
systems that we reviewed, FAA allowed software developers to place
application code into the production environment. With access to
production systems, software developers could intentionally introduce
malicious code. Additionally, FAA did not have mitigating controls; for
example, there was no provision for reviewing code on production
systems to ensure that only authorized code was placed into production.
FAA officials told us that it plans to establish an independent
production control group that would place code into production once
resources become available for this particular system. Without adequate
segregation of duties or appropriate mitigating controls, FAA is at
increased risk that unauthorized code could be introduced into the
production environment, possibly without detection.
Application Change Controls:
It is important to ensure that only authorized and fully tested
application programs are placed in operation. To ensure that changes to
application programs are necessary, work as intended, and do not result
in the loss of data or program integrity, such changes should be
documented, authorized, tested, and independently reviewed. In
addition, test procedures should be established to ensure that only
authorized changes are made to the application's program code.
Application change control procedures that FAA's contractor used were
incomplete. At one site, we reviewed change control and quality
assurance documentation for 10 of 50 software changes that had been
made by FAA's contractor in 2004. We determined that the contractor
appropriately followed its own change control process, only omitting a
few minor items in its documentation. However, although the
contractor's change control process adequately addressed software
testing, it did not include reviewing code after it had been installed
on production systems to verify that the correct code had been placed
into production. This issue is important, because developers are
allowed access to production systems. With no mitigating controls in
place, developers could introduce unauthorized code into production
systems--without detection.
Information Security Program Is Not Yet Fully Implemented:
A key reason for the information security weaknesses that we identified
in FAA's air traffic control systems was that the agency had not yet
fully implemented its information security program to help ensure that
effective controls were established and maintained. FAA has implemented
the foundation for an effective information security program with
written policy and guiding procedures that designate responsibility for
implementation throughout the agency.
FISMA[Footnote 16] requires agencies to implement an information
security program that includes:
* periodic assessments of the risk and the magnitude of harm that could
result from the unauthorized access, use, disclosure, disruption,
modification, or destruction of information and information systems;
* policies and procedures that (1) are based on risk assessments, (2)
cost-effectively reduce risks, (3) ensure that information security is
addressed throughout the life cycle of each system, and (4) ensure
compliance with applicable requirements;
* plans for providing adequate information security for networks,
facilities, and systems;
* security awareness training to inform personnel--including
contractors and other users of information systems--of information
security risks and of their responsibilities in complying with agency
policies and procedures;
* at least annual testing and evaluation of the effectiveness of
information security policies, procedures, and practices relating to
management, operational, and technical controls of every major
information system that is identified in the agencies' inventories;
* a process for planning, implementing, evaluating, and documenting
remedial action to address any deficiencies in their information
security policies, procedures, or practices;
* procedures for detecting, reporting, and responding to security
incidents; and:
* plans and procedures to ensure continuity of operations for
information systems that support the operations and assets of the
agency.
FAA has made progress in implementing information security by
establishing an agencywide information security program and addressing
many of its previously identified security weaknesses. FAA's
Information System Security Program Handbook requires each of these
FISMA elements, and the agency has initiatives under way in all of
these areas. In addition, the Office of Information Systems Security
has developed a security management tool to monitor (1) the status of
corrective actions, (2) the status of certifications and
authorizations[Footnote 17] for all systems in FAA's inventory, (3)
information security-related budgetary allocations and expenditures,
and (4) training requirements for key security personnel.
However, we identified instances in which the program had not been
fully or consistently implemented for the air traffic control systems.
Agency officials recognize that more work is needed to continue to
improve their information security program.
Risk Assessments:
Identifying and assessing information security risks are essential
steps in determining what controls are required. Moreover, by
increasing awareness of risks, these assessments can generate support
for the policies and controls that are adopted in order to help ensure
that these policies and controls operate as intended. Further, OMB
Circular A-130, appendix III, prescribes that risk be reassessed when
significant changes are made to computerized systems--or at least every
3 years, as does FAA policy. Consistent with NIST guidance, FAA
requires that risk assessments include identifying system
interconnections, information sensitivity, threats and existing
countermeasures and analyzing vulnerabilities.
The risk assessments that we reviewed generally complied with FAA
requirements. For the systems we reviewed, FAA provided five risk
assessments. Four of the five included the required topics. However,
the risk assessment for the fifth one was incomplete and did not always
address countermeasures. Inadequately assessing risk and identifying
countermeasures can lead to implementing inadequate or inappropriate
security controls that might not address the system's true risk, and to
costly efforts to subsequently implement effective controls.
Policies and Procedures:
Another key task in developing an effective information security
program is to establish and implement risk-based policies, procedures,
and technical standards that govern security over an agency's computing
environment. If properly implemented, policies and procedures should
help reduce the risk that could come from unauthorized access or
disruption of services. Technical security standards provide consistent
implementing guidance for each computing environment. Because security
policies are the primary mechanism by which management communicates its
views and requirements, it is important to establish and document them.
FAA's Office of Information Systems Security has developed systems
security policies, with the intent to provide security commensurate
with the risks of unauthorized access or disruption of service. For
example, FAA has developed policies on an overall information system
security program, background investigations, and password management.
Further, the agency's Information System Security Program Handbook
provides detailed information on certification and authorization of
information systems. DOT has also developed various technical
standards, which address various computing environments. However, FAA's
policies and procedures did not address issues such as reviewing and
monitoring physical access. In addition, the agency had not yet
developed procedures to effectively implement patch management for its
air traffic control systems. Also, as noted earlier, in some instances-
-such as password management--FAA was not following its own policies
and procedures. Without effectively implementing policies and
procedures, the agency has less assurance that their systems and
information are protected.
Security Plans:
The objective of system security planning is to improve the protection
of information technology resources. A system security plan provides an
overview of the system's security requirements and describes the
controls that are in place--or planned--to meet those requirements. OMB
Circular A-130 requires that agencies develop and implement system
security plans for major applications and for general support
systems[Footnote 18] and that these plans address policies and
procedures for providing management, operational, and technical
controls. Further, Circular A-130 requires that agencies' plans be
consistent with guidance issued by NIST. FAA policy requires that
security plans be developed, and its Information System Security
Program Handbook provides guidance on developing security plans.
According to both FAA and NIST, plans should include elements such as
security controls currently in place or planned, the individual
responsible for the security of the system, a description of the system
and its interconnected environment, and rules of behavior.
Although the security plans that we reviewed generally complied with
FAA policy and guidance, we identified instances where plans were
incomplete or not up-to-date. All five of the information system
security plans we reviewed were missing information required by FAA.
Procedures outlining the individuals responsible for plan reviews and
monitoring the status of planned controls were missing in each case.
Also, no agency officials were identified to fulfill this
responsibility. Although a security plan had been developed for one of
FAA's major applications, it was missing such required sections as
rules of behavior and controls in place for public access. Another plan
did not identify the system owner or the individual who had
responsibility for system security. Further, some sections in one of
the plans we reviewed were outdated. For example, security controls
that existed at the time of our review were not described in the plan.
Without complete and up-to-date security plans, FAA cannot ensure that
appropriate controls are in place to protect its systems and critical
information.
Security Awareness Training:
Another FISMA requirement for an information security program is that
it promote awareness and provide required training for users so that
they can understand the system security risks and their role in
implementing related policies and controls to mitigate those risks.
Computer intrusions and security breakdowns often occur because
computer users fail to take appropriate security measures. For this
reason, it is vital that employees and contractors who use computer
resources in their day-to-day operations be made aware of the
importance and sensitivity of the information they handle, as well as
the business and legal reasons for maintaining its confidentiality,
integrity, and availability. FISMA mandates that all federal employees
and contractors who use agency information systems be provided with
periodic training in information security awareness and accepted
information security practice. FAA has established a policy requiring
employees and contractors to take annual security awareness training.
Further, FISMA requires agency CIOs to ensure that personnel with
significant information security responsibilities get specialized
training. OMB and NIST also require agencies to implement system-
specific security training.
In December 2000, we reported that FAA had not fully implemented a
security awareness and training program. Since then, the agency has
established its policy for annual training and has implemented an
agencywide security awareness program that includes newsletters,
posters, security awareness days, and a Web site. FAA has also
implemented a Web-based security awareness training tool that not only
meets the requirements of FISMA, but also records whether individuals
have completed the training. The training records that we reviewed
showed that personnel with significant information security
responsibilities had received specialized training.
Despite the agency's progress in security awareness training, we
identified shortcomings with the program. For example, although FAA
implemented a Web-based training tool, the agency does not require all
employees and contractors to use it. As a result, not all contractors
and employees receive annual training, training is not appropriately
tracked and reported, and the training provided in place of the tool is
not always adequate. Although FAA reported in its most recent FISMA
report that 100 percent of its employees and contractors had taken
security awareness training, it was unable to provide documentation for
more than one-third of selected[Footnote 19] employees and contractors.
Further, the agency does not have an effective tracking mechanism for
security awareness training. In some circumstances, management relies
on verbal responses from employees and contractors on whether they have
completed training, but it has no uniform reporting requirements.
Instead they receive responses in different forms, such as telephone
conversations, e-mails, and faxes. In instances where the Web-based
tool is not used, the awareness training may be inadequate. At one of
the sites we visited, this training consisted of a briefing that did
not cover information system security and risks. Further, the agency
had not developed guidance or procedures for system-specific security
training, as required by OMB and NIST.
Without adequate security awareness and training programs, security
lapses are more likely to occur. As in our 2000 report, we were able to
access sensitive security information on the Internet. FAA agreed that
the information we identified was sensitive and took prompt action to
remove the specific examples that we had provided. However, 8 months
later, one of the examples was available on the Internet again, even
though it was marked for "Internal Distribution Only."
Tests and Evaluations of Control Effectiveness:
Another key element of an information security program is testing and
evaluating systems to ensure that they are in compliance with policies
and that policies and controls are both appropriate and effective. This
type of oversight is a fundamental element because it demonstrates
management's commitment to the security program, reminds employees of
their roles and responsibilities, and identifies and mitigates areas of
noncompliance and ineffectiveness. Although control tests and
evaluations may encourage compliance with security policies, the full
benefits are not achieved unless the results improve the security
program. Analyzing the results of security reviews provides security
specialists and business managers with a means of identifying new
problem areas, reassessing the appropriateness of existing controls,
and identifying the need for new controls. FISMA requires that the
frequency of tests and evaluations be based on risks, but occur no less
than annually. Security tests and evaluations are part of FAA's
certification and authorization process, which is required every 3
years or when significant changes to the system occur. According to
agency officials, in each of the following 2 years, FAA conducts a self-
assessment based on NIST guidance.
Although FAA had conducted system tests and evaluations, documentation
and testing were not always adequate. For example:
* In three of the five test plan and results reports we reviewed, most
of the test results were not included. Additionally, very little
testing was conducted on the network and infrastructure pieces of any
of the systems we reviewed.
* As of April 2005, the certifications and authorizations for about 24
percent of the air traffic control systems were either outdated or had
not been completed. According to FAA officials, the agency's risk-based
approach focused on certifying and accrediting all of its systems;
therefore, management accepted an extension beyond 3 years for some
systems.
* DOT's IG testified that some of the testing is being conducted only
on developmental systems, rather than operational systems.
* FAA's practice was to perform system tests and evaluations annually
without regard to criticality. Our tests of critical systems identified
many weaknesses. More frequent testing by FAA of these systems may have
identified, and FAA could have corrected, many of the information
security weaknesses discussed in this report.
Without appropriate tests and evaluations, the agency cannot be assured
that employees and contractors are complying with established policies
or that policies and controls are appropriate and working as intended.
Remedial Actions:
Remedial action plans are a key component described in FISMA. They
assist agencies in identifying, assessing, prioritizing, and monitoring
the progress in correcting security weaknesses that are found in
information systems. According to OMB Circular A-123, agencies should
take timely and effective action to correct deficiencies that they have
identified through a variety of information sources. To accomplish
this, remedial action plans should be developed for each deficiency,
and progress should be tracked for each. FAA policy requires
remediation reports to address the results of tests and evaluations.
Although the agency has developed a remedial action tracking system,
which included remedial plans, for weaknesses identified through
previous reviews in order to help it monitor the progress in correcting
security weaknesses, these remedial plans did not address all
identified weaknesses, and some deficiencies were not always corrected
in a timely manner.
Incident Handling:
Even strong controls may not block all intrusions and misuse, but
organizations can reduce the risks associated with such events if they
promptly take steps to detect and respond to them before significant
damage is done. In addition, accounting for and analyzing security
problems and incidents are effective ways for organizations to gain a
better understanding of threats to their information and of the costs
of their security-related problems. Such analyses can pinpoint
vulnerabilities that need to be eliminated so that they will not be
exploited again. Problem and incident reports can provide valuable
input for risk assessments, can help in prioritizing security
improvement efforts, and can be used to illustrate risks and related
trends for senior management. DOT has issued a policy for detecting,
reporting, and responding to security incidents.
In December 2000, we reported that FAA had not fully implemented an
effective intrusion detection capability. Since then, FAA has
established a Computer Security Incident Response Center, whose mission
is to detect and respond to intrusions on FAA's systems. The Center
produces incident reports and provides agency management with various
analyses. However, the following weaknesses prevent it from effectively
detecting and responding to many potential threats:
* Although the agency has deployed intrusion detection systems, these
systems do not cover all segments of the air traffic control system.
According to FAA officials, the agency has a risk-based plan to further
deploy intrusion detection capabilities.
* One of the intrusion detection systems that we reviewed was
configured in such a way that it was unable to detect potential
intrusions.
While FAA has made progress, it remains at risk of not being able to
detect or respond quickly to security incidents.
Continuity of Operations:
Continuity of operations controls, sometimes referred to as service
continuity, should be designed to ensure that when unexpected events
occur, key operations continue without interruption or are promptly
resumed, and critical and sensitive data are protected. These controls
include environmental controls and procedures designed to protect
information resources and minimize the risk of unplanned interruptions,
along with a plan to recover critical operations should interruptions
occur. If continuity of operations controls are inadequate, even a
relatively minor interruption could result in significant adverse
nationwide impact on air traffic. FAA requires that continuity of
operations plans be included as part of its certification and
authorization process.
Although FAA has various initiatives under way to address continuity of
operations, shortcomings exist. For the systems we reviewed, FAA
identified five continuity of operations plans. One plan was incomplete
and FAA included the need to complete this plan in its remediation
report. While four plans were completed, one of these did not contain
accurate information. It described an operating environment to be used
as a contingency, yet this environment did not exist at the time of our
review. Further, in April 2005, DOT's IG testified that FAA had not
made sufficient progress in developing continuity plans to enable it to
restore air traffic control services in case of a prolonged service
disruption at the en route centers. Until the agency completes actions
to address these weaknesses, it is at risk of not being able to
appropriately recover in a timely manner from certain service
disruptions.
Conclusions:
Although FAA has made progress in implementing information security by
establishing an agencywide information security program and addressing
many of its previously identified security weaknesses, significant
information security weaknesses remain that could potentially lead to
disruption in aviation operations. These include weaknesses in
electronic access controls, for example, in managing networks, system
patches, user accounts and passwords, and user rights and in logging
and auditing security-relevant events. Weaknesses in physical security,
background investigations, segregation of duties, and application
change controls increase the level of risk. A key reason for FAA's
weaknesses in information system controls is that it has not yet fully
implemented an information security program to ensure that effective
controls are established and maintained. Effective implementation of
such a program provides for periodically assessing risks, establishing
appropriate policies and procedures, developing and implementing
security plans, promoting security awareness training, testing and
evaluating the effectiveness of controls, implementing corrective
actions, responding to incidents, and ensuring continuity of
operations. Although FAA has initiatives under way to address these
areas, further efforts are needed to fully implement them.
Recommendations for Executive Action:
To help establish effective information security over air traffic
control systems, we recommend that the Secretary of Transportation
direct the FAA Administrator to take the following 12 actions to fully
implement an information security program:
* Ensure that risk assessments are completed.
* Develop and implement policies and procedures to address such issues
as patch management and the reviewing and monitoring of physical
access.
* Review system security plans to ensure that they contain the
information required by OMB A-130 and are up to date.
* Enhance the security awareness training program to ensure that all
employees and contractors receive information security awareness
training, as well as system specific training, and that completion of
the training is appropriately reported and tracked.
* Develop a process to ensure that sensitive information is not
publicly available on the Internet.
* Conduct tests and evaluations of the effectiveness of controls on
operational systems, and document results.
* Perform more frequent testing of system controls on critical systems
to ensure that the controls are operating as intended.
* Review remedial action plans to ensure that they address all of the
weaknesses that have been identified.
* Prioritize weaknesses in the remedial action plans and establish
appropriate, timely milestone dates for completing the planned actions.
* Implement FAA's plan to deploy intrusion detection capabilities for
portions of the network infrastructure that are not currently covered.
* Correct configuration issues in current intrusion detection systems
to ensure that they are working as intended.
* Review service continuity plans to ensure that they appropriately
reflect the current operating environment.
We are also making recommendations in a separate report with limited
distribution. These recommendations consist of actions to be taken to
correct the specific information security weaknesses we identified that
are related to network management, patch management, password
management, user privileges, auditing and logging, physical security,
background investigations, segregation of duties, and application
change controls.
Agency Comments and Our Evaluation:
In providing oral comments on a draft of this report, the FAA's CIO
agreed to consider our recommendations and emphasized several points.
He stated that the issues we identified in the three individual systems
we examined are not necessarily indicative of the security posture of
the air traffic control system as a whole. We acknowledge that we
focused our examination on the technical controls of three critical
systems. In addition, we reviewed management and operational controls
at five sites and FAA headquarters and relied on the OIG's prior work
pertaining to air traffic control systems. We concluded that
significant information security weaknesses remain that could
potentially lead to a disruption in aviation operations.
The CIO also indicated that the implications of the findings in this
report should be tempered by the understanding that individual system
vulnerabilities are further mitigated by system redundancies and
separate access controls that are built into the overall air traffic
control system architecture to provide additional protection that is
not considered within the context of this review. He was concerned that
our report does not always balance the identification of individual
system issues with consideration of the relative risk that an issue may
pose to the overall system and that the public may be prone to infer
from the report that the security risks to the air traffic control
system are higher than they may actually be. We acknowledge that FAA
may have other protections built into the overall system architecture.
However, as noted in this report, the complex air traffic control
system relies on several interconnected systems. As a result, the
weaknesses we identified may increase the risk to other systems. For
example, FAA did not consistently configure network services and
devices securely to prevent unauthorized access to and ensure the
integrity of computer systems operating on its networks.
In addition, the CIO indicated that all security findings for air
traffic control systems, including those from our report, are evaluated
and prioritized for action and that FAA has established a sound track
record for moving quickly to address priority issues--as demonstrated
by the extensive actions the agency has taken on issues identified in
our previous reports and in DOT OIG reports. For example, according to
the CIO, FAA established an extensive information security training
program; deployed intrusion detection systems; and established the
Computer Security Incident Response Center as a prevention, detection
and reporting capability on a 24x7x365 basis. Finally, he stated that
as a result of FAA's information security actions, it achieved 100
percent of the President's Management Agenda goals for certification
and authorization of its systems, completed certification and
authorization for over 90 percent of its systems in fiscal year 2004,
and completed 100 percent of its certifications and authorizations by
June 30, 2005. We acknowledge in our report that FAA has made progress
in implementing its information security program and has initiatives
under way; however, we identified weaknesses in key areas cited by the
CIO. For example, as noted in this report, although FAA conducted tests
and evaluations as part of its certification and authorization process,
some of these were outdated and documentation and testing were not
always adequate.
The CIO also provided specific technical comments, which we have
incorporated, as appropriate, in the report.
As agreed with your offices, unless you publicly announce the contents
of this report earlier, we plan no further distribution until 30 days
from the report date. At that time, we will send copies to
congressional committees with jurisdiction over FAA and executive
branch agencies' information security programs, the Secretary of
Transportation, the FAA Administrator, the DOT Inspector General, and
other interested parties. We also will make copies available to others
on request. In addition, this report will be available at no charge on
the GAO Web site at [Hyperlink, http://www.gao.gov].
If you have any questions regarding this report, please contact me at
(202) 512-6244 or by e-mail at [Hyperlink, wilshuseng@gao.gov]. Contact
points for our Offices of Congressional Relations and Public Affairs
may be found on the last page of this report. Key contributors to this
report are listed in appendix I.
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
[End of section]
Appendixes:
Appendix I: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gregory C. Wilshusen (202) 512-6244:
Acknowledgments:
In addition to the person named above, Edward Alexander, Mark Canter,
Nicole Carpenter, Jason Carroll, Lon Chin, William Cook, Kirk
Daubenspeck, Neil Doherty, Patrick Dugan, Joanne Fiorino, Edward
Glagola, Steve Gosewehr, Jeffrey Knott, Carol Langelier, Harold Lewis,
Duc Ngo, Eugene Stevens, and Chris Warweg made key contributions to
this report.
(310523):
FOOTNOTES
[1] We have issued numerous reports and testimonies on FAA's
modernization efforts. See, for example, GAO, Federal Aviation
Administration: Stronger Architecture Program Needed to Guide Systems
Modernization Efforts, GAO-05-266 (Washington, D.C. Apr. 29, 2005) and
GAO, Air Traffic Control: FAA's Modernization Efforts--Past, Present,
and Future, GAO-04-227T (Washington, D.C. Oct. 30, 2003). Since 1995,
we have designated the modernization program as high risk because of
the program's size, importance, and complexity and because of the cost
and numerous problems it has encountered in systems acquisition.
[2] For example, see GAO, FAA Computer Security: Recommendations to
Address Continuing Weaknesses, GAO-01-171 (Washington, D.C. Dec. 6,
2000); GAO, FAA Computer Security: Concerns Remain Due to Personnel and
Other Continuing Weaknesses, GAO/AIMD-00-252 (Washington, D.C. Aug. 16,
2000); and GAO, Air Traffic Control: Weak Computer Security Practices
Jeopardize Flight Safety, GAO/AIMD-98-155 (Washington, D.C. May 18,
1998).
[3] GAO, High Risk Series: An Update, GAO-05-207 (Washington, D.C.
January 2005).
[4] Federal Information Security Management Act of 2002, Title III, E-
Government Act of 2002, P.L. 107-347 (Dec. 17, 2002).
[5] GAO, Federal Information System Controls Audit Manual, Volume I-
Financial Statements Audits, GAO/AIMD-12.19.6 (Washington, D.C. January
1999).
[6] Operational controls focus on controls that are executed by people
(as opposed to systems). Management controls address security
techniques and concerns that are normally addressed by organization's
information security program management, such as management of risk
within the organization. Technical controls focus on the security
controls that information systems execute; these controls require
significant operational considerations and should be consistent with
management of security within the organization.
[7] A denial-of-service attack is an attack on a network that sends a
flood of useless traffic that prevents legitimate use of the network.
[8] A certificate is a data record that is used for authenticating
network entities such as a server or a client.
[9] Cryptography relies on two basic components: an algorithm and a
key. The algorithm is the mathematical function used to encrypt or
decrypt, and the key is the parameter used in the transformation. A
private key is uniquely associated with an entity.
[10] For example, see GAO, Information Security: Continued Action
Needed to Improve Software Patch Management, GAO-04-706 (Washington,
D.C. June 2, 2004).
[11] GAO/AIMD-98-155.
[12] Office of Management and Budget, Circular A-130, Appendix III,
Security of Federal Automated Information Resources (Nov. 28, 2000).
[13] GAO, FAA Computer Security: Actions Needed to Address Critical
Weaknesses That Jeopardize Aviation Operations, GAO/T-AIMD-00-330
(Washington, D.C. Sept. 27, 2000).
[14] For "high risk" positions, OPM recommends a background
investigation, which includes a National Agency Check, credit search,
personal interviews of subject and sources, written inquiries, and
record searches covering specific areas of a person's background during
the most recent 5 years, and additional record searches during the most
recent 7 years.
[15] A minimum background investigation is an investigation consisting
of a National Agency Check and Inquiry, a credit search, and telephone
inquiries to follow-up on written inquiries not returned.
[16] FISMA requires each agency to develop, document, and implement an
agencywide information security program to provide information security
for the information and systems that support the operations and assets
of the agency, including those operated or maintained by contractors or
others on behalf of the agency, using a risk-based approach to
information security management.
[17] OMB information security policy requires agency management
officials to formally authorize each of their information systems to
process, store, or transmit information, and to accept the risk
associated with their operation. This authorization (accreditation)
decision is to be supported by a formal technical evaluation
(certification) of the management, operational, and technical controls
established in an information system's security plan.
[18] A general support system is an interconnected set of information
resources under the same direct management control that shares common
functionality. It normally includes hardware, software, information,
data, applications, communications, facilities, and people and provides
support for a variety of users and/or applications.
[19] We selected 65 individuals in total from the sites we visited. We
did not select a statistical sample. Some selections were random from a
listing of employees and contractors on-site, while others were based
on the role of an individual, such as a system administrator.
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: