Information Security

Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk Gao ID: GAO-05-362 April 22, 2005

The federal government increasingly relies on information technology (IT) systems to provide essential services affecting the health, economy, and defense of the nation. To assist in providing these important services, the federal government relies extensively on contractors to provide IT services and systems. In addition to contractors that provide systems and services to the federal government, other organizations possess or use federal information or have access to federal information systems. These other organizations with privileged access to federal data and systems can include grantees, state and local governments, and research and educational institutions. The Office of Management and Budget (OMB) cited contractor security as a governmentwide challenge in a 2001 information security report to Congress. Recognizing the need for agencies to have effective information security programs, Congress passed the Federal Information Security Management Act of 2002 (FISMA), which provides the overall framework for ensuring the effectiveness of information security controls that support federal operations and assets. FISMA requirements apply to all federal contractors and organizations or sources that possess or use federal information or that operate, use, or have access to federal information systems on behalf of an agency. Our objectives were to (1) describe the information security risks associated with the federal government's reliance on contractor-provided IT systems and services and other users with privileged access to federal data and systems; (2) identify methods used by federal agencies to ensure security of information and information systems that are operated, used, or accessed by contractors and other users with privileged access to federal data; and (3) discuss steps the administration is taking to ensure implementation and oversight of security of information and information systems that are operated, used, or accessed by contractors and other users with privileged access to federal data and systems.

Contractors and users with privileged access to federal data and systems provide valuable services that contribute to the efficient functioning of the government, but a range of risks (including operational, strategic, and legal) must be managed effectively. Most agencies recognize risks to the confidentiality, integrity, and availability of their information and systems associated with the use of contractors and other users with privileged access to federal data and systems. For example, malicious code can be inserted into agency software and systems. In addition, agencies also reported specific risks when contractors develop software or perform work at off-site facilities. Federal agencies reported additional risks to their operations posed by other users with privileged access to federal data and systems, such as lack of controlled network connections, poor access controls, and the introduction of viruses and worms. Agencies use contracts, policies, and self-assessments for ensuring information security oversight of contractors; however, each of these methods has limitations and needs further strengthening. Most agencies reported using contract language to establish information security requirements for contractors. However, agency-provided contract language generally did not address key elements of FISMA, such as annual testing of controls. In addition, the majority of agencies reported having information security policies for contractors and almost two-thirds of the agencies reported having such policies for other users with privileged access to federal data. Yet our analysis of agency-provided policies found that only 5 agencies had established policies that specifically addressed information security oversight of contractor-provided systems. Finally, the majority of agencies reported using the NIST self-assessment tool to assess contractor security capabilities. However, only 10 reported using the tool to assess the security implemented by other users with privileged access to federal data. The administration continues in its efforts to improve information security oversight of contractors, but challenges remain. For example, efforts to update the Federal Acquisition Regulation (FAR) to include the information security requirements of FISMA (which would be reflected in all relevant government contracts) have been under way since 2002, but are not yet complete. OMB continues to gather data about the number of agency systems, including those that are operated by contractors, and how many have been reviewed using a self-assessment tool. However, the data submitted showed that several agencies' chief information officers and inspectors general disagreed on the number of contractor or agency systems by as many as 100 systems or more. In addition, the data collected by OMB does not address other users with privileged access to federal data or the quality of the self assessments. Finally, NIST has developed guidance, parts of which are relevant to contractor security oversight. However, unified governmentwide guidance for overseeing information security of contractors and other users with privileged access to federal data and systems has not been issued.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-05-362, Information Security: Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk This is the accessible text file for GAO report number GAO-05-362 entitled 'Information Security: Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk' which was released on May 23, 2005. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: April 2005: Information Security: Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk: [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-362]: GAO Highlights: Highlights of GAO-05-362, a report to congressional requesters: Why GAO Did This Study: The federal government relies extensively on information technology services and systems provided by contractors. The Federal Information Security Management Act of 2002 (FISMA) requires agencies to establish information security programs that extend to contractors and other users of federal data and systems, such as grantees, state and local governments, and research and educational institutions. GAO was asked to (1) describe the information security risks associated with contractors and users with privileged access to federal data and systems; (2) identify methods federal agencies use to ensure security of information and systems provided or used by contractors and other users with privileged access to federal data; and (3) determine what steps the administration is taking to ensure implementation and oversight of security of federal information and systems provided or used by contractors and other users with privileged access. What GAO Found: Contractors and users with privileged access to federal data and systems provide valuable services that contribute to the efficient functioning of the government, but they present a range of related risks that must be managed effectively. Most agencies recognize risks to the confidentiality, integrity, and availability of their information and systems associated with the use of contractors and other users with privileged access to federal data and systems. In addition, agencies reported specific risks when contractors develop software or perform work at off-site facilities. Agencies use contracts, policies, and self-assessments as methods to ensure information security oversight of contractors; however, each method has limitations and needs further strengthening. For example, most agencies have not incorporated FISMA requirements, such as annual testing of controls, into their contract language. Additionally, most of the 24 major agencies reported having policies for contractors and users with privileged access to federal data and systems; however, GAO‘s analysis of submitted agency policies found that only 5 agencies had established specific information security oversight policies (see figure). Finally, while the majority of agencies reported using a National Institute of Standards and Technology self-assessment tool to review contractor security capabilities, only 10 agencies reported using the tool to assess users with privileged access to federal data and systems, which may expose federal data to increased risk. The administration continues in its efforts to improve information security oversight of contractors, but challenges remain. For example, efforts to update the Federal Acquisition Regulation to address information security have been under way since 2002, but are not complete. OMB continues to gather data about the number of agency systems, including those that are operated by contractors and how many have been reviewed. However, the submitted data showed that several agencies disagreed internally on the number of contractor or agency systems. Finally, federal agencies could benefit from unified guidance for overseeing information security of contractors and privileged users of federal data and systems. Major Agencies with Security Policies for Contractors, Privileged Users of Federal Data and Systems, and Contractor Security Oversight: [See PDF for image] [End of figure] What GAO Recommends: GAO recommends that the Office of Management and Budget (OMB) ensure that the Federal Acquisition Regulation aligns with FISMA and that agencies develop contractor oversight policies We also recommend that the Commerce develop unified guidance. OMB and Commerce generally agreed with the results of this report. www.gao.gov/cgi-bin/getrpt?GAO-05-362. To view the full product, including the scope and methodology, click on the link above. For more information, contact Gregory C. Wilshusen (202) 512-3317 or wilshuseng@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Federal Agencies Face a Range of Risks from Contractors and Other Users of Federal Data and Systems: Agencies Use Various Methods for Overseeing Contractor Security: Administration Efforts to Improve Information Security of Contractors Continue, but Challenges Remain: Conclusions: Recommendations for Executive Action: Agency Comments on Our Evaluation: Appendixes: Appendix I: Objectives, Scope, and Methodology: Appendix II: Comments from the Department of Commerce: Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: Staff Acknowledgments: Tables: Table 1: Examples of Agency-Identified Risks to Federal Systems and Data Resulting from Reliance on Contractors: Table 2: The FAR Privacy or Security Safeguards Contract Language: Table 3: Number of Contractor Facilities and Operations Reported in Fiscal Year 2004: Figures: Figure 1: Federal Sources for Addressing Information Security Oversight of Contractor-Delivered IT Systems and Services: Figure 2: Major Agencies with Security Policies for Contractors, Privileged Users of Federal Data and Systems, and Contractor Security Oversight: Figure 3: Total Contractor Facilities and Number of Facilities Reviewed for 23 Federal Agencies in Fiscal Years 2002-2004: Abbreviations: CFO: chief financial officer: DOD: Department of Defense: FAR: Federal Acquisition Regulation: FISMA: Federal Information Security Management Act of 2002: GSA: General Services Administration: IT: information technology: NIST: National Institute of Standards and Technology: OMB: Office of Management and Budget: Letter April 22, 2005: The Honorable Tom Davis: Chairman, Committee on Government Reform: House of Representatives: The Honorable Adam Putnam: House of Representatives: The federal government increasingly relies on information technology (IT) systems to provide essential services affecting the health, economy, and defense of the nation. To assist in providing these important services, the federal government relies extensively on contractors to provide IT services and systems. In addition to contractors that provide systems and services to the federal government, other organizations possess or use federal information or have access to federal information systems. These other organizations with privileged access to federal data and systems can include grantees, state and local governments, and research and educational institutions. The Office of Management and Budget (OMB) cited contractor security as a governmentwide challenge in a 2001 information security report to Congress. Recognizing the need for agencies to have effective information security programs, Congress passed the Federal Information Security Management Act of 2002 (FISMA), which provides the overall framework for ensuring the effectiveness of information security controls that support federal operations and assets. FISMA requirements apply to all federal contractors and organizations or sources that possess or use federal information or that operate, use, or have access to federal information systems on behalf of an agency. Our objectives were to (1) describe the information security risks associated with the federal government's reliance on contractor- provided IT systems and services and other users with privileged access to federal data and systems; (2) identify methods used by federal agencies to ensure security of information and information systems that are operated, used, or accessed by contractors and other users with privileged access to federal data; and (3) discuss steps the administration is taking to ensure implementation and oversight of security of information and information systems that are operated, used, or accessed by contractors and other users with privileged access to federal data and systems. To accomplish our review, we surveyed the 24 Chief Financial Officers Act (CFO) agencies[Footnote 1] regarding their policies and procedures for overseeing contractor security. We analyzed documentation submitted by the federal agencies and interviewed relevant officials in OMB, the General Services Administration (GSA), the Federal Acquisition Regulation Council, the National Institute of Standards and Technology (NIST), and private sector officials in the banking and finance industries. We conducted our work between August 2004 and March 2005 in accordance with generally accepted government auditing standards. Details of our objectives, scope, and methodology are included in appendix I. Results in Brief: Contractors and users with privileged access to federal data and systems provide valuable services that contribute to the efficient functioning of the government, but a range of risks (including operational, strategic, and legal) must be managed effectively. Most agencies recognize risks to the confidentiality, integrity, and availability of their information and systems associated with the use of contractors and other users with privileged access to federal data and systems. For example, malicious code can be inserted into agency software and systems. In addition, agencies also reported specific risks when contractors develop software or perform work at off-site facilities. Federal agencies reported additional risks to their operations posed by other users with privileged access to federal data and systems, such as lack of controlled network connections, poor access controls, and the introduction of viruses and worms.[Footnote 2] Agencies use contracts, policies, and self-assessments for ensuring information security oversight of contractors; however, each of these methods has limitations and needs further strengthening. Most agencies reported using contract language to establish information security requirements for contractors. However, agency-provided contract language generally did not address key elements of FISMA, such as annual testing of controls. In addition, the majority of agencies reported having information security policies for contractors and almost two-thirds of the agencies reported having such policies for other users with privileged access to federal data. Yet our analysis of agency-provided policies found that only 5 agencies had established policies that specifically addressed information security oversight of contractor-provided systems. Finally, the majority of agencies reported using the NIST self-assessment tool to assess contractor security capabilities. However, only 10 reported using the tool to assess the security implemented by other users with privileged access to federal data. The administration continues in its efforts to improve information security oversight of contractors, but challenges remain. For example, efforts to update the Federal Acquisition Regulation (FAR) to include the information security requirements of FISMA (which would be reflected in all relevant government contracts) have been under way since 2002, but are not yet complete. OMB continues to gather data about the number of agency systems, including those that are operated by contractors, and how many have been reviewed using a self-assessment tool. However, the data submitted showed that several agencies' chief information officers and inspectors general disagreed on the number of contractor or agency systems by as many as 100 systems or more. In addition, the data collected by OMB does not address other users with privileged access to federal data or the quality of the self assessments. Finally, NIST has developed guidance, parts of which are relevant to contractor security oversight. However, unified governmentwide guidance for overseeing information security of contractors and other users with privileged access to federal data and systems has not been issued. We are making recommendations to the Director of OMB to ensure that (1) the FAR update efforts complement agency security management efforts required by FISMA; (2) federal agencies develop policies for information security oversight of contractors and other users with privileged access to federal data; and (3) agencies review the security of other users with privileged access to federal data and systems. Additionally, we are making recommendations to the Secretary of Commerce to develop a unified set of guidance to assist agencies in developing appropriate information security policies for managing risks related to contractors and other users with privileged access to federal data and systems. In commenting on a draft of this report, OMB officials provided oral comments that generally agreed with the results of this report. Additionally, the Deputy Secretary of Commerce provided written comments that agreed with our findings and stated that the department is planning to develop a consolidated framework for contractor-related guidelines. Background: The U.S. government is one of the largest users and acquirers of data, information, and supporting technology systems in the world, and plans to invest approximately $65 billion annually on IT. These investments include the acquisition of IT services and systems from thousands of contractors.[Footnote 3] The ability to contract for technology services can allow an agency to obtain or offer enhanced services without the cost of owning the required technology or maintaining the human capital required to deploy and operate it. The systems and services provided by contractors include computer and telecommunication systems and services, as well as the testing, quality control, installation, and operation of computer equipment. Additionally, contractors provide services and systems to agencies by: * providing IT services and systems at agency facilities; * providing IT services and systems on behalf of the agency at contractor facilities; * providing IT services and systems to an agency via remote access; and: * developing or maintaining IT systems or software. In its fiscal year 2001 report to Congress on federal government information security reform, OMB identified poor security oversight of contractor-provided IT systems and services as a common governmentwide challenge. In that report, OMB stated that IT contracts should include adequate security requirements, but that many agencies had reported no security controls in contracts or no verification that contractors fulfill any requirements that are in place. Federal Law and Policy Address Planning and Oversight for Information Security: Information security is an essential component of the acquisition, development, management, and oversight of IT systems and services delivered by contractors. When relying on contractors, a federal agency transfers operational responsibilities for performing one or more IT service(s) to one or more external providers. However, the overall responsibility and accountability for securing the information and systems remains with the federal agency (see fig. 1). Figure 1: Federal Sources for Addressing Information Security Oversight of Contractor-Delivered IT Systems and Services: [See PDF for image] [End of figure] As depicted in figure 1, federal sources for addressing information security oversight of contractor-delivered IT systems and services are as follows: * FAR: emphasizes basic planning for the acquisition process;[Footnote 4] * FISMA: requires an agencywide information security program that extends to contractors and other users with privileged access to federal data and systems;[Footnote 5] and: * NIST standards and guidance and OMB guidance: assist agencies in establishing necessary security programs. The FAR Emphasizes Planning and Includes Certain Information Security Requirements: The FAR emphasizes planning and includes certain specific information security requirements and provides the primary regulation for federal executive agencies in their acquisition of IT supplies and services with appropriated funds. Additionally, in implementing federal privacy requirements, agencies are to ensure that contracts for the design, development, or operation of records systems using commercial IT services or support services include the following: * agency rules of conduct that the contractor and the contractor's employees shall be required to follow; * a list of the anticipated threats and hazards that the contractor must guard against; * a description of the safeguards that the contractor must specifically provide; and: * requirements for a program of government inspection during performance of the contract that will ensure the continued efficacy and efficiency of safeguards and the discovery and countering of new threats and hazards. The FAR requires agencies to ensure that IT contracts address privacy protections in accordance with the Privacy Act.[Footnote 6] FISMA Implementation Extends to Federal Contractors and Others: FISMA requires each agency to develop, document, and implement an agencywide information security program to protect information and information systems, including those provided or managed by another agency, contractor, or accessed by other users with privileged access to federal data. Specifically, this information security program is to include the following: * periodic assessments of the risk and magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information or information systems; * risk-based policies and procedures that cost-effectively reduce information security risks to an acceptable level and ensure that information security is addressed throughout the life cycle of each information system; * subordinate plans for providing adequate information security for networks, facilities, and systems or groups of information systems; * security awareness training for agency personnel, including contractors and other users of information systems that support the operations and assets of the agency; * periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices, performed with a frequency depending on risk, but no less than annually, and that includes testing of management, operational, and technical controls for every system identified in the agency's required inventory of major information systems; * a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of the agency; * procedures for detecting, reporting, and responding to security incidents; and: * plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the agency. Federal agencies' implementation of FISMA requirements extends to contractors that are delivering IT systems and services and to other users of federal data and systems.[Footnote 7] In addition to these requirements, FISMA requires each agency to develop, maintain, and annually update an inventory of major information systems operated by the agency or that are under its control. This inventory is to include an identification of the interfaces between each system and all other systems or networks, including those operated by or under the control of contractors or other users with privileged access to federal data. FISMA also requires each agency to have an annual independent evaluation of its information security program and practices, including control testing and compliance assessment. Evaluations of nonnational security systems are to be performed by the agency inspector general or by an independent external auditor. Furthermore, for nonnational security systems, FISMA requires NIST to develop (1) standards to be used by all agencies to categorize all of their information and information systems based on the objectives of providing appropriate levels of information security according to a range of risk levels; (2) guidelines recommending the types of information and information systems to be included in each category; and (3) minimum information security requirements for information and information systems in each category. NIST Standards and Guidance and OMB Guidance Support FISMA Implementation: NIST standards and guidance and OMB guidance both support agency efforts to implement FISMA. NIST has issued a number of information security standards and guidance that is intended to promote the security of federal IT systems and services, such as its guidance on conducting risk assessments and on the format and content of security plans.[Footnote 8] In addition, as part of its statutory responsibilities under FISMA, NIST has issued standards and guidance that include consideration of security oversight of contractor-provided IT systems and services and other users with privileged access to federal data and systems. In its fiscal year 2004 FISMA reporting guidance,[Footnote 9] OMB required federal agencies to use NIST SP 800-26 or an equivalent assessment tool for agency annual information security reviews.[Footnote 10] The self assessments were also to be used to evaluate the security of contractor-provided IT systems and services. The self assessments provide a method for agency officials to determine the current status of their information security programs and, where necessary, to establish a target for improvement. Federal Agencies Face a Range of Risks from Contractors and Other Users of Federal Data and Systems: Federal agencies face a range of risks from contractors and other users with privileged access to federal data and systems. Contractors that provide systems and services or other users with privileged access to federal data and systems can introduce risks to agency information and systems. Most agencies recognize the contractor-related risks, including those associated with contractor software development and off- site operations. Further, agencies view users with privileged access to federal systems and data as potential sources of risk. Contractors and Other Users of Federal Data and Systems Introduce Risks to Agencies: Contractors and other users with privileged access to federal data and systems can introduce information security risks to federal information and information systems that are sometimes difficult to quantify. Examples of these risks are as follows. Strategic. Two basic strategic risks include management inexperience in overseeing contractor/other organization operations and the potential for inaccurate contractor/other organization information to negatively impact agency decisions. For example, inadequate management experience and expertise can impede an agency's ability to understand and control key risks. Additionally, inaccurate information from a contractor/other organization may prevent the leadership of an organization from having the necessary data to make well-informed strategic decisions. Reputation. Errors, delays, system failures, or unauthorized disclosure of information may negatively impact how citizens, state and local governments, and other federal agencies view an agency and its services or mission. Legal/Compliance. Federal agencies are required to ensure that their information security programs are being applied to systems and services that are being provided by contractors/other organizations and ensure compliance with laws such as privacy protections. Implementation. Initiating a contractor relationship may require a complex transition of people, processes, hardware, software, and other assets from the agency to the provider or from one provider to another, all of which may introduce new risks. Ownership/Dependence. An agency may ignore certain security issues due to "out of sight, out of mind" thinking, having delegated this concern to the provider. An agency may also become dependent on a particular contractor. Operational. In addition to fraud or error, contractor or privileged access information security weaknesses could negatively impact agency operations, including delivering products; managing information; maintaining operations and transaction processing; customer service; systems development and support; and internal control processes. Shared Environment. Contractors may use one system to service multiple clients and, as a result, this system-sharing may pose more risks than an in-house environment. For example, sharing a common network or a processing environment, such as a general purpose server, across multiple clients can increase the likelihood of one organization having access to the sensitive information of another. The risks identified can present complex challenges to federal agencies. Many of the complexities stem from risks related to people, processes, or technologies that, if not properly overseen or managed, can potentially harm an agency's operations, information, or systems. Most Agencies Recognize Contractor-Related Risks to Information: Most agencies (17 of 24) reported that they recognize contractor risks to their information and information systems. These people, process, and technology risks can degrade or diminish the confidentiality, integrity, and availability of agency information systems or data. Examples of agency-identified risks are summarized in table 1. Table 1: Examples of Agency-Identified Risks to Federal Systems and Data Resulting from Reliance on Contractors: Category: People; Risk description: Unauthorized personnel having physical access to agency IT resources (including systems, facilities, and data). Category: People; Risk description: Unauthorized personnel having electronic access to agency IT resources (including systems and data). Category: People; Risk description: Increased use of foreign nationals. Category: People; Risk description: Contractor or privileged users of federal data and systems who may not receive appropriate, periodic background investigations. Category: People; Risk description: Inadequate segregation of duties (e.g., software developer is the same individual who puts the software into production). Category: Processes; Risk description: Failure by contractor or privileged users of federal data and systems to follow agency IT security requirements. Category: Processes; Risk description: Possible disclosure of agency-sensitive information to unauthorized individuals or entities. Category: Processes; Risk description: Lack of effective compliance monitoring of contractors performing work off-site or privileged users of federal data and systems. Category: Processes; Risk description: Contractor or privileged users of federal data and systems may have ineffective patch management processes. Category: Technology; Risk description: Incorporation of unauthorized features in customized application software. For example, a third-party software developer has the potential to incorporate "back doors," spyware, or malicious code into customized application software that could expose agency IT resources to unauthorized loss, damage, modification, or disclosure of data. Category: Technology; Risk description: Encryption technology may not meet federal standards. Category: Technology; Risk description: Intentional or unintentional introduction of viruses and worms. Source: GAO analysis of federal agencies' survey response data. Note: The various risks identified in table 1 could represent multiple risks (i.e. risks in one or more of the identified categories of people, processes and technology). [End of table] In addition to the risks identified in the table, agencies identified specific risks from contractor software development activities and off- site operations. These risks include the following: * a poor patch management process could impact federal operations, such as agency Web sites; * the hosting infrastructure may not separate customer and company data; and: * the need for oversight at an off-site facility. Without proper controls, the risks associated with software development and work performed off site could be very damaging to federal information and systems. For example, loss of confidentiality, integrity, or availability of data can disrupt federal operations and services and may impede the ability to ensure the performance of mission-critical functions. Agencies Assess Users with Privileged Access to Federal Data and Systems as Potential Risks: Many agencies reported their risks from other users with privileged access to federal data and systems. Seventeen agencies indicated that they assess the risks posed by other users with privileged access to federal data and systems. Agency-identified risks included: * lack of controls on network connections; * unauthorized use or release of information, such as grantee information being revealed to another grantee; * malicious activity that introduces viruses and worms; and: * poor electronic access controls that could permit customer passwords to be compromised and exploited by identity theft. Of the remaining 7 agencies, 5 indicated that other users do not possess or use their data and systems; 1 indicated that it had not assessed risks of other users with privileged access; and the other agency did not respond regarding whether they had assessed risks of other users with privileged access to federal data and systems. Agencies Use Various Methods for Overseeing Contractor Security: Federal agencies report using three primary methods for overseeing the information security of contractors: * using contract language to establish information security requirements for contractors; * having information security policies for contractors and other users with privileged access to federal data; and: * using NIST self-assessment tools to assess contractor security capabilities and assess the security implemented by other users with privileged access to federal data. These methods can be leveraged for effective agency oversight of contractors and privileged users for federal systems and data. However when not properly implemented, each of these methods has limitations. Agencies Use Contract Language to Establish Information Security Requirements: Most agencies report using contract language to establish information security requirements for contractors. The FAR requires that agencies use specific contract language related to privacy or security safeguards. Table 2 contains an example of FAR-provided language for agencies to include in their IT contracts. Table 2: The FAR Privacy or Security Safeguards Contract Language: (a) The Contractor shall not publish or disclose in any manner, without the Contracting Officer's written consent, the details of any safeguards either designed or developed by the Contractor under this contract or otherwise provided by the Government. (b) To the extent required to carry out a program of inspection to safeguard against threats and hazards to the security, integrity, and confidentiality of Government data, the Contractor shall afford the Government access to the Contractor's facilities, installations, technical capabilities, operations, documentation, records, and databases. (c) If new or unanticipated threats or hazards are discovered by either the Government or the Contractor, or if existing safeguards have ceased to function, the discoverer shall immediately bring the situation to the attention of the other party. Source: Federal Acquisition Regulation 52.239-1. [End of table] This FAR language helps ensure that federal agencies can maintain access to contractor facilities in order to perform security oversight functions. However, this language does not address all aspects of security. For example, the clause in table 2 does not apply to subcontractors. By not including subcontractors within specific information security requirements, agencies can be introducing significant risks without a contractual tool with which to manage them. More importantly, the FAR has not been amended to reflect the requirements of the FISMA. As a result, the language in the FAR does not reflect key FISMA requirements, including: * periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices performed with a frequency depending on risk, but not less than annually, and including testing of management, operational, and technical controls for every system identified in the agency's required inventory of major information systems; * a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of the agency; * procedures for detecting, reporting, and responding to security incidents; and: * plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the agency. The FAR provides, however, that this contract language only needs to be "substantially the same" as standard FAR clauses and agencies, therefore, have the flexibility to modify it to address FISMA requirements. Additionally, agencies are authorized to include in their agency FAR supplements, regulations, and clauses that supplement FAR policies and procedures or satisfy specific needs of the agency.[Footnote 11] Agency FAR supplements, accordingly, could include additional language to address the requirements of FISMA. However, although some agency FAR supplements include requirements related to IT security that are not in the FAR, no agency has made a comprehensive effort to revise its FAR supplement to reflect FISMA. The 2003 NIST SP 800-35[Footnote 12] stresses the importance of establishing security requirements with external parties in formal contracts. However, by not establishing clear security requirements in contracts, agencies may not be able to ensure that their agency information is secured in accordance with FISMA. Most Agencies Have Information Security Policies for Contractors, but Few Policies Provide for Oversight Capabilities: Although most agencies reported having written policies that addressed information security for contractor-provided IT services and systems and for other users with privileged access to federal data and systems, few established specific policies for overseeing the information security practices of contractors to ensure compliance with contract requirements and agency information security policies. As figure 2 illustrates, 22 of the surveyed agencies reported having information security policies for contractors, and 15 reported having policies for other users with privileged access to federal data and systems. However, the majority of agencies addressed contractors and other users with privileged access to federal information and systems within the general scope of their agency policy, and did not define information security oversight requirements. For example, agency policies did not describe oversight methods; the frequency of reviews or assessments; key management controls to mitigate unauthorized disclosure of information; physical/logical access controls; or the introduction of unauthorized features. Further, most of the agencies did not have policies or provide guidance on key areas, including control of agency data in an off-site facility or requirements for interconnection security agreements.[Footnote 13] Figure 2: Major Agencies with Security Policies for Contractors, Privileged Users of Federal Data and Systems, and Contractor Security Oversight: [See PDF for image] [End of figure] However, we identified only 5 agencies that had established specific policies addressing contractor information security oversight. While the five agency policies reflected a broad range of maturity levels, they included many of the following elements: * establishing procedures for contractor information security oversight; * assigning roles and responsibilities; * creating specific audit plans for systems and facilities; * describing interconnection security agreements; * creating requirements for agency information that will be secured at contractor facilities--including storing, processing, and transmitting on contractor systems, background checks, and facility security; and: * requiring agency officials to conduct reviews to ensure that IT security requirements were being enforced. By establishing oversight policies that address these elements, agencies can more consistently oversee contractor security and ensure that contractors and other users with privileged access to federal systems and data comply with agency security requirements. However, without such policies, oversight efforts can be impeded. In fiscal years 2003 and 2004, many agency inspectors general cited the lack of agency policies and guidance regarding how agency program managers or organizational components should conduct oversight of contractor operations as problematic. Three different agency inspectors general reported the following: * Agency policies and procedures did not provide organizational components with guidance on conducting reviews of their contractor- provided services. Further, there was little evidence that components are ensuring that contractor-provided services are secure and comply with agency security policy. * Agency program officials had not ensured that (1) adequate security of contractor-provided services, including not identifying the full range of services provided and that (2) oversight processes and procedures for ensuring secure operations had not been defined or implemented. * Agency officials were not using adequate methods to ensure that contractor security met the requirements of FISMA, OMB, and NIST guidelines after reviewing the access controls, security clearances, and security awareness training for contractors that provide network administration, systems development, and systems administration. Without appropriate policies and guidance, agencies may not be able to effectively and efficiently assess the security of contractor operations or that of other users with privileged access to federal data and systems. For example, without specific oversight policies establishing when and how agencies will review contractor-operated systems, officials responsible for the systems may not be taking sufficient action to ensure that security requirements are being met. Further, information system controls needed to ensure secure operations may not be tested on regular intervals. As a result, agencies may not be able to protect federal information in accordance with FISMA. Agencies Use Self-Assessment Tool to Review Contractor Security, but Its Oversight Value May Be Limited: The majority of agencies reported using a self-assessment tool to review contractor information security, but the oversight value may be limited. NIST's self-assessment guide states that self-assessments provide a method for agency officials to determine the current status of their information security programs and, where necessary, to establish a target for improvement. NIST SP 800-26 structures the questionnaire by management, operational, and technical controls. The section on technical controls does not require testing of those controls as part of the self-assessment, but instead relies on documentation. In response to our survey, 22 agencies reported using NIST SP 800-26 to assess contractors providing IT services and systems and 2 agencies reported not using this assessment tool. While most agencies reported using NIST SP 800-26, the self-assessment tool may have limited value in overseeing contractor information security. For example, by relying on a contractor's self assessment, an agency official may not obtain a clear understanding of the effectiveness of security controls or be assured of the validity of the responses without independent testing. Further, the agency chief information officer or inspector general may have trouble conducting an analysis or review of the self assessment if there is not sufficient documentation. As an example of the self-assessment challenges, one agency inspector general found significant problems with the agency's self assessment. The inspector general noted that, after reviewing a sample of the agency's NIST SP 800-26 self assessments, (1) security weaknesses had not been properly defined, (2) variations existed between inspector general and agency scoring on the NIST SP 800-26 reviews, and (3) the agency did not verify the results of self assessments. Further, the lack of information security requirements established in contracts and the absence of agency oversight policies may diminish the efforts of reviewers using NIST SP 800-26 because they may not be able to refer to clear criteria with which to assess systems' security. As a result, agencies may not obtain an accurate status of the security of contractor-provided systems and services. Many Agencies Do Not Review Other Users with Privileged Access to Federal Data and Systems: In August 2004, OMB mandated the use of NIST SP 800-26 for agency annual system reviews. However, in response to our survey, only 10 agencies reported using NIST SP 800-26 to assess other users with privileged access to federal data and systems that have connectivity to agency networks. By not assessing and testing the security controls of other users with privileged access to federal data, agencies reported that they are at increased risk of losing control of network connections, experiencing unauthorized use of information, such as grantee information being revealed to another grantee, and malicious activity that introduces viruses and worms. Administration Efforts to Improve Information Security of Contractors Continue, but Challenges Remain: The administration is making efforts to improve information security over contractors, but challenges remain. For example, the information security requirements in FAR are being revised and OMB continues to gather data from the agencies about the number of contractor facilities reviewed by agencies. Additionally, NIST has issued guidance, parts of which address some contractor security issues. Federal Acquisition Regulation Is Being Updated to Modernize IT Requirements: In response to the administration's plans to update FAR, officials at the FAR Council stated that the acquisition regulation was being updated to address information security requirements of contractor- provided systems and services. Officials further explained that the administration had been working on updating the FAR language since 2002 when FISMA was enacted. According to the FAR Council officials, the council had completed the majority of its work in December 2004. As of March 2005, the FAR amendments were undergoing legal review. OMB Collects Data on Agency Information Security Oversight of Contractors, but Effectiveness of Agency Efforts Is Unclear: Through its FISMA reporting requirements, OMB continues to gather information about agency oversight of contractors, but understanding the effectiveness of agency efforts based on the collected data is unclear. On an annual basis, OMB collects information from the agencies about: * the total number of agency systems, including whether the chief information officer and the inspectors general agree on the number of systems identified and: * the number of contractor facilities and operations identified and reviewed using NIST SP 800-26 or an equivalent methodology. The fiscal year 2004 FISMA submissions revealed significant discrepancies in the responses from the agency and the inspector general. For example, as shown in table 3, the number of systems reported as being agency systems or contractor systems varied significantly among the chief information officers and the inspectors general at four agencies. Without a clear understanding of who has operational control of a system, agencies cannot ensure that the appropriate oversight and security controls are being implemented in accordance with agency policy. Table 3: Number of Contractor Facilities and Operations Reported in Fiscal Year 2004: Agency: Agency A; Agency/chief information officers total: 61; Inspectors general total: 13. Agency: Agency B; Agency/chief information officers total: 11; Inspectors general total: 65. Agency: Agency C; Agency/chief information officers total: 4; Inspectors general total: 111. Agency: Agency D; Agency/chief information officers total: 20; Inspectors general total: 5. Source: Fiscal year 2004 agency chief information officer and inspectors general FISMA submissions to OMB. [End of table] Over the past 3 years, there has been a decline in both the number of contractor facilities identified by the agencies and the number of facilities reviewed by the agencies. Figure 3 depicts this trend in 23 of the major agencies. Figure 3: Total Contractor Facilities and Number of Facilities Reviewed for 23 Federal Agencies in Fiscal Years 2002-2004: [See PDF for image] Note: The Department of Defense (DOD) contractor facilities and number of facilities reviewed are not reflected in the figure because this information was not available for 2002. However, in 2003, the DOD reported identifying 4,716 contractor facilities and reviewing 4,000 facilities, while in 2004, the department inventoried 4,686 and reviewed 3,961 facilities. [End of figure] The disagreement between agency chief information officers and inspectors general about whether systems are deemed to be agency systems or contractor systems can impede effective and efficient information security oversight efforts. In some cases, it may even result in systems not being reviewed. By not performing reviews of contractor-operated facilities, agencies cannot ensure that their information is being protected in accordance with FISMA and, as a result, federal operations and data can be at risk. The data gathered from the agencies on the number of contractor systems identified and reviewed do not provide an accurate measure of the effectiveness of agency information security oversight of contractors. However, additional data about the contracts, policies, and self assessments could provide a better measure of effectiveness. For example, asking inspectors general to determine: * what portion of the contractor systems identified by the agencies have specific IT security language that addresses key FISMA elements; * if the agency information security policies provide specific oversight policies for contractors and privileged users of federal systems and data; and: * whether the required NIST SP 800-26 assessments of contractor systems were completed by the agency, the contractor, or an independent entity. Finally, annual agency reports required by FISMA do not address security related to other users with privileged access to federal data. There is not a clear governmentwide understanding of how agencies are addressing the various challenges and identified risks related to other users with privileged access. As previously discussed, agencies have not developed policies or reviewed the controls necessary to ensure that these users of federal data do not place agencies' information and systems at risk of compromise. As a result, federal agencies that lack appropriate controls and oversight can be exposing their information and systems to additional risks from privileged users who might introduce malicious code, disclose unauthorized information, or lack controls to secure their network interfaces with the agency systems. Unified Federal Guidance Could Assist Agencies: No single federal guide exists for federal agencies to rely on when addressing information security over contractors. FISMA requirements apply to all federal contractors and organizations or sources that possess or use federal information or that operate, use, or have access to federal information systems on behalf of an agency. In support of FISMA implementation, NIST has issued a number of information security products intended to improve federal IT systems. However, in the absence of a single, comprehensive guide to assist in the development of policies, agencies must refer to portions of several different documents that address elements related to contractor information security oversight. For example, in 2005, NIST published Recommended Security Controls for Federal Information Systems,[Footnote 14] which refers to portions of the following documents that can be used by agencies to address some of the challenges related to information security oversight of contractors: * SP 800-18 states that agencies may require compliance with the guide as part of contract requirements; * SP 800-35 lists in its appendices sample acquisition language that is appropriate for inclusion into IT security service statements of work; * SP 800-47 discusses, in brief, the development of non-disclosure agreements for contractors when determining interconnection requirements; and: * 800-64 gives examples of contract clauses that can be used to help establish clear lines of authority and responsibility. In February 2005, NIST released the Federal Information Processing Standard 201 entitled Personal Identity Verification of Federal Employees and Contractors. This standard was developed in response to Homeland Security Presidential Directive 12 and is intended to improve the identification and authentication of federal employees and contractors for access to federal facilities and information systems. This standard helps to address the risk of contractors gaining unauthorized physical or electronic access to federal information. Unified guidance on addressing the information security oversight of contractors and privileged users of federal systems and data could assist agencies in developing effective programs to ensure compliance with agency policy. However, without clear guidance on how to develop effective information security oversight of contractors and users with privileged access to federal systems and data, federal agencies may not develop sufficient policies to address the range of risks posed by contractors and key users. As a result, federal information and operations can be placed at undue risk. Conclusions: Contractors provide valuable services that contribute to the efficient functioning of the government, but a range of risks from contractors and other users with privileged access to federal data and systems must be managed effectively. Contracts, policies, and security self- assessments can be leveraged as valuable oversight tools for federal agencies in managing oversight of contractors and other users. However, when not properly implemented, each of these methods has limitations. For example, many agencies are not incorporating FISMA requirements into their contract language; accordingly, their strongest tool for establishing information security requirements is limited. Additionally, many agencies have not defined specific oversight policies for contractors and other users with privileged access to federal data. Without clearly defined information security oversight policies, agencies may be accepting significant risk to their information and systems from both contractors and other users with privileged access without having the appropriate controls to mitigate the risks. Finally, agency reliance on self-assessment tools may not provide them with the appropriate tools to ensure the security of their information. To address these complex challenges, a variety of administration efforts have been started to further enhance federal agencies' efforts to improve information security oversight of contractors, but challenges remain. For example, the effort to update FAR guidance has not been completed. In addition, continuing OMB FISMA oversight reveals challenges in contractor oversight. Finally, if agencies lack unified guidance to assist them in creating appropriate information security oversight policies for contractors and other users with privileged access to federal data and systems, federal agencies may not be able to effectively protect their information. Recommendations for Executive Action: To ensure that agencies are developing the appropriate information security oversight capabilities for contractors and other users with privileged access to federal data and systems, we recommend, in accordance with FISMA, that the Director of OMB ensure that the following two actions take place. * Efforts to update FAR are completed expeditiously and that such efforts require agency security management efforts required by FISMA, including: * periodic testing and evaluation of management, operational, and technical controls; * a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies and procedures; * procedures for detecting, reporting, and responding to security incidents; and: * plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the agency. * Federal agencies develop policies for ensuring information security of contractors and other users with privileged access to federal data, including: * establishing procedures for contractor information security oversight; * assigning roles and responsibilities; * creating specific audit plans for systems and facilities; * describing interconnection security agreements; * creating requirements for agency information that will be secured at contractor facilities including storing, processing, transmitting on contractor systems, background checks, and facility security; and: * requiring agency officials to conduct reviews to ensure that IT security requirements are being enforced. To assist agencies in managing the risks related to contractors and other users with privileged access to federal data and systems, we recommend that the Secretary of Commerce develop a unified set of guidance for developing appropriate information security policies. Agency Comments on Our Evaluation: We provided a draft of this report to OMB and the Department of Commerce for their official review and comment. OMB General Counsel provided oral comments on the report, which have been incorporated as appropriate. OMB generally agreed with the report findings and conclusions. OMB officials told us that, as part of the capital asset plan and business case development process, agencies are required to answer several information security oversight questions related to contractor-provided IT systems and services. These questions provide OMB important information when assessing the business case for funding. Further, OMB stated that their efforts to enhance oversight of contractors includes requiring that the 25 E-Government initiatives be independently reviewed to determine compliance with IT security requirements. OMB did not disagree with the overall recommendations and recognized the need for further agency action to address contractor security oversight. In written comments, which are reprinted in appendix II, the Deputy Secretary of the Department of Commerce acknowledged the accuracy of the report. In regard to our recommendation, Commerce stated that NIST recognizes the importance of providing guidance to assist agencies in ensuring that security requirements are applied by contractors. Additionally, NIST has developed publications that can be used for contractors and are focused on acquisition, assessments, controls, and the system development life cycle. Commerce agreed that through NIST, it would develop a strategy to build a framework for a consolidated delivery of contractor related-guidelines. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to interested congressional committees; the Director, Office of Management and Budget; and the Secretary, Department of Commerce. We will also make copies available to others upon request. In addition, the report will be available at no charge on the GAO Web site at [Hyperlink, http://www.gao.gov]. If you or any of your staff have any questions concerning this report, please contact me at (202) 512-3317. I can also be reached by e-mail at [Hyperlink, wilshuseng@gao.gov]. Other contacts and key contributors to this report are listed in appendix III. Signed by: Gregory C. Wilshusen: Director, Information Security Issues: [End of section] Appendixes: Appendix I: Objectives, Scope, and Methodology: The objectives of our review were to: * Describe the information security risks associated with the federal government's reliance on contractors providing information technology systems and services and other users with privileged access to federal data and systems federal information or access federal information systems. * Identify methods used by federal agencies to ensure security of information and information systems that are operated, used, or accessed by contractors and other users with privileged access to federal data. * Discuss what steps the administration is taking to ensure implementation and oversight of security of information and information systems that are operated, used, or accessed by contractors and other users with privileged access to federal data. To describe the information security risks associated with the federal government's reliance on contractors and other organizations, we analyzed existing federal regulations, laws, and guidelines such as the Federal Acquisition Regulation (FAR); Federal Information Security Management Act of 2002 (FISMA); and National Institute of Standards and Technology (NIST) guidance. In addition, we interviewed federal and private-sector officials regarding the policies and procedures for overseeing contractor security. We then developed a series of questions that were incorporated into a Web-based survey instrument. We pretested our survey instrument at one federal department and one federal independent agency. We also met with Office of Management and Budget (OMB) officials to discuss OMB's role in ensuring the security of contractor-provided systems and services. For each agency to be surveyed, we identified the office of the chief information officer, notified each office of our work, and, via e-mail, distributed a link to each office. All 24 agencies responded to our survey. We did not verify the accuracy of the agencies' responses; however, we reviewed supporting documentation that agencies provided to validate their responses. We contacted agency officials when necessary for follow-up. Although this was not a sample survey and, therefore, there were no sampling errors, conducting any survey may introduce errors, commonly referred to as nonsampling errors. For example, difficulties in how a particular question is interpreted, in the sources of information that are available to respondents, or in how the data are entered into a database or were analyzed can introduce unwanted variability into the survey results. We took steps in the development of the survey instrument, the data collection, and the data analysis to minimize these nonsampling errors. For example, a survey specialist designed the survey instrument in collaboration with GAO staff with subject-matter expertise. Then, as previously stated, it was pretested to ensure that the questions were relevant, clearly stated, and easy to comprehend. When the data were analyzed, a second, independent analyst checked all computer programs. Because this was a Web-based survey, respondents entered their answers directly into the electronic questionnaire. This eliminated the need to have the data keyed into a database, thus removing an additional potential source of error. To identify methods used by federal agencies to ensure security of contractor-provided systems and services, we interviewed the FAR Council, OMB, and NIST officials to discuss their guidelines and other tools available to agencies. In addition, questions regarding agency policy, agency use of oversight guidelines, acquisition process, and personnel/background checks, security requirements, and contract language were included in the survey we sent to the 24 Chief Financial Officer's Act agencies. We did not verify the accuracy of the agencies' responses; however, we reviewed supporting documentation that agencies provided to validate their responses. We contacted agency officials when necessary for follow-up. Finally, to determine what steps the administration is taking to ensure implementation and oversight of security of contractors and other users with privileged access that operate, use, or access federal information systems on behalf of an agency, we interviewed FAR Council, OMB, and NIST officials regarding the policies and procedures for overseeing contractor security. We also reviewed annual chief information officer and inspectors general FISMA reports to assess progress made in meeting FISMA requirements related to contractor security. We conducted our work in Washington, D.C., from August 2004 through March 2005 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Comments from the Department of Commerce: THE DEPUTY SECRETARY OF COMMERCE: Washington, D.C. 20230: April 19, 2005: Mr. Gregory Wilshusen: Director, Information Security Issues: United States Government Accountability Office: Washington, DC 20548: Dear Mr. Wilshusen: I enclose the Department of Commerce's comments on Government Accountability Office (GAO) proposed report entitled Information Security: Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk (GAO-05-362). Thank you for the opportunity to review the report. I commend the GAO for this study on the issue of improving information security oversight of contractors. We recognize the need to develop cohesive government-wide guidance to assist agencies in developing appropriate information security policies for addressing contractors and other users with privileged access to federal data and systems. The National Institute of Standards and Technology (KIST) has developed a set of publications for acquisition, self-assessment, and controls that should be applied in developing information systems. In addition, NIST has recently developed a road map which maps NIST publications to the various phases of the system development life cycle. In support of the GAO proposed recommendation, NIST will extend its efforts to develop a strategy to build the necessary framework for a more consolidated delivery of the contractor related guidelines. Again, thank you for the opportunity to comment on this draft report. Sincerely, Signed by: Theodore W. Kassinger: Enclosure: Comments on Government Accountability Office (GAO) Report entitled "Information Security: Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk" made by the National Institute of Standards and Technology (KIST), Department of Commerce: The GAO team should be commended for the study. The report provides a thorough assessment of the information security risks associated with the Federal Government's reliance on contractor-provided IT systems and services and other users with privileged access to federal data and systems. Furthermore, it identifies current methods employed by federal agencies to avoid these risks, and provides recommendations to improve information security oversight for contractors. NIST has reviewed the report and has noted no major errors or omissions. The report identified one major recommendation --that the Secretary of Commerce develop a unified set of guidance for developing appropriate information security guidance related to contracting. NIST recognizes the importance of providing guidance to assist agencies in ensuring that the appropriate security requirements are applied to contractors. We had previously developed a three-volume set of special publications (SP) specifically focused on acquisition (SP800-64, SP800- 35, and SP800-36). In addition, SP 800-26, the NIST self-assessment tool, can be used for contractor assessments. Most recently, NIST published SP800-53 which defines in great detail the controls that should be applied in developing information systems. This document can be used to derive security requirements for systems being developed by contractors. (http://csrc.nist.gov/publications/nistpubs/index.html) Further, recognizing the need to provide one consolidated road map to the numerous NIST publications, which can be applied throughout the system development life cycle (SDLC), we recently published a reference which maps all of the NIST guidance to the various phases of the SDLC. It can be used by contractors to identify the appropriate references based on scope and focus of specific contract tasking. (http://csrc.nist.gov/SDLCinfosec/SDLC_brochure_Aug04.pdf) The above strategy has allowed NIST to develop information security publications in focused areas with the sufficient detail required to be useful. To support the GAO proposed recommendation, NIST will extend its efforts to develop a strategy to build the necessary framework for a more consolidated delivery of the contractor-related guidelines. [End of section] Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: J. Paul Nicholas, Assistant Director, (202) 512-4457, [Hyperlink, nicholasj@gao.gov]. Staff Acknowledgments: In addition to the individual named above, key contributors to this report included Neil Doherty, Nancy Glover, Stuart Kaufman, Anjalique Lawrence, Nnaemeka Okonkwo, and Kevin Secrest. (310544): FOOTNOTES [1] These 24 CFO departments and agencies are the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, Interior, Justice, Labor, State, Transportation, Treasury, Veterans Affairs, Environmental Protection Agency; General Services Administration; National Aeronautics and Space Administration; National Science Foundation; Nuclear Regulatory Commission; Office of Personnel Management; Small Business Administration; Social Security Administration; and U.S. Agency for International Development. [2] A virus is a program that "infects" computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to infect other files. A virus requires human involvement (usually unwittingly) to propagate. A worm is an independent computer program that reproduces by copying itself from one system to another across a network. Unlike computer viruses, worms do not require human involvement to propagate. [3] Contractors are generally considered to be the primary entity with which a department or agency enters into an agreement. In this report, we use the term "contactor" when referring to both contractors and subcontractors. We refer to other organizations that possess or use federal information or have access to federal information systems--such as grantees, state and local governments, and research and educational institutions--as other users with privileged access to federal data and systems. [4] 48 C.F.R. Chapter 1. [5] Federal Information Security Management Act of 2002, Title III, E- Government Act of 2002, Pub. L. No. 107-347 (Dec. 17, 2002). [6] Privacy Act of 1974, Pub. L. No. 93-579, 5 U.S.C. 552a; FAR Subpart 24.1, 48 C.F.R. Subpart 24.1. [7] In 2003, the Medicare Prescription Drug, Improvement, and Modernization Act (Pub. L. No. 108-173) was enacted. Section 912 of the act includes a provision requiring Medicare administrative contractors to implement a contractorwide information security program to provide information security for the operation and assets of the contractor for Medicare functions. Additionally, the information security program is required to meet certain requirements for information security programs already imposed on agencies and their data contractors by FISMA. Medicare administrative contractors are also required to undergo an annual independent testing and evaluation of their information security programs. [8] NIST, Risk Management Guide for Information Technology Systems, Special Publication 800-30 (Gaithersburg, Md.: July 2002) and Guide for Developing Security Plans for Information Technology Systems, Special Publication 800-18 (Gaithersburg, Md.: December 1998). [9] OMB, Fiscal Year 2004 Reporting Instructions for the Federal Information Security Management Act, M-04-25(Washington, D.C.: Aug. 23, 2004). [10] NIST, Security Self-Assessment Guide for Information Technology Systems, NIST Special Publication 800-26 (Gaithersburg, Md.: November 2001). [11] FAR Subpart 1.3; 48 C.F.R. Subpart 1.3. [12] NIST, Guide to Information Technology Services, Special Publication 800-35 (Gaithersburg, Md.: October 2003). [13] An interconnection security agreement documents specific technical and security requirements for connecting IT systems from different organizations, such as between a federal agency and a contractor or between a federal agency and other users with privileged access to federal data and systems. [14] NIST, Recommended Security Controls for Federal Information Systems, Special Publication 800-53 (Gaithersburg, Md.: February 2005). GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.