Information Security
Despite Reported Progress, Federal Agencies Need to Address Persistent Weaknesses
Gao ID: GAO-07-837 July 27, 2007
For many years, GAO has reported that weaknesses in information security are a widespread problem with potentially devastating consequences--such as intrusions by malicious users, compromised networks, and the theft of personally identifiable information--and has identified information security as a governmentwide high-risk issue. Concerned by reports of significant vulnerabilities in federal computer systems, Congress passed the Federal Information Security Management Act of 2002 (FISMA), which permanently authorized and strengthened the information security program, evaluation, and reporting requirements for federal agencies. As required by FISMA to report periodically to Congress, in this report GAO discusses the adequacy and effectiveness of agencies' information security policies and practices and agencies' implementation of FISMA requirements. To address these objectives, GAO analyzed agency, inspectors general (IG), Office of Management and Budget (OMB), congressional, and GAO reports on information security.
Significant weaknesses in information security policies and practices threaten the confidentiality, integrity, and availability of critical information and information systems used to support the operations, assets, and personnel of most federal agencies. Recently reported incidents at federal agencies have placed sensitive data at risk, including the theft, loss, or improper disclosure of personally identifiable information on millions of Americans, thereby exposing them to loss of privacy and identity theft. Almost all of the major federal agencies had weaknesses in one or more areas of information security controls. Most agencies did not implement controls to sufficiently prevent, limit, or detect access to computer resources. In addition, agencies did not always manage the configuration of network devices to prevent unauthorized access and ensure system integrity, such as patching key servers and workstations in a timely manner; assign incompatible duties to different individuals or groups so that one individual does not control all aspects of a process or transaction; or maintain or test continuity of operations plans for key information systems. An underlying cause for these weaknesses is that agencies have not fully implemented their information security programs. As a result, agencies may not have assurance that controls are in place and operating as intended to protect their information resources, thereby leaving them vulnerable to attack or compromise. Nevertheless, federal agencies have continued to report steady progress in implementing certain information security requirements. For fiscal year 2006, agencies generally reported performing various control activities for an increasing percentage of their systems and personnel. However, IGs at several agencies disagreed with the information the agency reported and identified weaknesses in the processes used to implement these activities. Further, although OMB enhanced its reporting instructions to agencies for preparing fiscal year 2006 FISMA reports, the metrics specified in the instructions do not measure how effectively agencies are performing various activities, and there are no requirements to report on a key activity. As a result, reporting may not adequately reflect the status of agency implementation of required information security policies and procedures.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-07-837, Information Security: Despite Reported Progress, Federal Agencies Need to Address Persistent Weaknesses
This is the accessible text file for GAO report number GAO-07-837
entitled 'Information Security: Despite Reported Progress, Federal
Agencies Need to Address Persistent Weaknesses' which was released on
July 27, 2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Committees:
United States Government Accountability Office:
GAO:
July 2007:
Information Security:
Despite Reported Progress, Federal Agencies Need to Address Persistent
Weaknesses:
GAO-07-837:
GAO Highlights:
Highlights of GAO-07-837, a report to congressional committees
Why GAO Did This Study:
For many years, GAO has reported that weaknesses in information
security are a widespread problem with potentially devastating
consequences”such as intrusions by malicious users, compromised
networks, and the theft of personally identifiable information”and has
identified information security as a governmentwide high-risk issue.
Concerned by reports of significant vulnerabilities in federal computer
systems, Congress passed the Federal Information Security Management
Act of 2002 (FISMA), which permanently authorized and strengthened the
information security program, evaluation, and reporting requirements
for federal agencies.
As required by FISMA to report periodically to Congress, in this report
GAO discusses the adequacy and effectiveness of agencies‘ information
security policies and practices and agencies‘ implementation of FISMA
requirements. To address these objectives, GAO analyzed agency,
inspectors general (IG), Office of Management and Budget (OMB),
congressional, and GAO reports on information security.
What GAO Found:
Significant weaknesses in information security policies and practices
threaten the confidentiality, integrity, and availability of critical
information and information systems used to support the operations,
assets, and personnel of most federal agencies. Recently reported
incidents at federal agencies have placed sensitive data at risk,
including the theft, loss, or improper disclosure of personally
identifiable information on millions of Americans, thereby exposing
them to loss of privacy and identity theft. Almost all of the major
federal agencies had weaknesses in one or more areas of information
security controls (see figure). Most agencies did not implement
controls to sufficiently prevent, limit, or detect access to computer
resources. In addition, agencies did not always manage the
configuration of network devices to prevent unauthorized access and
ensure system integrity, such as patching key servers and workstations
in a timely manner; assign incompatible duties to different individuals
or groups so that one individual does not control all aspects of a
process or transaction; or maintain or test continuity of operations
plans for key information systems. An underlying cause for these
weaknesses is that agencies have not fully implemented their
information security programs. As a result, agencies may not have
assurance that controls are in place and operating as intended to
protect their information resources, thereby leaving them vulnerable to
attack or compromise.
Nevertheless, federal agencies have continued to report steady progress
in implementing certain information security requirements. For fiscal
year 2006, agencies generally reported performing various control
activities for an increasing percentage of their systems and personnel.
However, IGs at several agencies disagreed with the information the
agency reported and identified weaknesses in the processes used to
implement these activities. Further, although OMB enhanced its
reporting instructions to agencies for preparing fiscal year 2006 FISMA
reports, the metrics specified in the instructions do not measure how
effectively agencies are performing various activities, and there are
no requirements to report on a key activity. As a result, reporting may
not adequately reflect the status of agency implementation of required
information security policies and procedures.
Figure: Information Security Weaknesses at Major Federal Agencies for
Fiscal Year 2006:
[See PDF for Image]
Source: GAO analysis of IG, agency, and GAO reports.
[End of figure]
What GAO Recommends:
GAO is recommending that OMB strengthen FISMA reporting metrics. OMB
agreed to take GAO‘s recommendations under advisement when modifying
its FISMA reporting instructions.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-837].
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Gregory C. Wilshusen at
(202) 512-6244 or wilshuseng@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
Persistent Weaknesses Place Sensitive Data at Significant Risk:
Agencies Report Progress, but More Work Is Needed in Implementing
Requirements:
Conclusions:
Recommendations for Executive Action:
Agency Comments:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Comments from the Office of Management and Budget:
Appendix III: GAO Contact and Staff Acknowledgments:
Related GAO Products:
Figures:
Figure 1: Division of FISMA Responsibilities:
Figure 2: Agencies Reporting of Information Security Controls in Fiscal
Year 2006 Financial Statement Audits:
Figure 3: Information Security Weaknesses at 24 Major Agencies for
Fiscal Year 2006:
Figure 4: Control Weaknesses Identified in GAO Reports From July 2005
to June 2007:
Figure 5: Reported Data for Selected Performance Metrics for 24 Major
Agencies:
Figure 6: Percentage of Employees Receiving Security Awareness Training
As Reported by Agencies and IGs:
Figure 7: OIG Assessment of C&A Process for Fiscal Year 2006:
Figure 8: Incidents Reported to US-CERT in Fiscal Years 2005 and 2006:
Abbreviations:
BPD: Bureau of the Public Debt:
CIO: chief information officer:
DHS: Department of Homeland Security:
FAA: Federal Aviation Administration:
FISMA: Federal Information Security Management Act:
FBI: Federal Bureau of Investigation:
FRB: Federal Reserve Bank:
HHS: Department of Health and Human Services:
IG: inspector(s) general:
IRS: Internal Revenue Service:
IT: information technology:
NIST: National Institute of Standards and Technology:
OMB: Office of Management and Budget:
TSA: Transportation Security Administration:
US-CERT: United States Computer Emergency Readiness Team:
USDA: United States Department of Agriculture:
VA: Department of Veterans Affairs:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
July 27, 2007:
The Honorable Joseph I. Lieberman:
Chairman:
The Honorable Susan M. Collins:
Ranking Member:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable Henry A. Waxman:
Chairman:
The Honorable Tom Davis:
Ranking Member:
Committee on Oversight and Government Reform:
House of Representatives:
Federal agencies rely extensively on computerized information systems
and electronic data to carry out their missions. The security of these
systems and data is essential to prevent data tampering, disruptions in
critical operations, fraud, and the inappropriate disclosure of
sensitive information. In reports to Congress since 1997, we have
designated information security as a governmentwide high-risk issue--a
designation that remains in force today.[Footnote 1]
Concerned with accounts of attacks on systems through the Internet and
reports of significant weaknesses in federal computer systems that make
them vulnerable to attack, Congress passed the Federal Information
Security Management Act (FISMA) in 2002.[Footnote 2] To address
information security weaknesses, FISMA sets forth a comprehensive
framework for ensuring the effectiveness of information security
controls over information resources that support federal operations and
assets. In addition, it provides a mechanism for improved oversight of
federal agency information security programs. This mechanism includes
mandated annual reporting by the agencies, the Office of Management and
Budget (OMB), and the National Institute of Standards and Technology
(NIST). FISMA also includes a requirement for independent annual
evaluations by the agencies' inspectors general (IG) or independent
external auditors.
In accordance with the FISMA requirement that we report periodically to
Congress, our objectives were to evaluate (1) the adequacy and
effectiveness of agencies' information security policies and practices
and (2) their implementation of FISMA requirements. To address these
objectives, we analyzed agency, IG, OMB, congressional, and our reports
on information security. We conducted our evaluation from October 2006
through May 2007 in accordance with generally accepted government
auditing standards. Our objectives, scope, and methodology, are further
explained in appendix I.
Results in Brief:
Significant weaknesses in information security policies and practices
threaten the confidentiality, integrity, and availability of critical
information and information systems used to support the operations,
assets, and personnel of most federal agencies. Recently reported
information security incidents at federal agencies have placed
sensitive data at risk, including the theft, loss, or improper
disclosure of personally identifiable information on millions of
Americans, thereby exposing them to loss of privacy and potential harm
associated with identity theft. Almost all of the 24 major federal
agencies[Footnote 3] had weaknesses in one or more areas of information
security controls. Most agencies did not implement controls to
sufficiently prevent, limit, or detect access to computer networks,
systems, or information. For example, agencies did not consistently (1)
identify and authenticate users to prevent unauthorized access; (2)
enforce the principle of least privilege to ensure that authorized
access was necessary and appropriate; (3) establish sufficient boundary
protection mechanisms; (4) apply encryption to protect sensitive data
on networks and portable devices; (5) log, audit, and monitor security-
relevant events; and (6) restrict physical access to information
assets. In addition, agencies did not always configure network devices
and services to prevent unauthorized access and ensure system
integrity, such as patching key servers and workstations in a timely
manner; assign incompatible duties to different individuals or groups
so that one individual does not control all aspects of a process or
transaction; and maintain or test continuity of operations plans for
key information systems. An underlying cause for these weaknesses is
that agencies have not fully or effectively implemented agencywide
information security programs. As a result, agencies may not have
assurance that controls are in place and operating as intended to
protect their information and information systems, thereby leaving them
vulnerable to attack or compromise.
Nevertheless, federal agencies have continued to report steady progress
in implementing certain information security requirements. For fiscal
year 2006, agencies generally reported performing various required
control activities for an increasing percentage of their systems and
personnel. However, agency IGs at several agencies sometimes disagreed
with the information the agency reported and identified weaknesses in
the processes used to implement these activities. Pursuant to its FISMA
responsibilities, NIST has issued federal standards and guidance on
information security. Agency IGs have performed their annual
independent evaluations of agencies' information security programs
although the scope and methodologies of their evaluations varied across
the agencies. Further, although OMB enhanced its reporting instructions
to agencies for preparing their FISMA reports, the metrics specified in
the instructions do not measure how effectively agencies are performing
key activities, and there are no requirements to report on patch
management--another key activity. As a result, reporting may not
adequately reflect the status of agency implementation of required
information security policies and procedures.
In prior reports, we have made hundreds of recommendations to agencies
to address specific information security weaknesses. We are making
recommendations to the Director of OMB to update its reporting
instructions and to request that IGs evaluate certain FISMA
implementation efforts. In commenting on a draft of this report, OMB
agreed to take our recommendations under advisement when modifying its
FISMA reporting instructions. OMB also noted that its current
instructions provide the flexibility for IGs to tailor evaluations
based on agency's documented weaknesses and plans for improvement.
Background:
Federal agencies increasingly rely on computerized information systems
and electronic data to conduct operations and carry out their missions.
Protecting federal computer systems has never been more important due
to advances in the sophistication and effectiveness of attack
technology and methods, the rapid growth of zero-day exploits[Footnote
4] and attacks, and the increasing number of security incidents
occurring at organizations and federal agencies.
Information security is especially important for federal agencies,
which increasingly use information systems to deliver services to the
public and to ensure the confidentiality, integrity, and availability
of information and information systems. Without proper safeguards,
there is risk of data theft, compromise, or loss by individuals and
groups due to negligence or malicious intent within or outside of the
organization.
To fully understand the potential significance of information security
weaknesses, it is necessary to link them to the risks they present to
federal operations and assets. Virtually all federal operations are
supported by automated systems and electronic data, and agencies would
find it difficult, if not impossible, to carry out their missions and
account for their resources without these information assets. The
weaknesses place a broad array of federal operations and assets at
risk. For example,
² Resources, such as federal payments and collections, could be lost or
stolen.
² Computer resources could be used for unauthorized purposes or to
launch attacks on other computer systems.
² Sensitive information, such as taxpayer data, social security
records, medical records, and proprietary business information could be
inappropriately disclosed, browsed, or copied for purposes of
industrial espionage or other types of crime.
² Critical operations, such as those supporting national defense and
emergency services, could be disrupted.
² Data could be modified or destroyed for purposes of fraud, identity
theft, or disruption.
² Agency missions could be undermined by embarrassing incidents that
result in diminished confidence in the ability of federal organizations
to conduct operations and fulfill their responsibilities.
Recognizing the importance of securing federal systems and data,
Congress passed FISMA in 2002, which set forth a comprehensive
framework for ensuring the effectiveness of information security
controls over information resources that support federal operations and
assets. FISMA's framework creates a cycle of risk management activities
necessary for an effective security program, and these activities are
similar to the principles noted in our study of the risk management
activities of leading private sector organizations[Footnote 5]--
assessing risk, establishing a central management focal point,
implementing appropriate policies and procedures, promoting awareness,
and monitoring and evaluating policy and control effectiveness. In
order to ensure the implementation of this framework, the act assigns
specific responsibilities to agency heads, chief information officers
(CIO), IGs, and NIST (depicted in fig. 1). It also assigns
responsibilities to OMB, which include developing and overseeing the
implementation of policies, principles, standards, and guidelines on
information security and reviewing agency information security
programs, at least annually, and approving or disapproving them.
Figure 1: Division of FISMA Responsibilities:
[See PDF for image]
Source: GAO analysis of FISMA and implementing guidance.
[End of figure]
Agency Responsibilities:
FISMA requires each agency, including agencies with national security
systems, to develop, document, and implement an agencywide information
security program to provide security for the information and
information systems that support the operations and assets of the
agency, including those provided or managed by another agency,
contractor, or other source.
Specifically, it requires information security programs that, among
other things, include:
² periodic assessments of the risk and magnitude of harm that could
result from the unauthorized access, use, disclosure, disruption,
modification, or destruction of information or information systems;
² risk-based policies and procedures that cost effectively reduce
information security risks to an acceptable level and ensure that
information security is addressed throughout the life cycle of each
information system;
² subordinate plans, for providing adequate information security for
networks, facilities, and systems or groups of information systems, as
appropriate;
² security awareness training for agency personnel, including
contractors and other users of information systems that support the
operations and assets of the agency;
² periodic testing and evaluation of the effectiveness of information
security policies, procedures, and practices, performed with a
frequency depending on risk, but no less than annually, and that
includes testing of management, operational, and technical controls for
every system identified in the agency's required inventory of major
information systems;
² a process for planning, implementing, evaluating, and documenting
remedial action to address any deficiencies in the information security
policies, procedures, and practices of the agency;
² procedures for detecting, reporting, and responding to security
incidents; and:
² plans and procedures to ensure continuity of operations for
information systems that support the operations and assets of the
agency.
In addition, agencies must produce an annually updated inventory of
major information systems (including major national security systems)
operated by the agency or under its control, which includes an
identification of the interfaces between each system and all other
systems or networks, including those not operated by or under the
control of the agency.
FISMA also requires each agency to report annually to OMB, selected
congressional committees, and the Comptroller General on the adequacy
of its information security policies, procedures, practices, and
compliance with requirements. In addition, agency heads are required to
report annually the results of their independent evaluations to OMB,
except to the extent that an evaluation pertains to a national security
system; then only a summary and assessment of that portion of the
evaluation needs to be reported to OMB.
Responsibilities of the IG:
Under FISMA, the IG for each agency must perform an independent annual
evaluation of the agency's information security program and practices.
The evaluation should include testing of the effectiveness of
information security policies, procedures, and practices of a
representative subset of agency systems. In addition, the evaluation
must include an assessment of the compliance with the act and any
related information security policies, procedures, standards, and
guidelines. For agencies without an IG, evaluations of nonnational
security systems must be performed by an independent external auditor.
Evaluations related to national security systems are to be performed by
an entity designated by the agency head.
Responsibilities of NIST:
Under FISMA, NIST is tasked with developing, for systems other than
national security systems, standards and guidelines that must include,
at a minimum (1) standards to be used by all agencies to categorize all
their information and information systems based on the objectives of
providing appropriate levels of information security, according to a
range of risk levels; (2) guidelines recommending the types of
information and information systems to be included in each category;
and (3) minimum information security requirements for information and
information systems in each category. NIST must also develop a
definition of and guidelines for detection and handling of information
security incidents as well as guidelines, developed in conjunction with
the Department of Defense and the National Security Agency, for
identifying an information system as a national security system.
The law also assigns other information security functions to NIST,
including:
² providing technical assistance to agencies on such elements as
compliance with the standards and guidelines and the detection and
handling of information security incidents;
² evaluating private-sector information security policies and practices
and commercially available information technologies to assess potential
application by agencies;
² evaluating security policies and practices developed for national
security systems to assess their potential application by agencies;
and:
² conducting research, as needed, to determine the nature and extent of
information security vulnerabilities and techniques for providing cost-
effective information security.
NIST is also required to prepare an annual public report on activities
undertaken in the previous year and planned for the coming year.
FISMA states that the Director of OMB shall oversee agency information
security policies and practices, including:
* developing and overseeing the implementation of policies, principles,
standards, and guidelines on information security;
* requiring agencies to identify and provide information security
protections commensurate with risk and magnitude of the harm resulting
from the unauthorized access, use, disclosure, disruption,
modification, or destruction of information collected or maintained by
or on behalf of an agency, or information systems used or operated by
an agency, or by a contractor of an agency, or other organization on
behalf of an agency;
* coordinating information security policies and procedures with
related information resource management policies and procedures;
* overseeing agency compliance with FISMA to enforce accountability;
and:
* reviewing at least annually, and approving or disapproving, agency
information security programs. In addition, the act requires that OMB
report to Congress no later than March 1 of each year on agency
compliance with FISMA.
Persistent Weaknesses Place Sensitive Data at Significant Risk:
Significant control weaknesses in information security policies and
practices threaten the confidentiality, integrity, and availability of
critical information and information systems used to support the
operations, assets, and personnel of most federal agencies. These
persistent weaknesses expose sensitive data to significant risk, as
illustrated by recent reported incidents at various agencies. Further,
our work and reviews by IGs note significant information security
control deficiencies that place a broad array of federal operations and
assets at risk.
Responsibilities of OMB:
Incidents Place Sensitive Information at Risk:
Since January 2006, federal agencies have reported a spate of security
incidents that have put sensitive data at risk, including the theft,
loss, or improper disclosure of personally identifiable information on
millions of Americans, thereby exposing them to loss of privacy and
potential harm associated with identity theft. Agencies have
experienced a wide range of incidents involving data loss or theft,
computer intrusions, and privacy breaches, underscoring the need for
improved security practices. The following reported examples illustrate
that a broad array of federal information and assets are at risk.
² The Department of Veterans Affairs (VA) announced that computer
equipment containing personally identifiable information on
approximately 26.5 million veterans and active duty members of the
military was stolen from the home of a VA employee. Until the equipment
was recovered, veterans did not know whether their information was
likely to be misused. In June, VA sent notices to the affected
individuals that explained the breach and offered advice on steps to
take to reduce the risk of identity theft. The equipment was eventually
recovered, and forensic analysts concluded that it was unlikely that
the personal information contained therein was compromised.
² A Centers for Medicare and Medicaid Services contractor reported the
theft of a contractor employee's laptop computer from his office. The
computer contained personal information including names, telephone
numbers, medical record numbers, and dates of birth of 49,572 Medicare
beneficiaries.
² The Department of Agriculture (USDA) was notified that it had posted
personal information on a Web site. Analysis by USDA later determined
that the posting had affected approximately 38,700 individuals, who had
been awarded funds through the Farm Service Agency or USDA Rural
Development program. That same day, all identification numbers
associated with USDA funding were removed from the Web site. USDA is
continuing its effort to identify and contact all persons who may have
been affected.
² A contractor for USDA's Farm Services Agency inadvertently released
informational compact discs that contained Social Security numbers and
tax identification data on approximately 350,000 tobacco producers/
contract holders under the agency's Tobacco Transition Payment Program.
² The Transportation Security Administration (TSA) announced a data
security incident involving approximately 100,000 archived employment
records of individuals employed by the agency from January 2002 until
August 2005. An external hard drive containing personnel data, such as
Social Security number, date of birth, payroll information, and bank
account and routing information, was discovered missing from a
controlled area at the TSA Headquarters Office of Human Capital.
² The Census Bureau reported 672 missing laptops, of which 246
contained some degree of personal data. Of the missing laptops
containing personal information, almost half (104) were stolen, often
from employees' vehicles, and another 113 were not returned by former
employees. Commerce reported that employees were not held accountable
for not returning their laptops, but the department did not report on
the disposition of the remaining 29.
² Officials at the Department of Commerce's Bureau of Industry and
Security discovered a security breach in July 2006. In investigating
this incident, officials were able to review firewall logs for an 8-
month period prior to the initial detection of the incident, but they
were unable to clearly define the amount of time that perpetrators were
inside the department's computers, or find any evidence to show that
data was lost as a result.
² The Department of Defense (Navy) Marine Corps reported the loss of a
thumb drive containing personally identifiable information--names,
Social Security numbers, and other information--of 207,570 enlisted
Marines serving on active duty from 2001 through 2005. The information
was being used for a research project on retention of service
personnel. Navy officials considered the risk from the breach to be
greatly diminished since the thumb drive was lost on a government
installation and the drive's data were readable only through software
that was password protected and considered in limited distribution.
² The Treasury Inspector General For Tax Administration reported that
approximately 490 computers at the Internal Revenue Service (IRS) were
lost or stolen between January 2003, and June 2006. Additionally, 111
incidents occurred within IRS facilities, suggesting that employees
were not storing their laptop computers in a secured area while they
were away from the office. The IG concluded that it was very likely
that a large number of the lost or stolen computers contained
unencrypted data and also found other computer devices, such as flash
drives, CDs, and DVDs, on which sensitive data were not always
encrypted.
² The Department of State experienced a security breach on its
unclassified network, which daily processes about 750,000 e-mails and
instant messages from more than 40,000 employees and contractors at 100
domestic and 260 overseas locations. The breach involved an e-mail
containing what was thought to be an innocuous attachment. However, the
e-mail contained code to exploit vulnerabilities in a well-known
application for which no security patch existed at that time. Because
the vendor was unable to expedite testing and deploy a new patch, the
department developed its own temporary fix to protect systems from
being exploited further. In addition, the department sanitized the
infected computers and servers, rebuilt them, changed passwords,
installed critical patches, and updated their antivirus software.
Based on the experience of VA and other federal agencies in responding
to data breaches, we identified numerous lessons learned regarding how
and when to notify government officials, affected individuals, and the
public.[Footnote 6] As discussed later in this report, OMB has issued
guidance that largely addresses these lessons.
Weaknesses Persist at Federal Agencies in Implementing Security
Policies and Practices:
As illustrated by recent security incidents, significant weaknesses
continue to threaten the confidentiality, integrity, and availability
of critical information and information systems used to support the
operations, assets, and personnel of federal agencies. In their fiscal
year 2006 financial statement audit reports, 21 of 24 major agencies
indicated that deficient information security controls were either a
reportable condition[Footnote 7] or a material weakness (see fig.
2).[Footnote 8] Our audits continue to identify similar weaknesses in
nonfinancial systems. Similarly, in their annual reporting under 31
U.S.C. § 3512 (commonly referred to as the Federal Managers' Financial
Integrity Act of 1982),[Footnote 9] 17 of 24 agencies reported
shortcomings in information security, including 7 that considered it a
material weakness. IGs have also noted the seriousness of information
security, with 21 of 24 including it as a "major management
challenge."[Footnote 10]
Figure 2: Agencies Reporting of Information Security Controls in Fiscal
Year 2006 Financial Statement Audits:
[See PDF for image]
Source: GAO analysis of agency financial statement audits.
[End of figure]
According to our reports and those of IGs, persistent weaknesses appear
in the five major categories of information system controls: (1) access
controls, which ensure that only authorized individuals can read,
alter, or delete data; (2) configuration management controls, which
provide assurance that only authorized software programs are
implemented; (3) segregation of duties, which reduces the risk that one
individual can independently perform inappropriate actions without
detection; (4) continuity of operations planning, which provides for
the prevention of significant disruptions of computer-dependent
operations; and (5) an agencywide information security program, which
provides the framework for ensuring that risks are understood and that
effective controls are selected and properly implemented. Most agencies
continue to have weaknesses in each of these categories, as shown in
figure 3.
Figure 3: Information Security Weaknesses at 24 Major Agencies for
Fiscal Year 2006:
[See PDF for image]
Source: GAO analysis of IG, agency, and prior GAO reports.
[End of figure]
In our prior reports,[Footnote 11] we have made hundreds of specific
recommendations to the agencies to mitigate the weaknesses identified.
Similarly, the IGs have issued specific recommendations as part of
their information security review work.
Access Controls Were Not Adequate:
A basic management control objective for any organization is to protect
data supporting its critical operations from unauthorized access, which
could lead to improper modification, disclosure, or deletion of the
data. Organizations accomplish this task by designing and implementing
controls that are intended to prevent, limit, and detect access to
computing resources (computers, networks, programs, and data), thereby
protecting these resources from unauthorized use, modification, loss,
and disclosure. Access controls can be both electronic and physical.
Electronic access controls include those related to user identification
and authentication, authorization, boundary protection, cryptography,
and audit and monitoring. Physical security controls are important for
protecting computer facilities and resources from espionage, sabotage,
damage, and theft. These controls involve restricting physical access
to computer resources, usually by limiting access to the buildings and
rooms in which they are housed and enforcing usage restrictions and
implementation guidance for portable and mobile devices.
Twenty-two major agencies had access control weaknesses. Analysis of
our recent reports have identified that the majority of information
security control weaknesses pertained to access controls (see fig. 4).
For example, agencies did not consistently (1) identify and
authenticate users to prevent unauthorized access; (2) enforce the
principle of least privilege to ensure that authorized access was
necessary and appropriate; (3) establish sufficient boundary protection
mechanisms; (4) apply encryption to protect sensitive data on networks
and portable devices; and (5) log, audit, and monitor security-relevant
events. Agencies also lacked effective controls to restrict physical
access to information assets.
Figure 4: Control Weaknesses Identified in GAO Reports From July 2005
to June 2007:
[See PDF for image]
Source: GAO analysis of prior GAO reports.
[End of figure]
User Identification and Authentication:
A computer system must be able to identify and authenticate different
users so that activities on the system can be linked to specific
individuals. When an organization assigns unique user accounts to
specific users, the system is able to distinguish one user from
another--a process called identification. The system also must
establish the validity of a user's claimed identity by requesting some
kind of information, such as a password, that is known only by the
user--a process known as authentication.
Several agencies have not adequately controlled user accounts and
passwords to ensure that only authorized individuals are granted access
to its systems and data. For example, several agencies did not always
implement strong passwords--using vendor-default or easy-to-guess
passwords, or having the minimum password length set to zero. One
agency's staff shared logon accounts and passwords when accessing a
database production server for the procurement system. By allowing
users to share accounts and passwords, individual accountability for
authorized system activity as well as unauthorized system activity
could be lost. Consequently, users could create short passwords, which
tend to be easier to guess or crack than longer passwords. Without
appropriate controls over identification and authentication, agencies
are at increased risk of unauthorized access.
Authorization:
Authorization is the process of granting or denying access rights and
permissions to a protected resource, such as a network, a system, an
application, a function, or a file. A key component of granting or
denying access rights is the concept of "least privilege." Least
privilege is a basic principle for securing computer resources and
information. This principle means that users are granted only those
access rights and permissions that they need to perform their official
duties. To restrict legitimate users' access to only those programs and
files that they need to do their work, organizations establish access
rights and permissions. "User rights" are allowable actions that can be
assigned to users or to groups of users. File and directory permissions
are rules that regulate which users can access a particular file or
directory and the extent of that access. To avoid unintentionally
authorizing users access to sensitive files and directories, an
organization must give careful consideration to its assignment of
rights and permissions.
Several agencies continued to imprudently grant rights and permissions
that allowed more access than users needed to perform their jobs. For
example, one agency had granted users of a database system the access
rights to create or change sensitive system files--even though they did
not have a legitimate business need for this access. Further, the
permissions for sensitive system files also inappropriately allowed all
users to read, update, or execute them. These types of excessive
privileges provide opportunities for individuals to circumvent security
controls. In another instance, each user on one organization's network
was permitted to have access to sensitive Privacy Act-protected
information including names, addresses, and Social Security numbers of
individuals. Once a Social Security number is obtained fraudulently, it
can then be used to create a false identity for financial misuse,
assume another individual's identity, or to fraudulently obtain credit.
As a result, there is increased risk that sensitive data and personally
identifiable information may be compromised.
Boundary Protection:
Boundary protection pertains to the protection of a logical or physical
boundary around a set of information resources and implementing
measures to prevent unauthorized information exchange across the
boundary in either direction. Organizations physically allocate
publicly accessible information system components to separate
subnetworks with separate physical network interfaces, and they prevent
public access into their internal networks. Unnecessary connectivity to
an organization's network increases not only the number of access paths
that must be managed and the complexity of the task, but the risk of
unauthorized access in a shared environment.
Several agencies continue to demonstrate vulnerabilities in
establishing required boundary protection mechanisms. For example, one
agency did not configure a remote access application properly, which
permitted simultaneous access to the Internet and the internal network.
This could allow an attacker who compromised a remote user's computer
to remotely control the user's secure session from the Internet.
Another agency failed to ensure that its contractor adequately
implemented controls used to protect its external and key internal
boundaries. Specifically, certain network devices did not adequately
restrict external communication traffic. As a result, an unauthorized
individual could exploit these vulnerabilities to launch attacks
against other sensitive network devices.
Cryptography:
Cryptography[Footnote 12] underlies many of the mechanisms used to
enforce the confidentiality and integrity of critical and sensitive
information. A basic element of cryptography is encryption. Encryption
can be used to provide basic data confidentiality and integrity, by
transforming plain text into cipher text using a special value known as
a key and a mathematical process known as an algorithm. The National
Security Agency also recommends disabling protocols that do not encrypt
information transmitted across the network, such as user identification
and password combinations.
Many agencies did not encrypt certain information traversing its
networks, but instead used clear text protocols that make network
traffic susceptible to eavesdropping. For example, at one agency's
field site, all information, including user identification and password
information, was being sent across the network in clear text. At
another agency, the contractor did not consistently apply encryption to
protect network configuration data stored on network devices. These
weaknesses could allow an attacker, or malicious user, to view
information and use that knowledge to obtain sensitive financial and
system data being transmitted over the network.
Audit and Monitoring:
To establish individual accountability, monitor compliance with
security policies, and investigate security violations, it is crucial
to determine what, when, and by whom specific actions have been taken
on a system. Organizations accomplish this by implementing system or
security software that provides an audit trail, or logs of system
activity, that they can use to determine the source of a transaction or
attempted transaction and to monitor users' activities. The way in
which organizations configure system or security software determines
the nature and extent of information that can be provided by the audit
trail. To be effective, organizations should configure their software
to collect and maintain audit trails that are sufficient to track
security-relevant events.
Agencies did not sufficiently log and monitor key security-and audit-
related events. For instance, agencies did not prepare key security
reports such as failed login attempt reports. In other cases, logging
either was disabled or configured to overwrite, or procedures for
classifying and investigating security-related events had not been
documented. As a result, unauthorized access could go undetected, and
the ability to trace or recreate events in the event of a system
modification or disruption could be diminished.
Physical Security:
Physical security controls are important for protecting computer
facilities and resources from espionage, sabotage, damage, and theft.
These controls restrict physical access to computer resources, usually
by limiting access to the buildings and rooms in which the resources
are housed and by periodically reviewing the access granted, in order
to ensure that access continues to be appropriate. Examples of physical
security controls include perimeter fencing, surveillance cameras,
security guards, and locks.
Several agencies also lacked effective physical security controls.
Consequently, critical information held by the federal government, such
as Social Security numbers or other personal data, can be at acute risk
of unnecessary or unauthorized access by individuals intent on
perpetrating identity theft and committing financial crimes. For
example, one agency granted over 400 individuals unrestricted access to
an entire data center--including a sensitive area within the data
center--although their job functions did not require them to have such
access. In another case, one agency did not adequately protect the
entrances to its facilities, as visitor screening procedures were
inconsistently implemented and available tools were not being used
properly or to their fullest capability. Many of the data losses that
occurred at federal agencies over the past few years, discussed earlier
in this report, were a result of physical thefts or improper
safeguarding of systems, including laptops and other portable devices.
Configuration Management Controls Were Not Implemented:
Configuration management controls ensure that only authorized and fully
tested software is placed in operation. These controls, which also
limit and monitor access to powerful programs and sensitive files
associated with computer operations, are important in providing
reasonable assurance that access controls are not compromised and that
the system will not be impaired. These policies, procedures, and
techniques help ensure that all programs and program modifications are
properly authorized, tested, and approved. Further, patch management is
an important element in mitigating the risks associated with software
vulnerabilities. Up-to-date patch installation could help mitigate
vulnerabilities associated with flaws in software code that could be
exploited to cause significant damage--including the loss of control of
entire systems--thereby enabling malicious individuals to read, modify,
or delete sensitive information or disrupt operations.
At least 20 major agencies demonstrated weaknesses in configuration
management controls. For example, many agencies did not consistently
configure network devices and services to prevent unauthorized access
and ensure system integrity, such as installing critical software
patches in a timely manner. As a result, systems and devices were not
updated and were left susceptible to denial-of-service attacks or to
malicious users exploiting software vulnerabilities. In light of the
recent surge in zero-day exploits, it is imperative for agencies to be
prepared for the challenge of testing and deploying patches under a
very compressed time frame. Additionally, certain agencies did not
implement effective controls to ensure that system software changes
were properly authorized, documented, tested, and monitored. Instances
also existed where agencies did not maintain current documentation of
major modifications to systems or significant changes in processing.
Inadequate configuration management controls increases the risk that
unauthorized programs or changes could be inadvertently or deliberately
placed into operation.
Segregation of Duties Was Not Appropriately Enforced:
Segregation of duties refers to the policies, procedures, and
organizational structure that helps ensure that one individual cannot
independently control all key aspects of a process or computer-related
operation and, thereby, conduct unauthorized actions or gain
unauthorized access to assets or records. Proper segregation of duties
is achieved by dividing responsibilities among two or more individuals
or organizational groups. Dividing duties among individuals or groups
diminishes the likelihood that errors and wrongful acts will go
undetected because the activities of one individual or group will serve
as a check on the activities of the other.
At least 13 agencies did not appropriately segregate information
technology duties. These agencies generally did not assign employee
duties and responsibilities in a manner that segregated incompatible
functions among individuals or groups of individuals. For instance, at
one agency, users were allowed to both initiate and authorize the same
transaction. At another agency, financial management staff members were
permitted to perform both security and systems administration duties
for the application, potentially allowing these staff members to
conduct fraudulent activity without being detected. Without adequate
segregation of duties, there is an increased risk that erroneous or
fraudulent actions can occur, improper program changes implemented, and
computer resources damaged or destroyed.
Shortcomings Exist in Continuity of Operations Planning:
An organization must take steps to ensure that it is adequately
prepared to cope with the loss of operational capabilities due to an
act of nature, fire, accident, sabotage, or any other disruption. An
essential element in preparing for such catastrophes is an up-to-date,
detailed, and fully tested continuity of operations plan. Such a plan
should cover all key computer operations and should include planning
for business continuity. This plan is essential for helping to ensure
that critical information systems, operations, and data such as
financial processing and related records can be properly restored if a
disaster occurs. To ensure that the plan is complete and fully
understood by all key staff, it should be tested--including surprise
tests--and test plans and results documented to provide a basis for
improvement. If continuity of operations controls are inadequate, even
relatively minor interruptions can result in lost or incorrectly
processed data, which can cause financial losses, expensive recovery
efforts, and inaccurate or incomplete mission-critical information.
Although agencies have reported advances in the number of systems for
which contingency plans have been tested, at least 21 agencies still
demonstrated shortcomings in their continuity of operations planning.
For example, one agency did not have a plan that reflected its current
operating environment. Another agency had 17 individual disaster
recovery plans covering various segments of the organization, but it
did not have an overall document that integrated the 17 separate plans
and defined the roles and responsibilities for the disaster recovery
teams. In another example, the agency had not established an alternate
processing site for a key application, or tested the plan. Until
agencies complete actions to address these weaknesses, they are at risk
of not being able to appropriately recover in a timely manner from
certain service disruptions.
Agencywide Security Programs Were Not Fully Implemented:
An underlying cause for information security weaknesses identified at
federal agencies is that they have not yet fully or effectively
implemented agencywide information security programs. An agencywide
security program, required by FISMA, provides a framework and
continuing cycle of activity for assessing and managing risk,
developing and implementing security policies and procedures, promoting
security awareness and training, monitoring the adequacy of the
entity's computer-related controls through security tests and
evaluations, and implementing remedial actions as appropriate. Without
a well-designed program, security controls may be inadequate;
responsibilities may be unclear, misunderstood, and improperly
implemented; and controls may be inconsistently applied. Such
conditions may lead to insufficient protection of sensitive or critical
resources.
At least 18 of the 24 major federal agencies had not fully or
effectively implemented agencywide information security programs.
Results of our recent work illustrate that agencies often did not
adequately design or effectively implement policies for elements key to
an information security program. We identified weaknesses in
information security program activities, such as agencies' risk
assessments, information security policies and procedures, security
planning, security training, system tests and evaluations, and remedial
action plans.
Risk Assessments:
Identifying and assessing information security risks are essential to
determining what controls are required. Moreover, by increasing
awareness of risks, these assessments can generate support for the
adopted policies and controls in order to help ensure their intended
operation.
Our evaluations at agencies show that they have not fully implemented
risk assessment processes. Furthermore, they did not always effectively
evaluate potential risks for the systems we reviewed. For example, one
agency had no documented process for conducting risk assessments, while
another agency had outdated risk assessments. In another agency, we
determined that they had assessed the risk levels for their systems,
categorized them on the basis of risk, and had current risk assessments
that documented residual risk assessed and potential threats, and
recommended corrective actions for reducing or eliminating the
vulnerabilities they identified. However, that agency did not identify
many of the vulnerabilities we found and had not subsequently assessed
the risks associated with them. As a result of these weaknesses,
inadequate or inappropriate security controls may be implemented that
do not address the systems' true risk, and potential risks to these
systems may remain unknown.
Policies and Procedures:
Although agencies have developed and documented information security
policies, standards, and guidelines for information security, they did
not always provide specific guidance on how to guard against
significant security weaknesses. For example, policies lacked guidance
on how to correctly configure certain identifications used by operating
systems and the powerful programs used to control processing. We also
found weaknesses in policies regarding physical access, Privacy Act-
protected data, wireless configurations, and business impact analyses.
As a result, agencies have reduced assurance that their systems and the
information they contain are sufficiently protected.
Security Plans:
Instances exist where security plans were incomplete or not up-to-date.
For example, one agency had systems security plans that were missing
required information, such as rules of behavior and controls for public
access. At that same agency, one security plan did not identify its
system owner. In another instance, requirements for applications were
not integrated into the security plan for the general support system,
and the interconnectivity of the current system environment was not
completely addressed. As a result, agencies' cannot ensure that
appropriate controls are in place to protect key systems and critical
information.
Specialized Training:
People are one of the weakest links in attempts to secure systems and
networks. Therefore, an important component of an information security
program is providing required training so that users understand system
security risks and their own role in implementing related policies and
controls to mitigate those risks. However, we identified instances
where agencies did not ensure all information security employees and
contractors, including those who have significant information security
responsibilities, received sufficient training.
System Tests and Evaluations:
Agencies' policies and procedures for performing periodic testing and
evaluation of information security controls were not always adequate.
Our report[Footnote 13] on testing and evaluating security controls
revealed that agencies had not adequately designed and effectively
implemented policies for testing their security controls in accordance
with OMB and NIST guidance. Agencies did not have policies that
addressed how to determine the depth and breadth of testing according
to risk. Further, agencies did not always address other important
elements, such as the definition of roles and responsibilities of
personnel performing tests, identification and testing of security
controls common to multiple systems, and the frequency of periodic
testing. In other cases, agencies had not tested controls for all of
their systems. Without appropriate tests and evaluations, agencies have
limited assurance that policies and controls are appropriate and
working as intended. Additionally, increased risk exists that
undetected vulnerabilities could be exploited to allow unauthorized
access to sensitive information.
Remedial Action Processes and Plans:
Our work uncovered weaknesses in agencies' remediation processes and
plans used to document remedial actions. For example, our
report[Footnote 14] on security controls testing revealed that seven
agencies did not have policies to describe a process for incorporating
weaknesses identified during periodic security control testing into
remedial actions. In our other reviews, agencies indicated that they
had corrected or mitigated weaknesses; however, we found that those
weaknesses still existed. In addition, we reviewed agencies' system
self-assessments and identified weaknesses not documented in their
remedial action plans. These weaknesses pertained to system audit
trails, approval and distribution of continuity of operations plans,
and documenting emergency procedures. We also found that some
deficiencies had not been corrected in a timely manner. Without a
mature process and effective remediation plans, risk increases that
vulnerabilities in agencies' systems will not be mitigated in an
effective and timely manner.
Until agencies effectively and fully implement agencywide information
security programs, federal data and systems will not be adequately
safeguarded to prevent disruption, unauthorized use, disclosure, and
modification. Further, until agencies implement our recommendations to
correct specific information security control weaknesses, they remain
at increased risk of attack or compromise.
Examples Illustrate Weaknesses at Agencies:
Persistent weaknesses are evident in numerous reports. Recent reports
by GAO and IGs show that while agencies have made some progress,
persistent weaknesses continue to place critical federal operations and
assets at risk. In our reports, we have made hundreds of
recommendations to agencies to correct specific information security
weaknesses. The following examples illustrate the effect of these
weaknesses at various agencies and for critical systems.
² Independent external auditors identified over 130 information
technology control weaknesses affecting the Department of Homeland
Security's (DHS) financial systems during the audit of the department's
fiscal year 2006 financial statements. Weaknesses existed in all key
general controls and application controls. For example, systems were
not certified and accredited in accordance with departmental policy;
policies and procedures for incident response were inadequate;
background investigations were not properly conducted; and security
awareness training did not always comply with departmental
requirements. Additionally, users had weak passwords on key servers
that process and house DHS financial data, and workstations, servers,
and network devices were configured without necessary security patches.
Further, changes to sensitive operating system settings were not always
documented; individuals were able to perform incompatible duties such
as changing, testing, and implementing software; and service continuity
plans were not consistently or adequately tested. As a result, material
errors in DHS' financial data may not be detected in a timely manner.
² The Department of Health and Human Services (HHS) had not
consistently implemented effective electronic access controls designed
to prevent, limit, and detect unauthorized access to sensitive
financial and medical information at its operating divisions and
contractor-owned facilities.[Footnote 15] Numerous electronic access
control vulnerabilities related to network management, user accounts
and passwords, user rights and file permissions, and auditing and
monitoring of security-related events existed in its computer networks
and systems. In addition, weaknesses existed in controls designed to
physically secure computer resources, conduct suitable background
investigations, segregate duties appropriately, and prevent
unauthorized changes to application software. These weaknesses increase
the risk that unauthorized individuals can gain access to HHS
information systems and inadvertently or deliberately disclose, modify,
or destroy the sensitive medical and financial data that the department
relies on to deliver its services.
² The Securities and Exchange Commission had made important progress
addressing previously reported information security control
weaknesses.[Footnote 16] However, we identified 15 new information
security weaknesses pertaining to the access controls and configuration
management existed in addition to 13 previously identified weaknesses
that remain unresolved. For example, the Securities and Exchange
Commission did not have current documentation on the privileges granted
to users of a major application, did not securely configure certain
system settings, or did not consistently install all patches to its
systems. In addition, the commission did not sufficiently test and
evaluate the effectiveness of controls for a major system as required
by its certification and accreditation process.
² IRS had made limited progress toward correcting previously reported
information security weaknesses at two data processing sites.[Footnote
17] IRS had not consistently implemented effective access controls to
prevent, limit, or detect unauthorized access to computing resources
from within its internal network. Those access controls included those
related to user identification and authentication, authorization,
cryptography, audit and monitoring, and physical security. In addition,
IRS faces risks to its financial and sensitive taxpayer information due
to weaknesses in configuration management, segregation of duties, media
destruction and disposal, and personnel security controls.
² The Federal Aviation Administration (FAA) had significant weaknesses
in controls that are designed to prevent, limit, and detect access to
those systems.[Footnote 18] For example, for the systems reviewed, the
agency was not adequately managing its networks, system patches, user
accounts and passwords, or user privileges, and it was not always
logging and auditing security-relevant events. In addition, FAA faces
risks to its air traffic control systems due to weaknesses in physical
security, background investigations, segregation of duties, and
application change controls. As a result, it was at increased risk of
unauthorized system access, possibly disrupting aviation operations.
While acknowledging these weaknesses, agency officials stated that
because portions of their systems are custom built and use older
equipment with special-purpose operating systems, proprietary
communication interfaces, and custom-built software, the possibilities
for unauthorized access are limited. Nevertheless, the proprietary
features of these systems do not protect them from attack by
disgruntled current or former employees, who understand these features,
or from more sophisticated hackers.
² The Federal Reserve Board (FRB) had not effectively implemented
information system controls to protect sensitive data and computing
resources for the distributed-based systems and the supporting network
environment relevant to Treasury auctions.[Footnote 19] Specifically,
the FRB did not consistently (1) identify and authenticate users to
prevent unauthorized access; (2) enforce the principle of least
privilege to ensure that authorized access was necessary and
appropriate; (3) implement adequate boundary protections to limit
connectivity to systems that process Bureau of the Public Debt (BPD)
business; (4) apply strong encryption technologies to protect sensitive
data in storage and on its networks; (5) log, audit, or monitor
security-related events; and (6) maintain secure configurations on
servers and workstations. As a result, auction information and
computing resources for key distributed-based auction systems that the
FRB maintain and operate on behalf of BPD are at an increased risk of
unauthorized and possibly undetected use, modification, destruction,
and disclosure. Furthermore, other FRB applications that share common
network resources with the distributed-based systems may face similar
risks.
² Although the Centers for Medicare and Medicaid Services had many
information security controls in place that had been designed to
safeguard the communication network, key information security controls
were either missing or had not always been effectively
implemented.[Footnote 20] For example, the network had control
weaknesses in areas such as user identification and authentication,
user authorization, system boundary protection, cryptography, and audit
and monitoring of security-related events. Taken collectively, these
weaknesses place financial and personally identifiable medical
information transmitted on the network at increased risk of
unauthorized disclosure and could result in a disruption in service.
² Certain information security controls over a critical internal
Federal Bureau of Investigation (FBI) network reviewed were ineffective
in protecting the confidentiality, integrity, and availability of
information and information resources.[Footnote 21] Specifically, FBI
did not consistently (1) configure network devices and services to
prevent unauthorized insider access and ensure system integrity; (2)
identify and authenticate users to prevent unauthorized access; (3)
enforce the principle of least privilege to ensure that authorized
access was necessary and appropriate; (4) apply strong encryption
techniques to protect sensitive data on its networks; (5) log, audit,
or monitor security-related events; (6) protect the physical security
of its network; and (7) patch key servers and workstations in a timely
manner. Collectively, these weaknesses place sensitive information
transmitted on the network at risk of unauthorized disclosure or
modification, and could result in a disruption of service, increasing
the bureau's vulnerability to insider threats.
Agencies Report Progress, but More Work Is Needed in Implementing
Requirements:
Federal agencies continue to report steady progress in implementing key
information security requirements. Although agencies reported increases
in OMB's performance metrics, IGs identified various weaknesses in
agencies' implementation of FISMA requirements. Pursuant to its FISMA
responsibilities, NIST has continued to issue standards and guidance.
Also, agency IGs completed their annual evaluations, although scope and
methodologies varied across agencies. Further, OMB expanded its
guidance to agencies, with specific emphasis on personally identifiable
information and reported to Congress as required. However,
opportunities exist to improve reporting.
Agencies Cite Increases in Performance, but Weaknesses Exist in FISMA
Implementation:
For fiscal year 2006 reporting, governmentwide percentages increased
for employees and contractors receiving security awareness training and
employees with significant security responsibilities receiving
specialized training. Percentages also increased for systems that had
been tested and evaluated at least annually, systems with tested
contingency plans, and systems that had been certified and accredited
(see fig. 5). However, IGs at several agencies sometimes disagreed with
the information reported by the agency and have identified weaknesses
in the processes used to implement these and other security program
activities.
Figure 5: Reported Data for Selected Performance Metrics for 24 Major
Agencies:
[See PDF for image]
Source: GAO analysis of IG and agency data.
[End of figure]
Security Training and Awareness:
Federal agencies rely on their employees to protect the
confidentiality, integrity, and availability of the information in
their systems. It is critical for each system user to understand their
security roles and responsibilities and be adequately trained to
perform them. FISMA requires agencies to provide security awareness
training to inform personnel--including contractors and other users of
information systems that support the operations and assets of the
agency--of information security risks associated with their activities
and their responsibilities in complying with agency policies and
procedures designed to reduce these risks. In addition, agencies are
required to provide appropriate training on information security to
personnel who have significant security responsibilities. OMB requires
agencies to report on the following measures: (1) the number and
percentage of employees and contractors who receive information
security awareness training, (2) the number and percentage of employees
who have significant security responsibilities and received specialized
training, (3) whether peer-to-peer file sharing is addressed in
security awareness training, and (4) the total amount of money spent on
all security training for the fiscal year.
Agencies reported improvements in the governmentwide percentage of
employees and contractors receiving security awareness training.
According to agency reporting, more than 90 percent of total employees
and contractors governmentwide received security awareness training in
fiscal year 2006. This is an increase from our 2005 report,[Footnote
22] in which approximately 81 percent of employees governmentwide
received security awareness training. In addition, all agencies
reported that they explained policies regarding peer-to-peer file
sharing in security awareness training, ethics training, or other
agencywide training, all addressed specifically in OMB guidance.
Agencies also reported improvements in the number of employees who had
significant security responsibilities and received specialized
training. There has been a slight increase in the number of employees
who have security responsibilities and received specialized security
training since our last report--almost 86 percent of the selected
employees had received specialized training in fiscal year 2006,
compared with about 82 percent in fiscal year 2005.
To achieve the goal of providing appropriate training to all employees,
agencies reported spending an average of $19.28 per employee on
security training. The amount of money spent by agencies on security
training ranged from about $20,000 to more than $38 million.[Footnote
23]
Although agencies have reported improvements in both the number of
employees receiving security awareness training and the number of
employees who have significant security responsibilities and received
specialized training, several agencies exhibit training weaknesses. For
example, according to agency IGs, five major agencies reported
challenges in ensuring that contractors had received security awareness
training. In addition, reports from IGs at two major agencies indicated
that security training across components was inconsistent. Five
agencies also noted that weaknesses still exist in ensuring that all
employees who have specialized responsibilities receive specialized
training, as policies and procedures for this type of training are not
always clear. Further, the majority of agency IGs disagree with their
agencies' reporting of individuals who have received security awareness
training. Figure 6 shows a comparison between agency and IG reporting
of the percentage of employees receiving security awareness training.
If all agency employees and contractors do not receive security
awareness training, agencies risk security breaches resulting from user
error or deliberate attack.
Figure 6: Percentage of Employees Receiving Security Awareness Training
As Reported by Agencies and IGs:
[See PDF for image]
Source: GAO analysis of agency-reported data.
[End of figure]
Periodic Testing and Evaluation of the Effectiveness of Information
Security Policies, Procedures, and Practices:
Periodically evaluating the effectiveness of security policies and
controls and acting to address any identified weaknesses are
fundamental activities that allow an organization to manage its
information security risks proactively, rather than reacting to
individual problems ad hoc after a violation has been detected or an
audit finding has been reported. Management control testing and
evaluation as part of a program review is an additional source of
information that can be considered along with controls testing and
evaluation in IG and other independent audits to help provide a more
complete picture of an agency's security posture. FISMA requires that
federal agencies periodically test and evaluate the effectiveness of
their information security policies, procedures, and practices as part
of implementing an agencywide security program. This testing is to be
performed with a frequency depending on risk, but no less than
annually, and consists of testing management, operational, and
technical controls for every system identified in the agency's required
inventory of major information systems. For annual FISMA reporting, OMB
requires that agencies report the number of agency and contractor
systems for which security controls have been tested.
In 2006, federal agencies reported testing and evaluating security
controls for 88 percent of their systems, up from 73 percent in 2005,
including increases in testing high-risk systems. However, shortcomings
exist in agencies' testing and evaluation of security controls. For
example, the number of agencies testing and evaluating 90 percent or
more of their systems decreased from 18 in 2005 to 16 in 2006
reporting. IGs also reported that not all systems had been tested and
evaluated at least annually, including some high impact systems, and
that weaknesses existed in agencies' monitoring of contractor systems
or facilities. As a result, agencies may not have reasonable assurance
that controls are implemented correctly, are operating as intended, and
are producing the desired outcome with respect to meeting the security
requirements of the agency. In addition, agencies may not be fully
aware of the security control weaknesses in their systems, thereby
leaving the agencies' information and systems vulnerable to attack or
compromise.
Continuity of Operations:
Continuity of operations planning ensures that agencies will be able to
perform essential functions during any emergency or situation that
disrupts normal operations. It is important that these plans be clearly
documented, communicated to potentially affected staff, and updated to
reflect current operations. In addition, testing contingency plans is
essential to determining whether the plans will function as intended in
an emergency situation. FISMA requires that agencywide information
security programs include plans and procedures to ensure continuity of
operations for information systems that support the operations and
assets of the agency. To show the status of implementing contingency
plans testing, OMB requires that agencies report the percentage of
systems that have contingency plans that have been tested in accordance
with policy and guidance.
Federal agencies reported that 77 percent of total systems had
contingency plans that had been tested, an increase from 61 percent.
However, on average, high-risk systems had the smallest percentage of
tested contingency plans--only 64 percent of high-risk systems had
tested contingency plans. In contrast, agencies had tested contingency
plans for 79 percent of moderate-risk systems, 80 percent of low-risk
systems, and 70 percent of uncategorized systems.
Several agencies had specific weaknesses in developing and testing
contingency plans. For example, the IG of a major agency noted that
contingency planning had not been completed for certain critical
systems. Another major agency IG noted that the agency had weaknesses
in three out of four tested contingency plans--the plans were
inaccurate, incomplete, or outdated, did not meet department and
federal requirements, and were not tested in accordance with department
and federal government requirements. Without developing contingency
plans and ensuring that they are tested, the agency increases its risk
that it will not be able to effectively recover and continue operations
when an emergency occurs.
Inventory of Systems:
A complete and accurate inventory of major information systems is
essential for managing information technology resources, including the
security of those resources. The total number of agency systems is a
key element in OMB's performance measures, in that agency progress is
indicated by the percentage of total systems that meet specific
information security requirements such as testing systems annually,
certifying and accrediting, and testing contingency plans. Thus,
inaccurate or incomplete data on the total number of agency systems
affects the percentage of systems shown as meeting the requirements.
FISMA requires that agencies develop, maintain, and annually update an
inventory of major information systems operated by the agency or under
its control. Beginning with 2005 reporting, OMB no longer required
agencies to report the status of their inventories, but required them
to report the number of major systems and asked IGs to report on the
status and accuracy of their agencies' inventories.
IGs reported that 18 agencies had completed approximately 96-100
percent of their inventories, an increase from 13 agencies in 2005.
However, the total number of systems in some agencies' inventories
varied widely from 2005 to 2006. In one case, an agency had
approximately a 300 percent increase in the number of systems, while
another had approximately a 50 percent reduction in the number of its
systems. IGs identified problems with agencies' inventories. For
example, IGs at two large agencies reported that their agencies still
did not have complete inventories, while another questioned the
reliability of its agency's inventory since that agency relied on its
components to report the number of systems and did not validate the
numbers. Without complete, accurate inventories, agencies cannot
effectively maintain and secure their systems. In addition, the
performance measures used to assess agencies' progress may not
accurately reflect the extent to which these security practices have
been implemented.
Certification and Accreditation:
As a key element of agencies' implementation of FISMA requirements, OMB
has continued to emphasize its long-standing policy of requiring a
management official to formally authorize (or accredit) an information
system to process information and accept the risk associated with its
operation based on a formal evaluation (or certification) of the
system's security controls. For annual reporting, OMB requires agencies
to report the number of systems, including impact levels, authorized
for processing after completing certification and accreditation. OMB's
FISMA reporting instructions also requested IGs to assess and report on
their agencies' certification and accreditation process.
Federal agencies continue to report increasing certification and
accreditation from fiscal year 2005 reporting. For fiscal year 2006, 88
percent of agencies' systems governmentwide were reported as certified
and accredited, as compared with 85 percent in 2005. In addition, 23
agencies reported certifying and accrediting more than 75 percent of
their systems, an increase from 21 agencies in 2005. However, the
certification and accreditation percentage for uncategorized systems
exceeded the percentages for all other impact categories and indicates
that agencies may not be focusing their efforts properly.
Although agencies reported increases in the overall percentage of
systems certified and accredited, results of work by their IGs showed
that agencies continue to experience weaknesses in the quality of this
metric. As figure 7 depicts, 10 IGs rated their agencies' certification
and accreditation process as poor or failing, while in 2005, 7 IGs
rated their agencies' process as poor, and none rated it as failing. In
at least three instances of agencies reporting certification and
accreditation percentages over 90 percent, their IG reported that the
process was poor. Moreover, IGs continue to identify specific
weaknesses with key documents in the certification and accreditation
process such as risk assessments and security plans not being completed
consistent with NIST guidance or finding those items missing from
certification and accreditation packages. In other cases, systems were
certified and accredited, but controls or contingency plans were not
properly tested. For example, IG reports highlighted weaknesses in
security plans such as agencies not using NIST guidance, not
identifying controls that were in place, not including minimum
controls, and not updating plans to reflect current conditions. Because
of these discrepancies and weaknesses, reported certification and
accreditation progress may not be providing an accurate reflection of
the actual status of agencies' implementation of this requirement.
Furthermore, agencies may not have assurance that accredited systems
have controls in place that properly protect those systems.
Figure 7: OIG Assessment of C&A Process for Fiscal Year 2006:
[See PDF for image]
Source: GAO analysis of IG assessments.
[End of figure]
Configuration Standards:
Risk-based policies and procedures cost-effectively reduce information
security risks to an acceptable level and ensure that information
security is addressed throughout the life cycle of each information
system in their information security program; a key aspect of these
policies and procedures is minimally acceptable configuration
standards. Configuration standards minimize the security risks
associated with specific software applications widely used in an agency
or across agencies. Because IT products are often intended for a wide
variety of audiences, restrictive security controls are usually not
enabled by default, making the many products vulnerable before they are
used.
FISMA requires each agency to have policies and procedures that ensure
compliance with minimally acceptable system configuration requirements,
as determined by the agency. In fiscal year 2004, for the first time,
agencies reported on the degree to which they had implemented security
configurations for specific operating systems and software
applications. For annual FISMA reporting, OMB requires agencies to
report whether they have an agencywide security configuration policy;
what products, running on agency systems, are covered by that policy;
and to what extent the agency has implemented policies for those
products. OMB also requested IGs to report this performance for their
agencies.
Agencies had not always implemented security configuration policies.
Twenty-three of the major federal agencies reported that they currently
had an agencywide security configuration policy. Although 21 IGs agreed
that their agency had such a policy, they did not agree that the
implementation was always as high as agencies reported. To illustrate,
one agency reported implementing configuration policy for a particular
platform 96 to 100 percent of the time, while their IG reported that
the agency implemented that policy only 0 to 50 percent of the time.
One IG noted that three of the agency's components did not have overall
configuration policies and that other components that did have the
policies did not take into account applicable platforms. If minimally
acceptable configuration requirements policies are not properly
implemented and applied to systems, agencies will not have assurance
that products are configured adequately to protect those systems, which
could increase their vulnerability and make them easier to compromise.
Security Incident Procedures:
Although strong controls may not block all intrusions and misuse,
organizations can reduce the risks associated with such events if they
take steps to detect and respond to them before significant damage
occurs. Accounting for and analyzing security problems and incidents
are also effective ways for an organization to improve its
understanding of threats and potential cost of security incidents, as
well as pinpointing vulnerabilities that need to be addressed so that
they are not exploited again. When incidents occur, agencies are to
notify the federal information security incident center--U. S. Computer
Emergency Readiness Team (US-CERT). US-CERT uses NIST's definition of
an incident (a "violation or imminent threat of violation of computer
security policies, acceptable use policies, or standard computer
security practices)." The categories defined by NIST and US-CERT are:
² Unauthorized access: In this category, an individual gains logical or
physical access without permission to a federal agency's network,
system, application, data, or other resource.
² Denial of service: An attack that successfully prevents or impairs
the normal authorized functionality of networks, systems, or
applications by exhausting resources. This activity includes being the
victim or participating in a denial of service attack.
² Malicious code: Successful installation of malicious software (e.g.,
virus, worm, Trojan horse, or other code-based malicious entity) that
infects an operating system or application. Agencies are not required
to report malicious logic that has been successfully quarantined by
antivirus software.
² Improper usage: A person violates acceptable computing use policies.
² Scans/probes/attempted access: This category includes any activity
that seeks to access or identify a federal agency computer, open ports,
protocols, service, or any combination of these for later exploit. This
activity does not directly result in a compromise or denial of service.
² Investigation: Unconfirmed incidents that are potentially malicious
or anomalous activity deemed by the reporting entity to warrant further
review.
FISMA requires that agencies' security programs include procedures for
detecting, reporting, and responding to security incidents. NIST states
that agencies are responsible for determining specific ways to meet
these requirements. For FISMA reporting, OMB requires agencies to
report numbers of incidents for the past fiscal year in addition to the
number of incidents the agency reported to US-CERT and the number
reported to law enforcement.
According to the US-CERT annual report for fiscal year 2006, federal
agencies reported a record number of incidents, with a notable increase
in incidents reported in the second half of the year. As figure 8
shows, since 2005, the number of incidents reported to US-CERT
increased in every category except for malicious code.
Figure 8: Incidents Reported to US-CERT in Fiscal Years 2005 and 2006:
[See PDF for image]
Source: GAO analysis of OMB data.
[End of figure]
Although agencies reported a record number of incidents, shortcomings
exist in agencies' security incident reporting procedures. The number
of incidents reported is likely to be inaccurate because of
inconsistencies in reporting at various levels. For example, one agency
reported no incidents to US-CERT, although it reported more than 800
unsuccessful incidents internally and to law enforcement authorities.
In addition, analysis of reports from three agencies indicated that
procedures for reporting incidents locally were not followed--two where
procedures for reporting incidents to law enforcement authorities were
not followed, and one where procedures for reporting incidents to US-
CERT were not followed. Several IGs also noted specific weaknesses in
incident procedures such as components not reporting incidents
reliably, information being omitted from incident reports, and
reporting time requirements not being met. Without properly accounting
for and analyzing security problems and incidents, agencies risk losing
valuable information needed to prevent future exploits and understand
the nature and cost of threats directed at the agency.
Remedial Actions to Address Deficiencies in Information Security
Policies, Procedures, and Practices:
Developing remedial action plans is key to ensuring that remedial
actions are taken to address significant deficiencies and reduce or
eliminate known vulnerabilities. These plans should list the weaknesses
and show the estimated resource needs and the status of corrective
actions. The plans are intended to assist agencies in identifying,
assessing, prioritizing, and monitoring the progress of corrective
efforts for security weaknesses found in programs and systems. FISMA
requires that agency information security programs include a process
for planning, implementing, evaluating, and documenting remedial
actions to address any deficiencies in information security policies,
procedures, and practices. For annual FISMA reporting, OMB requires
agencies to report quarterly performance regarding their remediation
efforts for all programs and systems where a security weakness has been
identified. It also requested that IGs assess and report on whether
their agency has developed, implemented, and managed an agencywide
process for these plans.
IGs reported weaknesses in their agency's remediation process.
According to IG assessments, 16 of the 24 major agencies did not almost
always incorporate information security weaknesses for all systems into
their remediation plans. They found that vulnerabilities from reviews
were not always being included in remedial actions. They also
highlighted other weaknesses that included one agency having an
unreliable process for prioritizing weaknesses and another using
inconsistent criteria for defining weaknesses to include in those
plans. Without a sound remediation process, agencies cannot be assured
that information security weaknesses are efficiently and effectively
corrected.
NIST Fulfills FISMA Requirements and Expands Activities:
NIST plays a key role under FISMA in providing important standards and
guidance. It is required, among other things, to develop and issue
minimum information security standards. NIST has issued guidance
through its FISMA Implementation Project and has also expanded its work
through other security activities.
FISMA Implementation Project:
After FISMA was enacted, NIST developed the FISMA Implementation
Project to enable it to fulfill its statutory requirements in a timely
manner. This project is divided into three phases. Phase I focuses on
the development of a suite of required security standards and
guidelines as well as other FISMA-related publications necessary to
create a robust information security program and effectively manage
risk to agency operations and assets. Standards and guidance issued
during Phase I included standards for security categorization of
federal information and information systems, minimum security
requirements for federal information and information systems, and
guidance for the recommended security controls for federal information
systems. Phase I is nearly complete, with only one publication--a guide
to assessing information security controls--remaining to be finalized.
NIST has also developed many other documents to assist information
security professionals. For example, NIST issued Special Publication
800-80 to assist agencies in developing and implementing information
security metrics.[Footnote 24] The processes and methodologies
described link information security performance to agency performance
by leveraging agency-level strategic planning processes. Additionally,
in October 2006, NIST published Special Publication 800-100, which
provides a broad overview of information security program elements to
assist managers in understanding how to establish and implement an
information security program.[Footnote 25]
Phase II focuses on the development of a program for accrediting public
and private sector organizations to conduct security certification
services for federal agencies as part of agencies' certification and
accreditation requirements. Organizations that participate in the
organizational accreditation program[Footnote 26] can demonstrate
competency in the application of NIST security standards and
guidelines. NIST conducted a workshop on Phase II implementation in
April of 2006. It is scheduled to be completed in 2008.
Phase III is the development of a program for validating security
tools. The program is to rely on private sector, accredited testing
laboratories to conduct evaluations of the security tools. NIST is to
provide validation services and laboratory oversight. Implementation of
this phase is planned for 2007 and 2008.
Other NIST Security Activities:
In addition to the specific responsibilities to develop standards and
guidance, other information security activities undertaken by NIST
include:
² conducting workshops on the credentialing program for security
assessment service providers,
² conducting a presentation on automated security tools,
² providing a tutorial on security certification and accreditation of
federal information systems,
² developing and maintaining a checklist repository of security
configurations for specific IT products,
² developing, along with other federal agencies, the National
Vulnerability Database, which includes a repository of standards based
vulnerability management data as well as the security controls, control
enhancements, and supplemental guidance from NIST Special Publication
800-53,[Footnote 27] and:
² issuance of the Computer Security Division's 2006 Annual Report as
mandated by FISMA.
Through NIST's efforts in standards and guidance development and other
activities, agencies have access to additional tools that can be
applied to improve their information security programs. Additionally,
NIST's activities will provide federal agencies with opportunities to
utilize private-sector resources in improving information security.
Office of Inspector General Evaluations Varied across Agencies:
FISMA requires agency IGs to perform an independent evaluation of the
information security programs and practices of the agency to determine
the effectiveness of such programs and practices. Each evaluation is to
include (1) testing of the effectiveness of information security
policies, procedures, and practices of a representative subset of the
agency's information systems and (2) assessing compliance (based on the
results of the testing) with FISMA requirements and related information
security policies, procedures, standards, and guidelines. These
required evaluations are then submitted by each agency to OMB in the
form of a template. In addition to the template submission, OMB
encourages the IGs to provide any additional narrative in an appendix
to the report to the extent they provide meaningful insight into the
status of the agency's security or privacy program.
Although the IGs conducted annual evaluations, the scope and
methodology of IGs' evaluations varied across agencies. For example,
² According to their FISMA reports, certain IGs reported interviewing
officials and reviewing agency documentation, while others indicated
conducting tests of implementation plans (e.g. security plans).
² Mutiple IGs indicated in their scope and methodology sections of
their reports that their reviews were focused on selected components,
whereas others did not make any reference to the breadth of their
review.
² Several reports were solely comprised of a summary of relevant
information security audits conducted during the fiscal year, while
others included additional evaluation that addressed specific FISMA-
required elements, such as risk assessments and remedial actions.
² The percentage of systems reviewed varied; 22 of 24 IGs tested the
information security program effectiveness on a subset of systems; two
IGs did not review any systems.
² One IG noted missing Web applications and concluded that the agency's
inventory of major systems was only 0 to 50 percent complete, although
it noted that, due to time constraints, it was unable to determine
whether other items were missing.
² One IG office noted that although it had evaluated the agency's
configuration policy and certain aspects of the policy's
implementation, it did not corroborate the use of systems under
configuration management. The IG did not independently corroborate
whether agency systems ran the software, but instead reflected the
agency's response.
² Some reviews were limited due to difficulties in verifying
information provided to them by agencies. Specifically, certain IGs
stated that they were unable to conduct evaluations of their respective
agency's inventory because the information provided to them by the
agency at that time was insufficient (i.e., incomplete or unavailable).
The lack of a common methodology, or framework, has culminated in
disparities in audit scope, methodology, and content.
The President's Council on Integrity and Efficiency (PCIE)[Footnote 28]
has recognized the importance of having a framework and in September
2006 developed a tool to assist the IG community with conducting its
FISMA evaluations. The framework consists of program and system control
areas that map directly to the control areas identified in NIST Special
Publication 800-100[Footnote 29] and NIST Special Publication 800-
53,[Footnote 30] respectively. According to PCIE members, the framework
includes broad recommendations rather than a specific methodology due
to the varying levels of resources available to each agency IG. This
framework could provide a common approach to completing the required
evaluations, and PCIE has encouraged IGs to use it.
OMB Increases Guidance, but Improvements Needed in Reporting:
Although OMB has continued to expand its guidance provided to agencies
to help improve information security at agencies, shortcomings exist in
its reporting instructions.
OMB Increases Oversight Efforts:
FISMA specifies that, among other responsibilities, OMB is to develop
policies, principles, standards and guidelines on information security.
Each year, OMB provides instructions to federal agencies and their IGs
for FISMA annual reporting. OMB's reporting instructions focus on
performance measures such as certification and accreditation, testing
of security controls, and security training.
In its March 2007 report to Congress on fiscal year 2006 FISMA
implementation, OMB noted the federal government's modest progress in
meeting key performance measures for IT security. In its report, OMB
stressed that there are still areas requiring strategic and continued
management attention.
OMB identified progress in the following areas:
² system certification and accreditation,
² testing of security controls and contingency plans,
² assigning risk levels to systems,
² training employees in security, and:
² reporting incidents.
OMB indicated the following areas require continued management
attention:
² the quality of certification and accreditations,
² inventory of systems,
² oversight of contractor systems, and:
² agencywide plan of action and milestones process.
The OMB report also discusses a plan of action to improve performance,
assist agencies in their information security activities, and promote
compliance with statutory and policy requirements.
To help agencies protect sensitive data from security incidents, OMB
has issued several policy memorandums over the past 13 months. For
example, OMB has sent memorandums to agencies to reemphasize their
responsibilities under law and policy to (1) appropriately safeguard
sensitive and personally identifiable information, (2) train employees
on their responsibilities to protect sensitive information, and (3)
report security incidents. In May 2007, OMB issued additional detailed
guidelines to agencies on safeguarding against and responding to the
breach of personally identifiable information, including developing and
implementing a risk-based breach notification policy, reviewing and
reducing current holdings of personal information, protecting federal
information accessed remotely, and developing and implementing a policy
outlining the rules of behavior, as well as identifying consequences
and potential corrective actions for failure to follow these rules.
OMB also issued a memorandum to agencies concerning adherence to
specific configuration standards for Windows Vista and XP operating
systems. This memorandum requires agencies, with these operating
systems and/or plans of upgrading to these operating systems, to adopt
the standard security configurations (developed through consensus among
DHS, NIST, and the Department of Defense) by February 1, 2008. Agencies
were also required to provide OMB with their implementation plans for
these platforms by May 1, 2007.
Opportunities Exist to Improve FISMA Reporting:
Periodic reporting of performance measures for FISMA requirements and
related analysis provides valuable information on the status and
progress of agency efforts to implement effective security management
programs; however, opportunities exist to enhance reporting under FISMA
and the independent evaluations completed by IGs.
In previous reports, we have recommended that OMB improve FISMA
reporting by clarifying reporting instructions and requesting IGs to
report on the quality of additional performance metrics. In response,
OMB has taken steps to enhance its reporting instructions. For example,
OMB added questions regarding incident detection and assessments of
system inventory. OMB has also recognized the need for assurance of
quality for agency processes. For example, OMB specifically requested
that the IGs evaluate the certification and accreditation process. The
qualitative assessments of the process allow the IG to rate its
agency's certification and accreditation process using the terms
"excellent," "good," "satisfactory," "poor," or "failing."
Despite these enhancements, the current metrics do not measure how
effectively agencies are performing various activities. Current
performance measures offer limited assurance of the quality of agency
processes that implement key security policies, controls, and
practices. For example, agencies are required to test and evaluate the
effectiveness of the controls over their systems at least once a year
and to report on the number of systems undergoing such tests. However,
there is no measure of the quality of agencies' test and evaluation
processes. Similarly, OMB's reporting instructions do not address the
quality of other activities such as risk categorization, security
awareness training, or incident reporting. Providing information on the
quality of the processes used to implement key control activities would
further enhance the usefulness of the annually reported data for
management and oversight purposes.
Further, OMB reporting guidance and performance measures do not include
complete reporting on a key FISMA-related activity. FISMA requires each
agency to include policies and procedures in its security program that
ensure compliance with minimally acceptable system configuration
requirements, as determined by the agency. As we previously reported,
maintaining up-to-date patches is key to complying with this
requirement. As such, we recommended that OMB address patch management
in its FISMA reporting instructions. Although OMB addressed patch
management in its 2004 FISMA reporting instructions, it no longer
requests this information. Our recent reports have identified
weaknesses in agencies' patch management processes, leaving federal
information systems exposed to vulnerabilities associated with flaws in
software code that could be exploited to cause significant damage--
including the loss of control of entire systems--thereby enabling
malicious individuals to read, modify, or delete sensitive information
or disrupt operations. Without information on agencies' patch
management processes, OMB and the Congress lack information that could
demonstrate whether or not agencies are taking appropriate steps for
protecting their systems.
Conclusions:
Persistent governmentwide weaknesses in information security controls
threaten the confidentiality, integrity, and availability of the
sensitive data maintained by federal agencies. Weaknesses exist
predominantly in access controls, including authentication and
identification, authorization, cryptography, audit and monitoring,
boundary protection, and physical security. Weaknesses also exist in
configuration management, segregation of duties and continuity of
operations. Until agencies ensure that their information security
programs are fully and effectively implemented, there is limited
assurance that sensitive data will be adequately protected against
unauthorized disclosure or modification or that services will not be
interrupted. These weaknesses leave federal agencies vulnerable to
external as well as internal threats. Until agencies fully and
effectively implement their information security programs, including
addressing the hundreds of recommendations that we and IGs have made,
federal systems will remain at increased risk of attack or compromise.
Despite federal agencies' reported progress and increased activities,
weaknesses remain in the processes agencies use for implementing FISMA
performance measures such as those related to agency risk management.
In addition, NIST, the IGs, and OMB have all made progress toward
fulfilling their requirements. However, the metrics specified in
current reporting guidance do not measure how effectively agencies are
performing various activities and the guidance does not address a key
activity. The absence of this information could result in reporting
that does not adequately reflect the status of agency implementation of
required information security policies and procedures. Subsequently,
oversight entities may not be receiving information critical for
monitoring agency compliance with FISMA's statutory requirements for an
information security program.
Recommendations for Executive Action:
Because annual reporting is critical to monitoring agencies'
implementation of information security requirements, we recommend that
the Director of OMB take the following three actions in revising future
FISMA reporting guidance:
² Develop additional performance metrics that measure the effectiveness
of FISMA activities.
² Request inspectors general to report on the quality of additional
agency information security processes, such as system test and
evaluation, risk categorization, security awareness training, and
incident reporting.
² Require agencies to report on a key activity--patch management.
Agency Comments:
We received written comments on a draft of this report from the
Administrator, Office of E-Government and Information Technology, OMB
(see app. II). The Administrator agreed to take our recommendations
under advisement when the Office modifies its FISMA reporting
instructions. In addition, the Administrator pointed out that the
certification and accreditation process provides a systemic approach
for determining whether appropriate security controls are in place,
functioning properly, and producing the desired outcome. She further
noted that OMB's current instructions for IGs to evaluate the quality
of agencies' certification and accreditation process provide the
flexibility for IGs to tailor their evaluations based on documented
weaknesses and plans for improvement.
We are sending copies of this report to the Chairmen and Ranking
Members of the Senate Committee on Homeland Security and Governmental
Affairs and the House Committee on Oversight and Government Reform and
to the Office of Management and Budget. We will also make copies
available to others on request. In addition, this report will be
available at no charge on the GAO Web site at http://www.gao.gov.
If you have any questions regarding this report, please contact me at
(202) 512-6244 or by e-mail at wilshuseng@gao.gov. Contact points for
our Office of Congressional Relations and Public Affairs may be found
on the last page of this report. Key contributors to this report are
listed in appendix III.
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
In accordance with the Federal Information Security Management Act of
2002 (FISMA) requirement that the Comptroller General report
periodically to Congress, our objectives were to evaluate (1) the
adequacy and effectiveness of agencies' information security policies
and practices and (2) federal agency implementation of FISMA
requirements.
To assess the adequacy and effectiveness of agency information security
policies and practices, we analyzed our related reports issued from May
2005 through May 2007. We also reviewed and analyzed the information
security work and products of the agency inspectors general. Both our
reports and the Inspector(s) General products generally used the
methodology contained in The Federal Information System Controls Audit
Manual. Further, we reviewed and analyzed data on information security
in federal agencies' performance and accountability reports.
To assess implementation of FISMA requirements, we reviewed and
analyzed the act (Title III, Pub. L. No. 107-347) and the 24 major
federal agencies' chief information officer and IG FISMA reports for
fiscal years 2004 to 2006, as well as the performance and
accountability reports for those agencies; the Office of Management and
Budget's FISMA reporting instructions, mandated annual reports to
Congress, and other guidance; and the National Institute of Standards
and Technology's standards, guidance, and annual reports. We also held
discussions with agency officials and the agency inspectors general to
further assess the implementation of FISMA requirements. We did not
include systems categorized as national security systems in our review,
nor did we review the adequacy or effectiveness of the security
policies and practices for those systems.
Our work was conducted in Washington, D.C. from February 2007 through
June 2007 in accordance with generally accepted government auditing
standards.
[End of section]
Appendix II: Comments from the Office of Management and Budget:
Executive Office Of The President:
Office of Management and Budget:
Washington, D.C. 20503:
Jul 17 2007:
Gregory C. Wilshusen:
Director, Information Security Issues:
US. Government Accountability Office:
Dear Mr. Wilshusen,
Thank you for the opportunity to comment on the draft Government
Accountability Office's (GAO's) report titled, "Information Security:
Despite Reported Progress, Agencies Need to Persistent Weaknesses"
(GAO- 07-837). We appreciate GAO's careful review and interest in
improving agency security programs and agree that progress has been
reported.
In the draft report, GAO recommends that the Office of Management and
Budget(OMB) take the following three actions in revising future Federal
Information Security Act (FISMA) reporting guidance:
* Develop additional performance metrics that measure the effectiveness
of FISMA activities.
* Request inspectors general to report the quality of additional
information security processes, such as system test kind evaluation,
risk categorization, security awareness training, and incident
reporting.
* Request agencies to report on a key activity, specifically patch
management.
Since 2004, OMB has instructed inspectors general to evaluate the
quality of the agency certification and accreditation (C&A) process,
While no process will guarantee a secure system. C&A provides a
systematic approach for determining whether appropriate security
controls are in place, functioning properly, and producing the outcome.
It also provides authorizing officials with the information needed to
make informed decisions based on knowledge of the remaining risks.
The C&A process requires agencies to categorize systems by impact and
risk level, identify adequate controls commensurate with the impact
level and risk, and test the effectiveness of all technical, and
management controls (e.g., reporting incidents, providing security
awareness training, and applying patches) used to adequately secure
each system and as outlined in NIST Special Publication 800-53,
"Recommended Security Controls for Information Systems" found at:
hyperlink, http://esre.nist.gov/publications/nistpubs/800-53-rev1/800-
53-rev1-final-clean-sz.pdf.
By instructing agencies to qualitatively review agency C&A processes,
OMB ensures agencies and their inspectors general have the flexibility
provided by FISMA ( see section 3545(a) and section 3545(a(2(A) of
FISMA) to tailor their evaluations based on the agency's documented
weaknesses and plans for improvement. This ensures evaluations by
inspectors general include testing of the effectiveness of information
security policies, procedures and practices of a representative subset
of the agency's information systems.
If OMB were to request quality reviews on specific, control groups, we
would require qualitative reviews on certain areas where agencies may
already be effective. We would reduce flexibility needed by agencies to
tailor their evaluations to address documented weaknesses at their
agency. As a result, OMB would place agencies at risk of not reviewing
controls needing improvement.
Nonetheless, GAO's recommendation, in principle, is consistent with
FISMA and guidance, inasmuch as it encourages agencies to review the
quality of their security processes. As such, we will take GAO's
recommendations under advisement when we modify our FISMA reporting
instructions.
Thank you again for the opportunity to review and provide comment on
your draft report.
Sincerely,
Signed by:
Karen S. Evans:
Administrator:
Office of E-Government and IT:
[End of section]
Appendix III: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gregory C. Wilshusen, (202) 512-6244 Director, Information Security
Issues:
Staff Acknowledgments:
In addition to the individual named above, Jeffrey Knott (Assistant
Director); Eric Costello; Larry Crosland; Nancy Glover; Min Hyun; and
Jayne Wilson made key contributions to this report.
[End of section]
Related GAO Products:
Information Security: FBI Needs to Address Weaknesses in Critical
Network. GAO-07-368. Washington, D.C.: April 30, 2007.
Information Security: Persistent Weaknesses Highlight Need for Further
Improvement. GAO-07-751T. Washington, D.C.: April 19, 2007.
Information Security: Further Efforts Needed to Address Significant
Weaknesses at the Internal Revenue Service. GAO-07-364. Washington,
D.C.: March 30, 2007.
Information Security: Sustained Progress Needed to Strengthen Controls
at the Securities and Exchange Commission. GAO-07-256. Washington,
D.C.: March 27, 2007.
Information Security: Veterans Affairs Needs to Address Long-Standing
Weaknesses. GAO-07-532T. Washington, D.C.: February 28, 2007.
Information Security: Agencies Need to Develop and Implement Adequate
Policies for Periodic Testing. GAO-07-65. Washington, D.C.: October 20,
2006.
Information Security: Coordination of Federal Cyber Security Research
and Development. GAO-06-811. Washington, D.C.: September 29, 2006.
Information Security: Federal Deposit Insurance Corporation Needs to
Improve Its Program. GAO-06-620. Washington, D.C.: August 31, 2006.
Information Security: Federal Reserve Needs to Address Treasury Auction
Systems. GAO-06-659. Washington, D.C.: August 30, 2006.
Information Security: The Centers for Medicare & Medicaid Services
Needs to Improve Controls over Key Communication Network. GAO-06-750.
Washington, D.C.: August 30, 2006.
Information Security: Leadership Needed to Address Weaknesses and
Privacy Issues at Veterans Affairs. GAO-06-897T. Washington, D.C.: June
20, 2006.
Veterans Affairs: Leadership Needed to Address Information Security
Weaknesses and Privacy Issues. GAO-06-866T. Washington, D.C.: June 14,
2006.
Information Security: Securities and Exchange Commission Needs to
Continue to Improve Its Program. GAO-06-408. Washington, D.C.: March
31, 2006.
Information Assurance: National Partnership Offers Benefits, but Faces
Considerable Challenges. GAO-06-392. Washington, D.C.: March 24, 2006.
Information Security: Continued Progress Needed to Strengthen Controls
at the Internal Revenue Service. GAO-06-328. Washington, D.C.: March
23, 2006.
Bureau of the Public Debt: Areas for Improvement in Information
Security Controls. GAO-06-522R. Washington, D.C.: March 16, 2006.
Information Security: Federal Agencies Show Mixed Progress in
Implementing Statutory Requirements. GAO-06-527T. Washington, D.C.:
March 16, 2006.
Information Security: Department of Health and Human Services Needs to
Fully Implement Its Program. GAO-06-267. Washington, D.C.: February 24,
2006.
Information Security: The Defense Logistics Agency Needs to Fully
Implement Its Security Program. GAO-06-31. Washington, D.C.: October 7,
2005.
Information Security: Progress Made, but Federal Aviation
Administration Needs to Improve Controls over Air Traffic Control
Systems. GAO-05-712. Washington, D.C.: August 26, 2005.
Information Security: Weaknesses Persist at Federal Agencies Despite
Progress Made in Implementing Related Statutory Requirements. GAO-05-
552. Washington, D.C.: July 15, 2005.
Information Security: Key Considerations Related to Federal
Implementation of Radio Frequency Identification Technology. GAO-05-
849T. Washington, D.C.: June 22, 2005.
Information Security: Department of Homeland Security Needs to Fully
Implement Its Security Program. GAO-05-700. Washington, D.C.: June 17,
2005.
Information Security: Radio Frequency Identification Technology in the
Federal Government. GAO-05-551. Washington, D.C.: May 27, 2005.
IRS Modernization: Continued Progress Requires Addressing Resource
Management Challenges. GAO-05-707T. Washington, D.C.: May 19, 2005.
(310592):
FOOTNOTES
[1] GAO, High-Risk Series: Information Management and Technology, GAO/
HR-97-9 (Washington, D.C.: February 1997) and GAO, High-Risk Series: An
Update, GAO-07-310 (Washington, D.C.: January 2007).
[2] Federal Information Security Management Act of 2002, Title III, E-
Government Act of 2002, Pub. L. No. 107-347, 116 Stat. 2899, 2946 (Dec.
17, 2002).
[3] The 24 major departments and agencies are the Departments of
Agriculture, Commerce, Defense, Education, Energy, Health and Human
Services, Homeland Security, Housing and Urban Development, the
Interior, Justice, Labor, State, Transportation, the Treasury, and
Veterans Affairs; the Environmental Protection Agency, General Services
Administration, National Aeronautics and Space Administration, National
Science Foundation, Nuclear Regulatory Commission, Office of Personnel
Management, Small Business Administration, Social Security
Administration, and U.S. Agency for International Development.
[4] A zero-day exploit takes advantage of a security vulnerability on
the same day that the vulnerability becomes known to the general
public.
[5] GAO, Executive Guide: Information Security Management: Learning
From Leading Organizations, GAO/AIMD-98-68 (Washington, D.C.: May
1998).
[6] GAO, Privacy: Lessons Learned About Data Breach Notification, GAO-
07-657, (Washington, D.C.: Apr. 30, 2007).
[7] Reportable conditions are significant deficiencies in the design or
operation of internal controls that could adversely affect the entity's
ability to record, process, summarize, and report financial data
consistent with the assertions of management in the financial
statements.
[8] A material weakness is a reportable condition that precludes the
entity's internal controls from providing reasonable assurance that
misstatements, losses, or noncompliance material in relation to the
financial statements or to stewardship information would be prevented
or detected on a timely basis.
[9] FMFIA, 31 U.S.C. § 3512, requires agencies to report annually, to
the President and Congress, on the effectiveness of internal controls
and any identified material weaknesses in those controls. Per OMB, for
the purposes of FMFIA reporting, a material weakness also encompasses
weaknesses found in program operations and compliance with applicable
laws and regulations. Material weaknesses for FMFIA reporting are
determined by management, whereas material weaknesses reported as part
of a financial statement audit are determined by independent auditors.
[10] The Reports Consolidation Act of 2000 (31 U.S.C. § 3516(d))
requires Inspectors General to include in their agencies' performance
and accountability report, a statement that summarizes what they
consider to be the most serious management and performance challenges
facing their agency and briefly assesses their agencies' progress in
addressing those challenges.
[11] See the Related GAO Products section for a list of our recent
reports on information security.
[12] Cryptography is used to secure transactions by providing ways to
ensure data confidentiality, data integrity, authentication of the
message's originator, electronic certification of data, and
nonrepudiation (proof of the integrity and origin of data that can be
verified by a third party).
[13] GAO, Information Security: Agencies Need to Develop and Implement
Adequate Policies for Periodic Testing, GAO-07-65 (Washington, D.C.:
Oct. 20, 2006).
[14] GAO-07-65.
[15] GAO, Information Security: Department of Health and Human Services
Needs to Fully Implement Its Program, GAO-06-267 (Washington, D.C.:
Feb. 24, 2006).
[16] GAO, Information Security: Sustained Progress Needed to Strengthen
Controls at the Securities and Exchange Commission, GAO-06-256
(Washington, D.C.: Mar. 27, 2007).
[17] GAO, Information Security: Further Efforts Needed to Address
Significant Weaknesses at the Internal Revenue Service, GAO-07-364
(Washington, D.C.: Mar. 30, 2007).
[18] GAO, Information Security: Progress Made, but Federal Aviation
Administration Needs to Improve Controls over Air Traffic Control
Systems, GAO-05-712 (Washington, D.C.: Aug. 26, 2005).
[19] GAO, Information Security: Federal Reserve Needs to Address
Treasury Auction Systems, GAO-06-659 (Washington, D.C.: Aug. 30, 2006).
[20] GAO, Information Security: The Centers for Medicare and Medicaid
Services Needs to Improve Controls over Key Communication Network, GAO-
06-750 (Washington, D.C.: Aug. 30, 2006).
[21] GAO, Information Security: FBI Needs to Address Weaknesses in
Critical Network, GAO-07-368 (Washington, D.C.: Apr. 30, 2007).
[22] GAO, Information Security: Weaknesses Persist at Federal Agencies
Despite Progress Made in Implementing Related Statutory Requirements,
GAO-05-552 (Washington, D.C.: July 15, 2005).
[23] One agency did not report the amount of money spent on training.
[24] NIST, Guide for Developing Performance Metrics for Information
Security , SP 800-80 (Washington, D.C.: May 2006)
[25] NIST, Information Security Handbook: A Guide for Managers, SP 800-
100 (Washington, D.C.: October 2006)
[26] The term accreditation is used in two different contexts in the
FISMA Implementation Project: security accreditation is the official
management decision to authorize the operation of an information system
(as in the certification and accreditation process) and organizational
accreditation involves comprehensive proficiency testing and the
demonstration of specialized skills in a particular area of interest.
[27] NIST, Recommended Security Controls for Federal Information
Systems, NIST SP 800-53 rev.1 (Washington, D.C.: December 2006)
[28] The President's Council on Integrity and Efficiency was
established by executive order to address integrity, economy, and
effectiveness issues that transcend individual government agencies and
increase the professionalism and effectiveness of IG personnel
throughout government.
[29] SP 800-100.
[30] SP 800-53 rev. 1.
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts
newly released reports, testimony, and correspondence on its Web site.
To have GAO e-mail you a list of newly posted products every afternoon,
go to www.gao.gov and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office 441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202)
512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S.
Government Accountability Office, 441 G Street NW, Room 7125
Washington, D.C. 20548:
Public Affairs:
Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, D.C. 20548: