Information Security

Concerted Effort Needed to Improve Federal Performance Measures Gao ID: GAO-10-159T October 29, 2009

Cyber security is a critical consideration for any organization that depends on information systems and computer networks to carry out its mission or business. Organizations are faced with a variety of information security threats, such as fraudulent activity from cyber criminals, unauthorized access by disgruntled or dishonest employees, and denial-of-service attacks and other disruptions. The recent dramatic increase in reports of security incidents, the wide availability of hacking tools, and steady advances in the sophistication and effectiveness of attack technology all contribute to the urgency of ensuring that adequate steps are taken to protect the federal government's information and the systems that contain and process it. The Federal Information Security Management Act (FISMA), which was enacted in 2002, sets forth a comprehensive framework for ensuring the effectiveness of security controls over information resources that support federal operations and assets. The act assigns specific responsibilities to federal agencies, the Office of Management and Budget (OMB), and the National Institute of Standards and Technology (NIST). It also requires agencies and OMB to annually report on the adequacy and effectiveness of agency information security programs and compliance with the provisions of the act. To help meet these requirements, OMB established a uniform set of information security measures that all federal agencies report on annually.

Leading organizations and experts have identified different types of measures that are useful in helping to achieve information security goals. While officials categorized these types using varying terminology, we concluded that they generally fell into three types: (1) compliance, (2) control effectiveness, and (3) program impact. These types are consistent with those laid out by NIST in its information security performance measurement guide. In addition, while information security measures can be grouped into these three major types, organizations and experts reported that all such measures generally have certain key characteristics, or attributes. These attributes include being (1) measurable, (2) meaningful, (3) repeatable and consistent, and (4) actionable. Further, these organizations and experts indicated that the successful development of information security measures depends on adherence to a number of key practices, including focusing on risks, involving stakeholders, assigning accountability, and linking to business goals. Additional practices are critical to ensuring that the measures are useful in effectively conveying information to operational managers, executives, and oversight officials. These include tailoring measures to the audience; correlating data; and capturing progress, trends, and weaknesses. We determined that federal agencies have not always followed key practices identified by leading organizations for developing information security performance measures. While agencies have developed measures that fall into each of the three major types (i.e. compliance, control effectiveness, and program impact), on balance they have relied primarily on compliance measures, which have a limited ability to gauge program effectiveness. Agencies stated that, for the most part, they predominantly collected measures of compliance because they were focused on measures associated with OMB's FISMA reporting requirements. In addition, while most agencies have developed some measures that include the four key attributes identified by leading organizations and experts, these attributes were not always present in all agency measures. Further, agencies have not always followed key practices in developing measures, such as focusing on risks.



GAO-10-159T, Information Security: Concerted Effort Needed to Improve Federal Performance Measures This is the accessible text file for GAO report number GAO-10-159T entitled 'Information Security: Concerted Effort Needed to Improve Federal Performance Measures' which was released on October 29, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Mr. Chairman and Members of the Subcommittee: Thank you for the opportunity to participate in today‘s hearing on how agencies can establish cost-effective cyber defense. My statement today is based on our report titled Information Security: Concerted Effort Needed to Improve Federal Performance Measures, which is being released at this hearing.[Footnote 1] Cyber security is a critical consideration for any organization that depends on information systems and computer networks to carry out its mission or business. Organizations are faced with a variety of information security threats, such as fraudulent activity from cyber criminals, unauthorized access by disgruntled or dishonest employees, and denial-of-service attacks and other disruptions. The recent dramatic increase in reports of security incidents, the wide availability of hacking tools, and steady advances in the sophistication and effectiveness of attack technology all contribute to the urgency of ensuring that adequate steps are taken to protect the federal government‘s information and the systems that contain and process it. The Federal Information Security Management Act (FISMA), which was enacted in 2002, sets forth a comprehensive framework for ensuring the effectiveness of security controls over information resources that support federal operations and assets. The act assigns specific responsibilities to federal agencies, the Office of Management and Budget (OMB), and the National Institute of Standards and Technology (NIST). It also requires agencies and OMB to annually report on the adequacy and effectiveness of agency information security programs and compliance with the provisions of the act. To help meet these requirements, OMB established a uniform set of information security measures that all federal agencies report on annually. Mr. Chairman, in light of questions about whether or not agencies are measuring the right things in securing their systems, you requested that GAO examine how organizations develop and use metrics to assess the performance and effectiveness of information security activities. In response to your request, our report and my statement provide (1) a description of key types and attributes of performance measures; (2) information about the practices of leading organizations for developing and using measures to guide and monitor information security control activities;[Footnote 2] (3) information on the measures used by federal agencies to guide and monitor information security control activities and how they are developed; and (4) an assessment of the effectiveness of the measures-reporting practices that the federal government uses to inform Congress on the effectiveness of information security programs. In conducting this work, we collected and analyzed information from leading organizations, security experts, NIST, 24 major federal agencies, and OMB.[Footnote 3] Our work for this report was performed in accordance with generally accepted government auditing standards. In brief, Mr. Chairman, leading organizations and experts have identified different types of measures that are useful in helping to achieve information security goals. While officials categorized these types using varying terminology, we concluded that they generally fell into three types: (1) compliance, (2) control effectiveness, and (3) program impact. These types are consistent with those laid out by NIST in its information security performance measurement guide.[Footnote 4] In addition, while information security measures can be grouped into these three major types, organizations and experts reported that all such measures generally have certain key characteristics, or attributes. These attributes include being (1) measurable, (2) meaningful, (3) repeatable and consistent, and (4) actionable.[Footnote 5] Further, these organizations and experts indicated that the successful development of information security measures depends on adherence to a number of key practices, including focusing on risks, involving stakeholders, assigning accountability, and linking to business goals. Additional practices are critical to ensuring that the measures are useful in effectively conveying information to operational managers, executives, and oversight officials. These include tailoring measures to the audience; correlating data; and capturing progress, trends, and weaknesses. Figure 1 illustrates the interrelationship of these key practices with the key characteristics. Figure 1: Measures Development and Use Cycle: [Refer to PDF for image: circle chart] Development: * Focus on risks; * Involve stakeholders; * Assign accountability; * Link to business goals; Measures characteristics: Types: Compliance; Control effectiveness; Program impact; Attributes: Meaningful; Measurable; Repeatable; Actionable; Effective reporting: * Tailor to the audience; * Correlate data; * Capture progress, trends, and weaknesses; Source: GAO. [End of figure] We determined that federal agencies have not always followed key practices identified by leading organizations for developing information security performance measures. While agencies have developed measures that fall into each of the three major types (i.e. compliance, control effectiveness, and program impact), on balance they have relied primarily on compliance measures, which have a limited ability to gauge program effectiveness. Agencies stated that, for the most part, they predominantly collected measures of compliance because they were focused on measures associated with OMB‘s FISMA reporting requirements. In addition, while most agencies have developed some measures that include the four key attributes identified by leading organizations and experts, these attributes were not always present in all agency measures. Further, agencies have not always followed key practices in developing measures, such as focusing on risks. Lastly, we determined that OMB‘s measures did not address the effectiveness of several key areas of information security controls, including, for example, agency security control testing and evaluation processes. There is no measure of the quality of agencies‘ test and evaluation processes or results that demonstrate the effectiveness of the controls that were evaluated.[Footnote 6] In addition, OMB‘s report to Congress does not fully employ key practices for reporting and thus provides limited information about the effectiveness of agency information security programs. We made five recommendations to OMB to assist federal agencies in developing and using measures that better address the effectiveness of their information security programs: * issue revised guidance to chief information officers for developing measures; * direct chief information officers to ensure that measures exhibit key attributes; * direct chief information officers to employ the key practices for developing a measure as identified by leading organizations; * revise annual FISMA reporting guidance to agencies; and: * revise the annual FISMA report to Congress to provide better status information on the security posture of the federal government. Implementing these recommendations will help to focus attention on activities that will enhance the effectiveness of agency information security controls and improve the cyber defense of federal computer systems and information. In providing oral comments on a draft of the report, representatives of OMB's Office of E-Government and Information Technology stated that they generally agreed with the contents and recommendations of the report. Mr. Chairman, this concludes my prepared statement. I would be pleased to respond to any questions that you or other members of the subcommittee may have. For questions about this statement, please contact Gregory C. Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. Individuals making key contributors to this testimony include Ashley Brooks, John de Ferrari, Season Dietrich, Neil Doherty, Ronalynn Espedido, Min Hyun, Anjalique Lawrence, Joshua Leiling, Lee McCracken, and David Plocher. [End of section] Footnotes: [1] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-09-617] (Washington, D.C.: Sept. 14, 2009). [2] For the purposes of this report, ’leading organizations“ refers to prominent, nationally known organizations, academic institutions, and state agencies that have implemented comprehensive enterprisewide information security programs. [3] The 24 major federal agencies are the Agency for International Development; the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, Justice, Labor, State, Transportation, the Treasury, and Veterans Affairs; the Environmental Protection Agency; the General Services Administration; the National Aeronautics and Space Administration; the National Science Foundation; the Nuclear Regulatory Commission; the Office of Personnel Management; the Small Business Administration; and the Social Security Administration. [4] National Institute of Standards and Technology, Performance Measurement Guide for Information Security, NIST Special Pub. 800-55 Revision 1 (Gaithersburg, Md.: July 2008). [5] Although we focused on identifying attributes and practices for measuring the performance of information security programs, our findings conformed closely to our prior work on effective performance measurement and reporting practices for the federal government in general. See, for example, GAO, Managing for Results: Enhancing Agency Use of Performance Information for Management Decision Making, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-927] (Washington, D.C.: Sept. 9, 2005). [6] OMB does require agency inspectors general to assess agencies‘ certification and accreditation process; however, the assessment may or may not include an assessment of security control testing and evaluation processes. Further, OMB does not provide a transparent depiction of how an assessment of an agency‘s security control testing and evaluation process contributes to the overall certification and accreditation quality rating. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.