Information Security
Agencies Continue to Report Progress, but Need to Mitigate Persistent Weaknesses
Gao ID: GAO-09-546 July 17, 2009
For many years, GAO has reported that weaknesses in information security are a widespread problem that can have serious consequences--such as intrusions by malicious users, compromised networks, and the theft of intellectual property and personally identifiable information--and has identified information security as a governmentwide high-risk issue since 1997. Concerned by reports of significant vulnerabilities in federal computer systems, Congress passed the Federal Information Security Management Act of 2002 (FISMA), which authorized and strengthened information security program, evaluation, and reporting requirements for federal agencies. In accordance with the FISMA requirement that the Comptroller General report periodically to Congress, GAO's objectives were to evaluate (1) the adequacy and effectiveness of agencies' information security policies and practices and (2) federal agencies' implementation of FISMA requirements. To address these objectives, GAO analyzed agency, inspectors general, Office of Management and Budget (OMB), and GAO reports.
Persistent weaknesses in information security policies and practices continue to threaten the confidentiality, integrity, and availability of critical information and information systems used to support the operations, assets, and personnel of most federal agencies. Recently reported incidents at federal agencies have placed sensitive data at risk, including the theft, loss, or improper disclosure of personally identifiable information of Americans, thereby exposing them to loss of privacy and identity theft. For fiscal year 2008, almost all 24 major federal agencies had weaknesses in information security controls. An underlying reason for these weaknesses is that agencies have not fully implemented their information security programs. As a result, agencies have limited assurance that controls are in place and operating as intended to protect their information resources, thereby leaving them vulnerable to attack or compromise. In prior reports, GAO has made hundreds of recommendations to agencies for actions necessary to resolve prior significant control deficiencies and information security program shortfalls. Federal agencies reported increased compliance in implementing key information security control activities for fiscal year 2008; however, inspectors general at several agencies noted shortcomings with agencies' implementation of information security requirements. Agencies reported increased implementation of control activities, such as providing awareness training for employees and testing system contingency plans. However, agencies reported decreased levels of testing security controls and training for employees who have significant security responsibilities. In addition, inspectors general at several agencies disagreed with performance reported by their agencies and identified weaknesses in the processes used to implement these activities. Further, although OMB took steps to clarify its reporting instructions to agencies for preparing fiscal year 2008 reports, the instructions did not request inspectors general to report on agencies' effectiveness of key activities and did not always provide clear guidance to inspectors general. As a result, the reporting may not adequately reflect agencies' implementation of the required information security policies and procedures.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-09-546, Information Security: Agencies Continue to Report Progress, but Need to Mitigate Persistent Weaknesses
This is the accessible text file for GAO report number GAO-09-546
entitled 'Information Security: Agencies Continue to Report Progress,
but Need to Mitigate Persistent Weaknesses' which was released on July
17, 2009.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Committees:
United States Government Accountability Office:
GAO:
July 2009:
Information Security:
Agencies Continue to Report Progress, but Need to Mitigate Persistent
Weaknesses:
GAO-09-546:
GAO Highlights:
Highlights of GAO-09-546, a report to congressional committees.
Why GAO Did This Study:
For many years, GAO has reported that weaknesses in information
security are a widespread problem that can have serious consequences”
such as intrusions by malicious users, compromised networks, and the
theft of intellectual property and personally identifiable information”
and has identified information security as a governmentwide high-risk
issue since 1997.
Concerned by reports of significant vulnerabilities in federal computer
systems, Congress passed the Federal Information Security Management
Act of 2002 (FISMA), which authorized and strengthened information
security program, evaluation, and reporting requirements for federal
agencies.
In accordance with the FISMA requirement that the Comptroller General
report periodically to Congress, GAO‘s objectives were to evaluate (1)
the adequacy and effectiveness of agencies‘ information security
policies and practices and (2) federal agencies‘ implementation of
FISMA requirements. To address these objectives, GAO analyzed agency,
inspectors general, Office of Management and Budget (OMB), and GAO
reports.
What GAO Found:
Persistent weaknesses in information security policies and practices
continue to threaten the confidentiality, integrity, and availability
of critical information and information systems used to support the
operations, assets, and personnel of most federal agencies. Recently
reported incidents at federal agencies have placed sensitive data at
risk, including the theft, loss, or improper disclosure of personally
identifiable information of Americans, thereby exposing them to loss of
privacy and identity theft. For fiscal year 2008, almost all 24 major
federal agencies had weaknesses in information security controls (see
figure). An underlying reason for these weaknesses is that agencies
have not fully implemented their information security programs. As a
result, agencies have limited assurance that controls are in place and
operating as intended to protect their information resources, thereby
leaving them vulnerable to attack or compromise. In prior reports, GAO
has made hundreds of recommendations to agencies for actions necessary
to resolve prior significant control deficiencies and information
security program shortfalls.
Federal agencies reported increased compliance in implementing key
information security control activities for fiscal year 2008; however,
inspectors general at several agencies noted shortcomings with
agencies‘ implementation of information security requirements. Agencies
reported increased implementation of control activities, such as
providing awareness training for employees and testing system
contingency plans. However, agencies reported decreased levels of
testing security controls and training for employees who have
significant security responsibilities. In addition, inspectors general
at several agencies disagreed with performance reported by their
agencies and identified weaknesses in the processes used to implement
these activities. Further, although OMB took steps to clarify its
reporting instructions to agencies for preparing fiscal year 2008
reports, the instructions did not request inspectors general to report
on agencies‘ effectiveness of key activities and did not always provide
clear guidance to inspectors general. As a result, the reporting may
not adequately reflect agencies‘ implementation of the required
information security policies and procedures.
Figure: Information Security Weaknesses at Major Federal Agencies for
Fiscal Year 2008:
[Refer to PDF for image: vertical bar graph]
Weakness category: Access control;
Number of agencies: 23.
Weakness category: Configuration management;
Number of agencies: 21,
Weakness category: Segregation of duties;
Number of agencies: 14.
Weakness category: Continuity of operations;
Number of agencies: 17.
Weakness category: Security management;
Number of agencies: 23.
Source: GAO analysis of IG, agency, and GAO reports.
[End of figure]
What GAO Recommends:
GAO is recommending that the Director of OMB take several actions,
including revising guidance. OMB generally agreed with GAO‘s overall
assessment of information security at agencies, but did not concur with
one aspect of GAO‘s assessment of OMB‘s review activities.
View [hyperlink, http://www.gao.gov/products/GAO-09-546] or key
components. For more information, contact Gregory C. Wilshusen at (202)
512-6244 or wilshuseng@gao.gov.
[End of section]
Contents:
Letter:
Background:
Weaknesses in Information Security Place Sensitive Information at Risk:
Agencies Continue to Report Progress in Implementing Requirements:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Comments from the Office of Management and Budget:
Appendix III: Cybersecurity Experts Highlighted Key Improvements for
Strengthening the Nation's Cyber Security:
Appendix IV: GAO Contact and Staff Acknowledgments:
Related GAO Products:
Tables:
Table 1: Total Number of Agency and Contractor Systems in FY 2007 and
FY 2008 by Impact Level:
Table 2: Key Improvements Needed to Strengthen the Nation's
Cybersecurity Posture:
Figures:
Figure 1: Incidents Reported to US-CERT, FY 2006-FY 2008:
Figure 2: Percentage of Incidents Reported to US-CERT in FY06-FY08 by
Category:
Figure 3: Number of Major Agencies Reporting Significant Deficiencies
in Information Security:
Figure 4: Information Security Weaknesses at 24 Major Agencies for FY
2008:
Figure 5: Control Weaknesses Identified in GAO Reports, May 2007-April
2009:
Figure 6: Reported Data for Selected Performance Metrics for 24 Major
Agencies:
Figure 7: Specialized Training for 24 Major Agencies:
Abbreviations:
CD: compact disk:
CIO: chief information officer:
FISMA: Federal Information Security Management Act of 2002:
IG: Inspector General:
IP: Internet Protocol:
NIST: National Institute of Standards and Technology:
OMB: Office of Management and Budget:
POA&M: Plan of Action and Milestones:
US-CERT: U.S. Computer Emergency Readiness Team:
US-VISIT: U.S. Visitor and Immigrant Status Indicator Technology:
[End of section]
United States Government Accountability Office: Washington, DC 20548:
July 17, 2009:
The Honorable Joseph I. Lieberman:
Chairman:
The Honorable Susan M. Collins:
Ranking Member:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable Edolphus Towns:
Chairman:
The Honorable Darrell Issa:
Ranking Member:
Committee on Oversight and Government Reform:
House of Representatives:
Information security is a critical consideration for any organization
that depends on information systems and computer networks to carry out
its mission or business. It is especially important for government
agencies, where the public's trust is essential. The need for a
vigilant approach to information security is demonstrated by the
increase in reports of security incidents, the wide availability of
hacking tools, and steady advances in the sophistication and
effectiveness of attack technology.
Over the past few years, 24 major federal agencies[Footnote 1] have
reported numerous security incidents in which sensitive information has
been lost or stolen, including personally identifiable information,
which has exposed millions of Americans to a loss of privacy, identity
theft, and other financial crimes. Since 1997, we have identified
information security as a governmentwide high-risk issue in our
biennial reports to Congress.[Footnote 2]
Concerned by reports of significant weaknesses in federal computer
systems, Congress passed the Federal Information Security Management
Act (FISMA) of 2002,[Footnote 3] which requires agencies to develop and
implement an information security program, evaluation processes, and
annual reporting. FISMA requires mandated annual reports by federal
agencies, the Office of Management and Budget (OMB), and the National
Institute of Standards and Technology (NIST). FISMA also includes a
requirement for independent annual evaluations by the agencies'
inspectors general or independent external auditors.
In accordance with the FISMA requirement that we report periodically to
Congress, our objectives were to evaluate (1) the adequacy and
effectiveness of agencies' information security policies and practices
and (2) federal agencies' implementation of FISMA requirements. To
accomplish these objectives, we analyzed agency, inspector general,
OMB, and our reports on information security. Where possible, we
categorized findings from those reports into areas defined by FISMA and
the Federal Information System Controls Audit Manual.[Footnote 4] We
did not include systems categorized as national security systems in our
review, nor did we review the adequacy or effectiveness of the security
policies and practices for those systems.
We conducted this performance audit from December 2008 to May 2009 in
accordance with generally accepted government auditing standards. Those
standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe that
the evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objectives. For more details on our
objectives, scope, and methodology, see appendix I.
Background:
Without proper safeguards, computer systems are vulnerable to
individuals and groups with malicious intentions who can intrude and
use their access to obtain and manipulate sensitive information, commit
fraud, disrupt operations, or launch attacks against other computer
systems and networks. The risks to federal systems are well-founded for
a number of reasons, including the dramatic increase in reports of
security incidents, the ease of obtaining and using hacking tools, and
steady advances in the sophistication and effectiveness of attack
technology.
Recognizing the importance of securing federal systems and data,
Congress passed FISMA in 2002. The act sets forth a comprehensive
framework for ensuring the effectiveness of information security
controls over information resources that support federal operations and
assets. FISMA's framework creates a cycle of risk management activities
necessary for an effective security program; these activities are
similar to the principles noted in our study of the risk management
activities of leading private-sector organizations[Footnote 5]--
assessing risk, establishing a central management focal point,
implementing appropriate policies and procedures, promoting awareness,
and monitoring and evaluating policy and control effectiveness. In
order to ensure the implementation of this framework, the act assigns
specific responsibilities to agency heads, chief information officers,
inspectors general, and NIST. It also assigns responsibilities to OMB
that include developing and overseeing the implementation of policies,
principles, standards, and guidelines on information security, and
reviewing agency information security programs, at least annually, and
approving or disapproving them.
Agency Responsibilities:
FISMA requires each agency, including agencies with national security
systems, to develop, document, and implement an agencywide information
security program to provide security for the information and
information systems that support the operations and assets of the
agency, including those provided or managed by another agency,
contractor, or other source.
Specifically, FISMA requires information security programs to include,
among other things:
* periodic assessments of the risk and magnitude of harm that could
result from the unauthorized access, use, disclosure, disruption,
modification, or destruction of information or information systems;
* risk-based policies and procedures that cost-effectively reduce
information security risks to an acceptable level and ensure that
information security is addressed throughout the life cycle of each
information system;
* subordinate plans for providing adequate information security for
networks, facilities, and systems or groups of information systems, as
appropriate;
* security awareness training for agency personnel, including
contractors and other users of information systems that support the
operations and assets of the agency;
* periodic testing and evaluation of the effectiveness of information
security policies, procedures, and practices, performed with a
frequency depending on risk, but no less than annually, and that
includes testing of management, operational, and technical controls for
every system identified in the agency's required inventory of major
information systems;
* a process for planning, implementing, evaluating, and documenting
remedial actions to address any deficiencies in the information
security policies, procedures, and practices of the agency;
* procedures for detecting, reporting, and responding to security
incidents; and:
* plans and procedures to ensure continuity of operations for
information systems that support the operations and assets of the
agency.
In addition, agencies must produce an annually updated inventory of
major information systems (including major national security systems)
operated by the agency or under its control, which includes an
identification of the interfaces between each system and all other
systems or networks, including those not operated by or under the
control of the agency.
FISMA also requires each agency to report annually to OMB, selected
congressional committees, and the Comptroller General on the adequacy
of its information security policies, procedures, practices, and
compliance with requirements. In addition, agency heads are required to
report annually the results of their independent evaluations to OMB,
except to the extent that an evaluation pertains to a national security
system; then only a summary and assessment of that portion of the
evaluation needs to be reported to OMB.
Responsibilities of NIST:
Under FISMA, NIST is tasked with developing, for systems other than
national security systems, standards and guidelines that must include,
at a minimum (1) standards to be used by all agencies to categorize all
their information and information systems based on the objectives of
providing appropriate levels of information security, according to a
range of risk levels; (2) guidelines recommending the types of
information and information systems to be included in each category;
and (3) minimum information security requirements for information and
information systems in each category. NIST must also develop a
definition of and guidelines for detection and handling of information
security incidents as well as guidelines developed in conjunction with
the Department of Defense and the National Security Agency for
identifying an information system as a national security system.
The law also assigns other information security functions to NIST,
including:
* providing technical assistance to agencies on elements such as
compliance with the standards and guidelines and the detection and
handling of information security incidents;
* evaluating private-sector information security policies and practices
and commercially available information technologies to assess potential
application by agencies;
* evaluating security policies and practices developed for national
security systems to assess their potential application by agencies;
and:
* conducting research, as needed, to determine the nature and extent of
information security vulnerabilities and techniques for providing cost-
effective information security.
As required by FISMA, NIST has prepared its annual public report on
activities undertaken in the previous year and planned for the coming
year. In addition, NIST's FISMA initiative supports the development of
a program for credentialing public and private sector organizations to
provide security assessment services for federal agencies.
Responsibilities of Inspectors General:
Under FISMA, the inspector general for each agency shall perform an
independent annual evaluation of the agency's information security
program and practices. The evaluation should include testing of the
effectiveness of information security policies, procedures, and
practices of a representative subset of agency systems. In addition,
the evaluation must include an assessment of the compliance with the
act and any related information security policies, procedures,
standards, and guidelines. For agencies without an inspector general,
evaluations of non-national security systems must be performed by an
independent external auditor. Evaluations related to national security
systems are to be performed by an entity designated by the agency head.
Responsibilities of OMB:
FISMA states that the Director of OMB shall oversee agency information
security policies and practices, including:
* developing and overseeing the implementation of policies, principles,
standards, and guidelines on information security;
* requiring agencies to identify and provide information security
protections commensurate with risk and magnitude of the harm resulting
from the unauthorized access, use, disclosure, disruption,
modification, or destruction of information collected or maintained by
or on behalf of an agency, or information systems used or operated by
an agency, or by a contractor of an agency, or other organization on
behalf of an agency;
* overseeing agency compliance with FISMA to enforce accountability;
and:
* reviewing at least annually, and approving or disapproving, agency
information security programs.
In addition, the act requires that OMB report to Congress no later than
March 1 of each year on agency compliance with FISMA.
Weaknesses in Information Security Place Sensitive Information at Risk:
Significant weaknesses in information security policies and practices
threaten the confidentiality, integrity, and availability of critical
information and information systems used to support the operations,
assets, and personnel of most federal agencies. These persistent
weaknesses expose sensitive data to significant risk, as illustrated by
recent incidents at various agencies. Further, our work and reviews by
inspectors general note significant information security control
deficiencies that place a broad array of federal operations and assets
at risk. Consequently, we have made hundreds of recommendations to
agencies to address these security control deficiencies.
Reported Incidents Are on the Rise and Place Sensitive Information at
Risk:
Since our report in July 2007, federal agencies have reported a spate
of security incidents that have put sensitive data at risk, thereby
exposing the personal information of millions of Americans to the loss
of privacy and potential harm associated with identity theft. Agencies
have experienced a wide range of incidents involving data loss or
theft, computer intrusions, and privacy breaches, underscoring the need
for improved security practices. The following examples, reported in
2008 and 2009, illustrate that a broad array of federal information and
assets remain at risk.
* In May 2009, the Department of Transportation Inspector General
issued the results of an audit of Web applications security and
intrusion detection in air traffic control systems at the Federal
Aviation Administration (FAA). The inspector general reported that Web
applications used in supporting air traffic control systems operations
were not properly secured to prevent attacks or unauthorized access. To
illustrate, vulnerabilities found in Web application computers
associated with the Traffic Flow Management Infrastructure System,
Juneau Aviation Weather System, and the Albuquerque Air Traffic Control
Tower allowed audit staff to gain unauthorized access to data stored on
these computers, including program source code and sensitive personally
identifiable information. In addition, the inspector general reported
that it found a vulnerability on FAA Web applications that could allow
attackers to execute malicious codes on FAA users' computers, which was
similar to an actual incident that occurred in August 2008. In February
2009, the FAA notified employees that an agency computer had been
illegally accessed and employee personal identity information had been
stolen electronically. Two of the 48 files on the breached computer
server contained personal information about more than 45,000 FAA
employees and retirees who were on the FAA payrolls as of the first
week of February 2006. Law enforcement agencies were notified and are
investigating the data theft.
* In March 2009, U.S. Congressman Jason Altmire and U.S. Senator Bob
Casey announced that they had sent a letter to the Under Secretary of
Defense for Acquisition, Technology, and Logistics, asking for
additional information on a recent security breach of the presidential
helicopter, Marine One. According to the announcement, in February
2009, a company based in Cranberry, Pennsylvania, discovered that
engineering and communications documents containing key details about
the Marine One fleet had been downloaded to an Internet Protocol (IP)
address in Iran. The documents were traced back to a defense contractor
in Maryland, where an employee most likely downloaded a file-sharing
program that inadvertently allowed others to access this information.
According to information from the Congressman's Web site, recent
reports have said that the federal government was warned last June that
an Internet Web site with an IP address traced to Iran was actively
seeking this information.
* In March 2009, the United States Computer Emergency Readiness Team
(US-CERT) issued an updated notice to warn agencies and organizations
of the Conficker/Downadup worm activity and to help prevent further
compromises from occurring. In the notice, US-CERT warned that the
Conficker/Downadup worm could infect a Microsoft Windows system from a
thumb drive, a network share, or directly across a network if the host
is not patched.
* According to a March 2009 media release from Senator Bill Nelson's
office, cyber-invaders thought to be in China hacked into the computer
network in Senator Nelson's office. There were two attacks on the same
day in March 2009, and another one in February 2009 that targeted work
stations used by three of Senator Nelson's staffers. The hackers were
not able to take any classified information because that information is
not kept on office computers, a spokesman said. The media release
stated that similar incursions into computer networks in Congress were
up significantly in the past few months.
* The Department of Energy's Office of Health, Safety, and Security
announced that a password-protected compact disk (CD) had been lost
during a routine shipment on January 28, 2009. The CD contained
personally identifiable information for 59,617 individuals who
currently work or formerly worked at facilities at the Department of
Energy's Idaho site. The investigation verified that protection
measures had been applied in accordance with requirements applicable to
organizations working under cooperative agreements and surmised that
while the CD had been lost for 8 weeks at the time of the
investigation, no evidence had been found that revealed that the
personal information on the lost disk had been compromised. The
investigation concluded that OMB and Department of Energy requirements
for managing and reporting the loss of the information had not been
transmitted to the appropriate organizations and that there was a
failure to provide timely notifications of the actual or suspected loss
of information in this incident.
* In January 2009, the Program Director of the Office of Personnel and
Management's USAJOBS Web site announced that their technology
provider's (Monster.com) database had been illegally accessed and
contact and account data had been taken, including user IDs and
passwords, e-mail addresses, names, phone numbers, and some basic
demographic data. The director pointed out that e-mail could be used
for phishing activity and advised users to change their site login
password.
* In December 2008, the Federal Emergency Management Administration was
alerted to an unauthorized breach of private information when an
applicant notified it that his personal information pertaining to
Hurricane Katrina had been posted on the Internet. The information
posted to Web sites contained a spreadsheet with 16,857 lines of data
that included applicant names, social security numbers, addresses,
telephone numbers, e-mail addresses, and other information on disaster
applicants who had evacuated to Texas. According to the Federal
Emergency Management Administration, it took action to work with the
Web site hosting the private information, and have that information
removed from public view. Additionally, the agency reported that it
worked to remove the same information from a second Web site. Further,
the agency stated that while it believed most of the applicant
information posted on the Web sites were properly released by them to a
state agency, it did not authorize the subsequent public posting of
much of this data.
* In June 2008, the Walter Reed Army Medical Center reported that
officials were investigating the possible disclosure of personally
identifiable information through unauthorized sharing of a data file
containing the names of approximately 1,000 Military Health System
beneficiaries. Walter Reed officials were notified of the possible
exposure on May 21 by an outside company. Preliminary results of an
ongoing investigation identified a computer from which the data had
apparently been compromised. Data security personnel from Walter Reed
and the Department of the Army think it is possible that individuals
named in the file could become victims of identity theft. The
compromised data file did not include protected health information such
as medical records, diagnosis, or prognosis for patients.
* In March 2008, media reports surfaced noting that the passport files
of three U.S. senators, who were also presidential candidates, had been
improperly accessed by Department of State employees and contractor
staff. As of April 2008, the system contained records on about 192
million passports for about 127 million passport holders. These records
included personally identifiable information, such as the applicant's
name, gender, social security number, date and place of birth, and
passport number. In July 2008, after investigating this incident, the
Department of State's Office of Inspector General reported many control
weaknesses--including a general lack of policies, procedures, guidance,
and training--relating to the prevention and detection of unauthorized
access to passport and applicant information and the subsequent
response and disciplinary processes when a potential unauthorized
access is substantiated.
When incidents occur, agencies are to notify the federal information
security incident center--US-CERT. As shown in figure 1, the number of
incidents reported by federal agencies to US-CERT has risen
dramatically over the past 3 years, increasing from 5,503 incidents
reported in fiscal year 2006 to 16,843 incidents in fiscal year 2008
(slightly more than 200 percent).
Figure 1: Incidents Reported to US-CERT, FY 2006-FY 2008:
[Refer to PDF for image: vertical bar graph]
FY 2006: 5,503;
FY 2007: 11,910;
FY 2008: 16,842.
Source: GAO analysis of US-CERT data.
[End of figure]
Agencies report the following types of incidents based on US-CERT-
defined categories:
* Unauthorized access: Gaining logical or physical access without
permission to a federal agency's network, system, application, data, or
other resource.
* Denial of service: Preventing or impairing the normal authorized
functionality of networks, systems, or applications by exhausting
resources. This activity includes being the victim of or participating
in a denial of service attack.
* Malicious code: Installing malicious software (e.g., virus, worm,
Trojan horse, or other code-based malicious entity) that infects an
operating system or application. Agencies are not required to report
malicious logic that has been successfully quarantined by antivirus
software.
* Improper usage: Violating acceptable computing use policies.
* Scans/probes/attempted access: Accessing or identifying a federal
agency computer, open ports, protocols, service, or any combination of
these for later exploit. This activity does not directly result in a
compromise or denial of service.
Under investigation: Investigating unconfirmed incidents that are
potentially malicious, or anomalous activity deemed by the reporting
entity to warrant further review.
As noted in figure 2, the three most prevalent types of incidents
reported to US-CERT during fiscal years 2006 through 2008 were
unauthorized access, improper usage, and investigation (see fig. 2).
Figure 2: Percentage of Incidents Reported to US-CERT in FY06-FY08 by
Category:
[Refer to PDF for image: pie-chart]
Investigation: 34%;
Improper usage: 22%;
Unauthorized access: 18%;
Malicious code: 14%;
Scans/probes/attempted access: 12%;
Denial of service: less than 1%.
Source: GAO analysis of US-CERT data.
[End of figure]
Weaknesses in Controls Highlight Deficiencies in the Implementation of
Security Policies and Practices:
Reviews at federal agencies continue to highlight deficiencies in their
implementation of security policies and procedures. In their fiscal
year 2008 performance and accountability reports, 20 of the 24 agencies
indicated that inadequate information security controls were either a
material weakness or a significant deficiency[Footnote 6] (see fig. 3).
Figure 3: Number of Major Agencies Reporting Significant Deficiencies
in Information Security:
[Refer to PDF for image: pie-chart]
Significant deficiency: 13;
Material weakness: 7;
No significant weakness: 4.
Source: GAO analysis of agency performance and accountability reports
for FY 2008.
[End of figure]
Similarly, in annual reports required under 31 U.S.C. § 3512 (commonly
referred to as the Federal Managers' Financial Integrity Act of 1982),
[Footnote 7] 11 of 24 agencies identified material weaknesses in
information security. Inspectors general have also noted weaknesses in
information security, with 22 of 24 identifying it as a "major
management challenge" for their agency.[Footnote 8]
Similarly, our audits have identified control deficiencies in both
financial and nonfinancial systems, including vulnerabilities in
critical federal systems. For example:
* In 2009, we reported that security weaknesses at the Securities and
Exchange Commission continued to jeopardize the confidentiality,
integrity, and availability of the commission's financial and sensitive
information and information systems.[Footnote 9] Although the
commission had made progress in correcting previously reported
information security control weaknesses, it had not completed action to
correct 16 weaknesses. In addition, we identified 23 new weaknesses in
controls intended to restrict access to data and systems. Thus, the
commission had not fully implemented effective controls to prevent,
limit, or detect unauthorized access to computing resources. For
example, it had not always (1) consistently enforced strong controls
for identifying and authenticating users, (2) sufficiently restricted
user access to systems, (3) encrypted network services, (4) audited and
monitored security-relevant events for its databases, and (5)
physically protected its computer resources. The Securities and
Exchange Commission also had not consistently ensured appropriate
segregation of incompatible duties or adequately managed the
configuration of its financial information systems. As a result, the
Securities and Exchange Commission was at increased risk of
unauthorized access to and disclosure, modification, or destruction of
its financial information, as well as inadvertent or deliberate
disruption of its financial systems, operations, and services. The
Securities and Exchange Commission agreed with our recommendations and
stated that it plans to address the identified weaknesses.
* In 2009, we reported that the Internal Revenue Service had made
progress toward correcting prior information security weaknesses, but
continued to have weaknesses that could jeopardize the confidentiality,
integrity, and availability of financial and sensitive taxpayer
information.[Footnote 10] These deficiencies included some related to
controls that are intended to prevent, limit, and detect unauthorized
access to computing resources, programs, information, and facilities,
as well as a control important in mitigating software vulnerability
risks. For example, the agency continued to, among other things, allow
sensitive information, including IDs and passwords for mission-critical
applications, to be readily available to any user on its internal
network and to grant excessive access to individuals who do not need
it. In addition, the Internal Revenue Service had systems running
unsupported software that could not be patched against known
vulnerabilities. Until those weaknesses are corrected, the Internal
Revenue Service remains vulnerable to insider threats and is at
increased risk of unauthorized access to and disclosure, modification,
or destruction of financial and taxpayer information, as well as
inadvertent or deliberate disruption of system operations and services.
The IRS agreed to develop a plan addressing each of our
recommendations.
* In 2008, we reported that although the Los Alamos National
Laboratory--one of the nation's weapons laboratories--implemented
measures to enhance the information security of its unclassified
network, vulnerabilities continued to exist in several critical areas,
including (1) identifying and authenticating users of the network, (2)
encrypting sensitive information, (3) monitoring and auditing
compliance with security policies, (4) controlling and documenting
changes to a computer system's hardware and software, and (5)
restricting physical access to computing resources.[Footnote 11] As a
result, sensitive information on the network--including unclassified
controlled nuclear information, naval nuclear propulsion information,
export control information, and personally identifiable information--
were exposed to an unnecessary risk of compromise. Moreover, the risk
was heightened because about 300 (or 44 percent) of 688 foreign
nationals who had access to the unclassified network as of May 2008
were from countries classified as sensitive by the Department of
Energy, such as China, India, and Russia. While the organization did
not specifically comment on our recommendations, it agreed with the
conclusions.
* In 2008, we reported that the Tennessee Valley Authority had not
fully implemented appropriate security practices to secure the control
systems used to operate its critical infrastructures at facilities we
reviewed.[Footnote 12] Multiple weaknesses within the Tennessee Valley
Authority corporate network left it vulnerable to potential compromise
of the confidentiality, integrity, and availability of network devices
and the information transmitted by the network. For example, almost all
of the workstations and servers that we examined on the corporate
network lacked key security patches or had inadequate security
settings. Furthermore, Tennessee Valley Authority had not adequately
secured its control system networks and devices on these networks,
leaving the control systems vulnerable to disruption by unauthorized
individuals. In addition, we reported that the network interconnections
provided opportunities for weaknesses on one network to potentially
affect systems on other networks. Specifically, weaknesses in the
separation of network segments could allow an individual who had gained
access to a computing device connected to a less secure portion of the
network to be able to compromise systems in a more secure portion of
the network, such as the control systems. As a result, Tennessee Valley
Authority's control systems were at increased risk of unauthorized
modification or disruption by both internal and external threats and
could affect its ability to properly generate and deliver electricity.
The Tennessee Valley Authority agreed with our recommendations and
provided information on steps it was taking to implement them.
* In 2007, we reported that the Department of Homeland Security had
significant weaknesses in computer security controls surrounding the
information systems used to support its U.S. Visitor and Immigrant
Status Technology (US-VISIT) program for border security.[Footnote 13]
For example, it had not implemented controls to effectively prevent,
limit, and detect access to computer networks, systems, and
information. Specifically, it had not (1) adequately identified and
authenticated users in systems supporting US-VISIT; (2) sufficiently
limited access to US-VISIT information and information systems; (3)
ensured that controls adequately protected external and internal
network boundaries; (4) effectively implemented physical security at
several locations; (5) consistently encrypted sensitive data traversing
the communication network; and (6) provided adequate logging or user
accountability for the mainframe, workstations, or servers. In
addition, it had not always ensured that responsibilities for systems
development and system production had been sufficiently segregated and
had not consistently maintained secure configurations on the
application servers and workstations at a key data center and ports of
entry. As a result, increased risk existed that unauthorized
individuals could read, copy, delete, add, and modify sensitive
information--including personally identifiable information--and disrupt
service on Customs and Border Protection systems supporting the US-
VISIT program. The department stated that it directed Customs and
Border Protection to complete remediation activities to address each of
our recommendations.
Weaknesses Persist in All Major Categories of Controls:
According to our reports and those of agency inspectors general,
persistent weaknesses appear in the five major categories of
information system controls: (1) access controls, which ensure that
only authorized individuals can read, alter, or delete data; (2)
configuration management controls, which provide assurance that only
authorized software programs are implemented; (3) segregation of
duties, which reduces the risk that one individual can independently
perform inappropriate actions without detection; (4) continuity of
operations planning, which provides for the prevention of significant
disruptions of computer-dependent operations; and (5) an agencywide
information security program, which provides the framework for ensuring
that risks are understood and that effective controls are selected and
properly implemented. Most agencies continue to have weaknesses in each
of these categories, as shown in figure 4.
Figure 4: Information Security Weaknesses at 24 Major Agencies for FY
2008:
[Refer to PDF for image: vertical bar graph]
Weakness category: Access control;
Number of agencies: 23.
Weakness category: Configuration management;
Number of agencies: 21,
Weakness category: Segregation of duties;
Number of agencies: 14.
Weakness category: Continuity of operations;
Number of agencies: 17.
Weakness category: Security management;
Number of agencies: 23.
Source: GAO analysis of IG, agency, and GAO reports.
[End of figure]
Access Controls Were Not Adequate:
Agencies use access controls to limit, prevent, or detect inappropriate
access to computer resources (data, equipment, and facilities), thereby
protecting them from unauthorized use, modification, disclosure, and
loss. Such controls include both electronic and physical controls.
Electronic access controls include those related to boundary
protection, user identification and authentication, authorization,
cryptography, and auditing and monitoring. Physical access controls are
important for protecting computer facilities and resources from
espionage, sabotage, damage, and theft. These controls involve
restricting physical access to computer resources, usually by limiting
access to the buildings and rooms in which they are housed and
enforcing usage restrictions and implementation guidance for portable
and mobile devices.
At least 23 major federal agencies had access control weaknesses during
fiscal year 2008. An analysis of our reports reveals that 48 percent of
information security control weaknesses pertained to access controls
(see figure 5). For example, agencies did not consistently (1)
establish sufficient boundary protection mechanisms; (2) identify and
authenticate users to prevent unauthorized access; (3) enforce the
principle of least privilege to ensure that authorized access was
necessary and appropriate; (4) apply encryption to protect sensitive
data on networks and portable devices; (5) log, audit, and monitor
security-relevant events; and (6) establish effective controls to
restrict physical access to information assets. Without adequate access
controls in place, agencies cannot ensure that their information
resources are protected from intentional or unintentional harm.
Figure 5: Control Weaknesses Identified in GAO Reports, May 2007-April
2009:
[Refer to PDF for image: pie-chart]
Access controls: 48%;
Security management: 31%;
Configuration management: 18%;
Contingency planning: 2%;
Segregation of duties: 1%.
Source: GAO analysis of prior GAO reports.
[End of figure]
Boundary Protection:
Boundary protection controls logical connectivity into and out of
networks and controls connectivity to and from network connected
devices. Agencies segregate the parts of their networks that are
publicly accessible by placing these components in subnetworks with
separate physical interfaces and preventing public access to their
internal networks. Unnecessary connectivity to an agency's network
increases not only the number of access paths that must be managed and
the complexity of the task, but the risk of unauthorized access in a
shared environment. In addition to deploying a series of security
technologies at multiple layers, deploying diverse technologies at
different layers helps to mitigate the risk of successful cyber
attacks. For example, multiple firewalls can be deployed to prevent
both outsiders and trusted insiders from gaining unauthorized access to
systems, and intrusion detection technologies can be deployed to defend
against attacks from the Internet.
Agencies continue to demonstrate vulnerabilities in establishing
appropriate boundary protections. For example, two agencies that we
assessed did not adequately secure channels to connect remote users,
increasing the risk that attackers will use these channels to gain
access to restricted network resources. One of these agencies also did
not have adequate intrusion detection capabilities, while the other
allowed users of one network to connect to another, higher-security
network. Such weaknesses in boundary protections impair an agency's
ability to deflect and detect attacks quickly and protect sensitive
information and networks.
User Identification and Authentication:
A computer system must be able to identify and authenticate different
users so that activities on the system can be linked to specific
individuals. When an organization assigns unique user accounts to
specific users, the system is able to distinguish one user from
another--a process called identification. The system also must
establish the validity of a user's claimed identity by requesting some
kind of information, such as a password, that is known only by the
user--a process known as authentication.
Agencies did not always adequately control user accounts and passwords
to ensure that only valid users could access systems and information.
In our 2007 FISMA report,[Footnote 14] we noted several weaknesses in
agencies' identification and authentication procedures. Agencies
continue to experience similar weaknesses in fiscal years 2008 and
2009. For example, certain agencies did not adequately enforce strong
password settings, increasing the likelihood that accounts could be
compromised and used by unauthorized individuals to gain access to
sensitive information. In other instances, agencies did not enforce
periodic changing of passwords or use of one-time passwords or
passcodes, and transmitted or stored passwords in clear text. Poor
password management increases the risk that unauthorized users could
guess or read valid passwords to devices and use the compromised
devices for an indefinite period of time.
Authorization:
Authorization is the process of granting or denying access rights and
permissions to a protected resource, such as a network, a system, an
application, a function, or a file. A key component of granting or
denying access rights is the concept of least privilege, which is a
basic principle for securing computer resources and information and
means that users are granted only those access rights and permissions
that they need to perform their official duties. To restrict legitimate
users' access to only those programs and files that they need to do
their work, agencies establish access rights and permissions. "User
rights" are allowable actions that can be assigned to users or to
groups of users. File and directory permissions are rules that regulate
which users can access a particular file or directory and the extent of
that access. To avoid unintentionally authorizing users access to
sensitive files and directories, an agency must give careful
consideration to its assignment of rights and permissions.
Agencies continued to grant rights and permissions that allowed more
access than users needed to perform their jobs. Inspectors general at
12 agencies reported instances where users had been granted excessive
privileges. In our reviews, we also noted vulnerabilities in this area.
For example, at one agency, users could inappropriately escalate their
access privileges to run commands on a powerful system account, many
had unnecessary and inappropriate access to databases, and other
accounts allowed excessive privileges and permissions. Another agency
allowed (on financial applications) generic, shared accounts that
included the ability to create, delete, and modify users' accounts.
Approximately 1,100 users at yet another agency had access to mainframe
system management utilities, although such access was not necessarily
required to perform their jobs. These utilities provided access to all
files stored on disk; all programs running on the system, including the
outputs; and the ability to alter hardware configurations supporting
the production environment. We uncovered one agency that had provided a
contractor with system access that was beyond what was needed, making
the agency vulnerable to incidents on the contractor's network. Another
agency gave all users of an application full access to the
application's source code although their responsibilities did not
require this level of privilege. Such weaknesses in authorization place
agencies at increased risk of inappropriate access to data and
sensitive system programs, as well as to the consequent disruption of
services.
Cryptography:
Cryptography[Footnote 15] underlies many of the mechanisms used to
enforce the confidentiality and integrity of critical and sensitive
information. A basic element of cryptography is encryption. Encryption
can be used to provide basic data confidentiality and integrity by
transforming plain text into cipher text using a special value known as
a key and a mathematical process known as an algorithm. The National
Security Agency recommends disabling protocols that do not encrypt
information transmitted across the network, such as user identification
and password combinations.
Agencies did not always encrypt sensitive information on their systems
or traversing the network. In our reviews of agencies' information
security, we found that agencies did not always encrypt sensitive
information. For example, five agencies that we reviewed did not
effectively use cryptographic controls to protect sensitive resources.
Specifically, one agency allowed unencrypted protocols to be used on
its network devices. Another agency did not require encrypted passwords
for network logins, while another did not consistently provide
approved, secure transmission of data over its network. These
weaknesses could allow an attacker, or malicious user, to view
information and use that knowledge to obtain sensitive financial and
system data being transmitted over the network.
Auditing and Monitoring:
To establish individual accountability, monitor compliance with
security policies, and investigate security violations, it is crucial
to determine what, when, and by whom specific actions have been taken
on a system. Agencies accomplish this by implementing system or
security software that provides an audit trail, or logs of system
activity, that they can use to determine the source of a transaction or
attempted transaction and to monitor users' activities. The way in
which agencies configure system or security software determines the
nature and extent of the information that can be provided by the audit
trail. To be effective, agencies should configure their software to
collect and maintain audit trails that are sufficient to track security-
relevant events.
Agencies did not sufficiently log and monitor key security-and audit-
related events on their network. For example, agencies did not monitor
critical portions of their networks for intrusions; record successful,
unauthorized access attempts; log certain changes to data on a
mainframe (which increases the risk of compromised security controls or
disrupted operations); and capture all authentication methods and
logins to a network by foreign nationals. Similarly, 14 agencies did
not always have adequate auditing and monitoring capabilities. For
example, one agency did not conduct a baseline assessment of an
important network. This baseline determines a typical state or pattern
of network activity. Without this information, the agency could have
difficulty detecting and investigating anomalous activity to ascertain
whether or not an attack was under way. Another agency did not perform
source code scanning or have a process for manual source code reviews,
which increases the risk that vulnerabilities would not be detected. As
a result, unauthorized access could go undetected, and if a system is
modified or disrupted, the ability to trace or recreate events could be
impeded.
Physical Security:
Physical security controls help protect computer facilities and
resources from espionage, sabotage, damage, and theft. These controls
restrict physical access to sensitive computing and communications
resources, usually by limiting access to the buildings and rooms in
which the resources are housed. Examples of physical security controls
include perimeter fencing, surveillance cameras, security guards,
locks, and procedures for granting or denying individuals physical
access to computing resources. Physical controls also include
environmental controls such as smoke detectors, fire alarms,
extinguishers, and uninterruptible power supplies. Considerations for
perimeter security also include controlling vehicular and pedestrian
traffic. In addition, visitors' access to sensitive areas must be
managed appropriately.
Our analysis of inspector general, GAO, and agency reports has shown
that nine agencies did not sufficiently restrict physical access to
sensitive computing and communication resources. The physical security
measures employed by these agencies often did not comply with their own
requirements or with federal standards. Access to facilities containing
sensitive equipment and information was not always adequately
restricted. For example, at one agency with buildings housing
classified networks, cars were not stopped and inspected; a sign
indicated the building's purpose; fencing was scalable; and access to
buildings containing computer network equipment was not controlled by
electronic or other means. Agencies did not adequately manage visitors,
in one instance, placing network jacks in an area where unescorted
individuals could use them to obtain electronic access to restricted
computing resources, and in another failing to properly identify and
control visitors at a facility containing sensitive equipment. Agencies
did not always remove employees' physical access authorizations to
sensitive areas in a timely manner when they departed or their work no
longer required such access. Environmental controls at one agency did
not meet federal guidelines, with fire suppression capabilities,
emergency lighting, and backup power all needing improvements. Such
weaknesses in physical access controls increase the risk that sensitive
computing resources will inadvertently or deliberately be misused,
damaged, or destroyed.
Configuration Management Controls Were Not Always Implemented:
Configuration management controls ensure that only authorized and fully
tested software is placed in operation. These controls, which also
limit and monitor access to powerful programs and sensitive files
associated with computer operations, are important in providing
reasonable assurance that access controls are not compromised and that
the system will not be impaired. These policies, procedures, and
techniques help ensure that all programs and program modifications are
properly authorized, tested, and approved. Further, patch management is
an important element in mitigating the risks associated with software
vulnerabilities. Up-to-date patch installation could help mitigate
vulnerabilities associated with flaws in software code that could be
exploited to cause significant damage--including the loss of control of
entire systems--thereby enabling malicious individuals to read, modify,
or delete sensitive information or disrupt operations.
Twenty-one agencies demonstrated weaknesses in configuration management
controls. For instance, several agencies did not implement common
secure configuration policies across their systems, increasing the risk
of avoidable security vulnerabilities. In addition, agencies did not
effectively ensure that system software changes had been properly
authorized, documented, and tested, which increases the risk that
unapproved changes could occur without detection and that such changes
could disrupt a system's operations or compromise its integrity.
Agencies did not always monitor system configurations to prevent
extraneous services and other vulnerabilities from remaining undetected
and jeopardizing operations. At least six agencies did not consistently
update software on a timely basis to protect against known
vulnerabilities or did not fully test patches before applying them.
Without a consistent approach to updating, patching, and testing
software, agencies are at increased risk of exposing critical and
sensitive data to unauthorized and possibly undetected access.
Segregation of Duties Was Not Appropriately Enforced:
Segregation of duties refers to the policies, procedures, and
organizational structure that helps ensure that one individual cannot
independently control all key aspects of a process or computer-related
operation and thereby conduct unauthorized actions or gain unauthorized
access to assets or records. Proper segregation of duties is achieved
by dividing responsibilities among two or more individuals or groups.
Dividing duties among individuals or groups diminishes the likelihood
that errors and wrongful acts will go undetected because the activities
of one individual or group will serve as a check on the activities of
the other.
At least 14 agencies did not appropriately segregate information
technology duties. These agencies generally did not assign employee
duties and responsibilities in a manner that segregated incompatible
functions among individuals or groups of individuals. For instance, at
one agency, an individual who enters an applicant's data into a
financial system also had the ability to hire the applicant. At another
agency, 76 system users had the ability to create and approve purchase
orders. Without adequate segregation of duties, there is an increased
risk that erroneous or fraudulent actions can occur, improper program
changes can be implemented, and computer resources can be damaged or
destroyed.
Continuity of Operations Plans Have Shortcomings:
An agency must take steps to ensure that it is adequately prepared to
cope with the loss of operational capabilities due to an act of nature,
fire, accident, sabotage, or any other disruption. An essential element
in preparing for such a catastrophe is an up-to-date, detailed, and
fully tested continuity of operations plan. Such a plan should cover
all key computer operations and should include planning to ensure that
critical information systems, operations, and data such as financial
processing and related records can be properly restored if an emergency
or a disaster occurs. To ensure that the plan is complete and fully
understood by all key staff, it should be tested--including unannounced
tests--and test plans and results documented to provide a basis for
improvement. If continuity of operations controls are inadequate, even
relatively minor interruptions could result in lost or incorrectly
processed data, which could cause financial losses, expensive recovery
efforts, and inaccurate or incomplete mission-critical information.
Although agencies have reported increases in the number of systems for
which contingency plans have been tested, at least 17 agencies had
shortcomings in their continuity of operations plans. For example, one
agency's disaster recovery planning had not been completed.
Specifically, disaster recovery plans for three components of the
agency were in draft form and had not been tested. Another agency did
not include a business impact analysis in the contingency plan control,
which would assist in planning for system recovery. In another example,
supporting documentation for some of the functional tests at the agency
did not adequately support testing results for verifying readability of
backup tapes retrieved during the tests. Until agencies complete
actions to address these weaknesses, they are at risk of not being able
to appropriately recover systems in a timely manner from certain
service disruptions.
Agencywide Security Programs Were Not Fully Implemented:
An underlying cause for information security weaknesses identified at
federal agencies is that they have not yet fully or effectively
implemented agencywide information security programs. An agencywide
security program, as required by FISMA, provides a framework and
continuing cycle of activity for assessing and managing risk,
developing and implementing security policies and procedures, promoting
security awareness and training, monitoring the adequacy of the
entity's computer-related controls through security tests and
evaluations, and implementing remedial actions as appropriate. Without
a well-designed program, security controls may be inadequate;
responsibilities may be unclear, misunderstood, and improperly
implemented; and controls may be inconsistently applied. Such
conditions may lead to insufficient protection of sensitive or critical
resources.
Twenty-three agencies had not fully or effectively implemented
agencywide information security programs. Agencies often did not
adequately design or effectively implement policies for elements key to
an information security program. Weaknesses in agency information
security program activities, such as risk assessments, information
security policies and procedures, security planning, security training,
system testing and evaluation, and remedial action plans are described
next.
Risk Assessments:
In order for agencies to determine what security controls are needed to
protect their information resources, they must first identify and
assess their information security risks. Moreover, by increasing
awareness of risks, these assessments can generate support for policies
and controls.
Agencies have not fully implemented their risk assessment processes. In
addition, 14 major agencies had weaknesses in their risk assessments.
Furthermore, they did not always properly assess the impact level of
their systems or evaluate potential risks for the systems we reviewed.
For example, one agency had not yet finalized and approved its guidance
for completing risk assessments. In another example, the agency had not
properly categorized the risk to its system, because it had performed a
risk assessment without an inventory of interconnections to other
systems. Similarly, another agency had not completed risk assessments
for its critical systems and had not assigned impact levels. In another
instance, an agency had current risk assessments that documented
residual risk assessed and potential threats, and recommended
corrective actions for reducing or eliminating the vulnerabilities they
had identified. However, that agency had not identified many of the
vulnerabilities we found and had not subsequently assessed the risks
associated with them. As a result of these weaknesses, agencies may be
implementing inadequate or inappropriate security controls that do not
address the systems' true risk, and potential risks to these systems
may not be known.
Policies and Procedures:
According to FISMA, each federal agency's information security program
must include policies and procedures that are based on risk assessments
that cost-effectively reduce information security risks to an
acceptable level and ensure that information security is addressed
throughout the life cycle of each agency's information system. The term
'security policy' refers to specific security rules set up by the
senior management of an agency to create a computer security program,
establish its goals, and assign responsibilities. Because policy is
written at a broad level, agencies also develop standards, guidelines,
and procedures that offer managers, users, and others a clear approach
to implementing policy and meeting organizational goals.
Thirteen agencies had weaknesses in their information security policies
and procedures. For example, one agency did not have updated policies
and procedures for configuring operating systems to ensure they provide
the necessary detail for controlling and logging changes. Another
agency had not established adequate policies or procedures to implement
and maintain an effective departmentwide information security program
or to address key OMB privacy requirements. Agencies also exhibited
weaknesses in policies concerning security requirements for laptops,
user access privileges, security incidents, certification and
accreditation, and physical security. As a result, agencies have
reduced assurance that their systems and the information they contain
are sufficiently protected. Without policies and procedures that are
based on risk assessments, agencies may not be able to cost-effectively
reduce information security risks to an acceptable level and ensure
that information security is addressed throughout the life cycle of
each agency's information system.
Security Plans:
FISMA requires each federal agency to develop plans for providing
adequate information security for networks, facilities, and systems or
groups of systems. According to NIST 800-18, system security planning
is an important activity that supports the system development life
cycle and should be updated as system events trigger the need for
revision in order to accurately reflect the most current state of the
system. The system security plan provides a summary of the security
requirements for the information system and describes the security
controls in place or planned for meeting those requirements. NIST
guidance also indicates that all security plans should be reviewed and
updated, if appropriate, at least annually. Further, appendix III of
OMB Circular A-130 requires security plans to include controls for,
among other things, contingency planning and system interconnections.
System security plans were incomplete or out of date at several
agencies. For example, one agency had an incomplete security plan for a
key application. Another agency had only developed a system security
plan that covered two of the six facilities we reviewed, and the plan
was incomplete and not up-to-date. At another agency, 52 of the 57
interconnection security agreements listed in the security plan were
not current since they had not been updated within 3 years. Without
adequate security plans in place, agencies cannot be sure that they
have the appropriate controls in place to protect key systems and
critical information.
Specialized Training:
Users of information resources can be one of the weakest links in an
agency's ability to secure its systems and networks. Therefore, an
important component of an agency's information security program is
providing the required training so that users understand system
security risks and their own role in implementing related policies and
controls to mitigate those risks.
Several agencies had not ensured that all information security
employees and contractors, including those who have significant
information security responsibilities, had received sufficient
training. For example, users of one agency's IT systems had not been
trained to check for continued functioning of their encryption software
after installation. At another agency, officials stated that several of
its components had difficulty in identifying and tracking all employees
who have significant IT security responsibilities and thus were unable
to ensure that they received the specialized training necessary to
effectively perform their responsibilities. Without adequate training,
users may not understand system security risks and their own role in
implementing related policies and controls to mitigate those risks.
System Tests and Evaluations:
Another key element of an information security program is testing and
evaluating system controls to ensure that they are appropriate,
effective, and comply with policies. FISMA requires that agencies test
and evaluate the information security controls of their major systems
and that the frequency of such tests be based on risk, but occur no
less than annually. NIST requires agencies to ensure that the
appropriate officials are assigned roles and responsibilities for
testing and evaluating controls over their systems.
Agencies did not always implement policies and procedures for
performing periodic testing and evaluation of their information
security controls. For example, one agency had not adequately tested
security controls. Specifically, the tests of a major application and
the mainframe did not identify or discuss the vulnerabilities that we
had identified during our audit. The same agency's testing did not
reveal problems with the mainframe that could allow unauthorized users
to read, copy, change, delete, and modify data. In addition, although
testing requirements were stated in test documentation, the breadth and
depth of the test, as well as the results of the test, had not always
been documented. Also, agencies reported inconsistent testing of
security controls among components. Without conducting the appropriate
tests and evaluations, agencies have limited assurance that policies
and controls are appropriate and working as intended. Additionally,
there is an increased risk that undetected vulnerabilities could be
exploited to allow unauthorized access to sensitive information.
Remedial Action Processes and Plans:
FISMA requires that agencies' information security programs include a
process for planning, implementing, evaluating, and documenting
remedial actions to address any deficiencies in the information
security policies, procedures, and practices of the agency.
Since our 2007 FISMA report, we have continued to find weaknesses in
agencies' plans and processes for remedial actions. Agencies indicated
that they had corrected or mitigated weaknesses; however, our work
revealed that those weaknesses still existed. In addition, the
inspectors general at 14 of the 24 agencies reported weaknesses in the
plans to document remedial actions. For example, at several agencies,
the inspector general reported that weaknesses had been identified but
not documented in the remediation plans. Inspectors general further
reported that agency plans did not include all relevant information in
accordance with OMB instructions. We also found that deficiencies had
not been corrected in a timely manner. Without a mature process and
effective remediation plans, the risk increases that vulnerabilities in
agencies' systems will not be mitigated in an effective and timely
manner.
Until agencies effectively and fully implement agencywide information
security programs, federal data and systems will not be adequately
safeguarded to prevent disruption, unauthorized use, disclosure, and
modification. Further, until agencies implement our recommendations to
correct specific information security control weaknesses, their systems
and information will remain at increased risk of attack or compromise.
Opportunities Exist for Bolstering Federal Information Security:
In prior reports,[Footnote 16] we and inspectors general have made
hundreds of recommendations to agencies for actions necessary to
resolve prior significant control deficiencies and information security
program shortfalls. For example, we recommended that agencies correct
specific information security deficiencies related to user
identification and authentication, authorization, boundary protections,
cryptography, audit and monitoring, physical security, configuration
management, segregation of duties, and continuity of operations
planning. We have also recommended that agencies fully implement
comprehensive, agencywide information security programs by correcting
weaknesses in risk assessments, information security policies and
procedures, security planning, security training, system tests and
evaluations, and remedial actions. The effective implementation of
these recommendations will strengthen the security posture at these
agencies. Agencies have implemented or are in the process of
implementing many of our recommendations.
In March 2009, we reported on 12 key improvements suggested by a panel
of experts as being essential to improving our national cyber security
posture (see appendix III).[Footnote 17] The expert panel included
former federal officials, academics, and private-sector executives.
Their suggested improvements are intended to address many of the
information security vulnerabilities facing both private and public
organizations, including federal agencies. Among these improvements are
recommendations to develop a national strategy that clearly articulates
strategic objectives, goals, and priorities and to establish a
governance structure for strategy implementation.
Due to increasing cyber security threats, the federal government has
initiated several efforts to protect federal information and
information systems. Recognizing the need for common solutions to
improving security, the White House, OMB, and federal agencies have
launched or continued several governmentwide initiatives that are
intended to enhance information security at federal agencies. These key
initiatives are discussed here.
* 60-day cyber review: The National Security Council and Homeland
Security Council recently completed a 60-day interagency review
intended to develop a strategic framework to ensure that federal cyber
security initiatives are appropriately integrated, resourced, and
coordinated with Congress and the private sector. The resulting report
recommended, among other things, appointing an official in the White
House to coordinate the nation's cybersecurity policies and activities,
creating a new national cybersecurity strategy, and developing a
framework for cyber research and development.[Footnote 18]
* Comprehensive National Cybersecurity Initiative: In January 2008,
President Bush began to implement a series of initiatives aimed
primarily at improving the Department of Homeland Security and other
federal agencies' efforts to protect against intrusion attempts and
anticipate future threats.[Footnote 19] While these initiatives have
not been made public, the Director of National Intelligence stated that
they include defensive, offensive, research and development, and
counterintelligence efforts, as well as a project to improve public/
private partnerships.[Footnote 20]
* The Information Systems Security Line of Business: The goal of this
initiative, led by OMB, is to improve the level of information systems
security across government agencies and reduce costs by sharing common
processes and functions for managing information systems security.
Several agencies have been designated as service providers for IT
security awareness training and FISMA reporting.
* Federal Desktop Core Configuration: For this initiative, OMB directed
agencies that have Windows XP deployed and plan to upgrade to Windows
Vista operating systems to adopt the security configurations developed
by the National Institute of Standards and Technology, Department of
Defense, and Department of Homeland Security. The goal of this
initiative is to improve information security and reduce overall IT
operating costs.
* SmartBUY: This program, led by the General Services Administration,
is to support enterprise-level software management through the
aggregate buying of commercial software governmentwide in an effort to
achieve cost savings through volume discounts. The SmartBUY initiative
was expanded to include commercial off-the-shelf encryption software
and to permit all federal agencies to participate in the program. The
initiative is to also include licenses for information assurance.
* Trusted Internet Connections Initiative: This effort, directed by OMB
and led by the Department of Homeland Security, is designed to optimize
individual agency network services into a common solution for the
federal government. The initiative is to facilitate the reduction of
external connections, including Internet points of presence, to a
target of 50.
We currently have ongoing work that addresses the status, planning, and
implementation efforts of several of these initiatives.
Agencies Continue to Report Progress in Implementing Requirements:
Federal agencies reported increased compliance in implementing key
information security control activities for fiscal year 2008; however,
inspectors general at several agencies noted shortcomings with
agencies' implementation of information security requirements. OMB also
reported that agencies' were increasingly performing key activities.
Specifically, agencies reported increases in the number and percentage
of systems that had been certified and accredited,[Footnote 21] the
number and percentage of employees and contractors receiving security
awareness training, and the number and percentage of systems with
tested contingency plans. However, the number and percentage of systems
that had been tested and evaluated at least annually decreased slightly
and the number and percentage of employees who had significant security
responsibilities and had received specialized training decreased
significantly (see figure 6). Consistent with previous years,
inspectors general continued to identify weaknesses with the processes
and practices agencies have in place to implement FISMA requirements.
Although OMB took steps to clarify its reporting instructions to
agencies for preparing fiscal year 2008 reports, the instructions did
not request inspectors general to report on agencies' effectiveness of
key activities and did not always provide clear guidance to inspectors
general.
Figure 6: Reported Data for Selected Performance Metrics for 24 Major
Agencies:
[Refer to PDF for image: multiple vertical bar graph]
Metric: Security awareness training;
Fiscal year 2005: 81%;
Fiscal year 2006: 91%;
Fiscal year 2007: 84%;
Fiscal year 2008: 89%.
Metric: Specialized security training;
Fiscal year 2005: 82%;
Fiscal year 2006: 86%;
Fiscal year 2007: 90%;
Fiscal year 2008: 76%.
Metric: Periodic testing and evaluation;
Fiscal year 2005: 73%;
Fiscal year 2006: 88%;
Fiscal year 2007: 95%;
Fiscal year 2008: 93%.
Metric: Tested contingency plans;
Fiscal year 2005: 61%;
Fiscal year 2006: 77%;
Fiscal year 2007: 86%;
Fiscal year 2008: 91%.
Metric: Agencies with 96-100 percent complete inventories;
Fiscal year 2005: 54%;
Fiscal year 2006: 75%;
Fiscal year 2007: 79%;
Fiscal year 2008: 88%.
Metric: Certification and Accreditation;
Fiscal year 2005: 85%;
Fiscal year 2006: 88%;
Fiscal year 2007: 92%;
Fiscal year 2008: 96%.
Source: GAO analysis of IG and agency data.
[End of figure]
Agencies Report Mixed Progress in Implementing Security Awareness and
Specialized Training:
Federal agencies rely on their employees to protect the
confidentiality, integrity, and availability of the information in
their systems. It is critical for system users to understand their
security roles and responsibilities and to be adequately trained to
perform them. FISMA requires agencies to provide security awareness
training to personnel, including contractors and other users of
information systems that support agency operations and assets. This
training should explain information security risks associated with
their activities and their responsibilities in complying with agency
policies and procedures designed to reduce these risks. In addition,
agencies are required to provide appropriate training on information
security to personnel who have significant security responsibilities.
Agencies reported a slight increase in the percentage of employees and
contractors who received security awareness training. According to
agency reports, 89 percent of total employees and contractors had
received security awareness training in 2008 compared to 84 percent of
employees and contractors in 2007. While this change marks an
improvement between fiscal years 2007 and 2008, the percentage of
employees and contractors receiving security awareness training is
still below the 91 percent reported for 2006. In addition, seven
inspectors general reported disagreement with the percentage of
employees and contractors receiving security awareness training
reported by their agencies. Additionally, several inspectors general
reported specific weaknesses related to security awareness training at
their agencies; for example, one inspector general reported that the
agency lacked the ability to document and track which system users had
received awareness training, while another inspector general reported
that training did not cover the recommended topics.
Governmentwide, agencies reported a lower percentage of employees who
had significant security responsibilities who had received specialized
training. In fiscal year 2008, 76 percent of these employees had
received specialized training compared with 90 percent of these
employees in fiscal year 2007. Although the governmentwide percentage
decreased, the majority of the 24 agencies reported increasing or
unchanging percentages of employees receiving specialized training; 8
of the 24 agencies reported percentage decreases (see figure 7).
[See PDF for image]
[End of figure]
Figure 7: Specialized Training for 24 Major Agencies:
[Refer to PDF for image: vertical bar graph]
Increased: 12 agencies;
No change: 4 agencies;
Decreased: 8 agencies.
Source: GAO analysis of agency data.
[End of figure]
At least 12 inspectors general reported weaknesses related to
specialized security training. One of the inspectors general reported
that some groups did not have a training program for personnel who have
critical IT responsibilities and another inspector general reported
that the agency was unable to effectively track contractors who needed
specialized training. Decreases in the number of individuals receiving
specialized training at some federal agencies combined with continuing
deficiencies in training programs could limit the ability of agencies
to implement security measures effectively. Providing for the
confidentiality, integrity, and availability of information in today's
highly networked environment is not an easy or trivial task. The task
is made that much more difficult if each person who owns, uses, relies
on, or manages information and information systems does not know or is
not properly trained to carry out his or her specific responsibilities.
Weaknesses Reported in Testing and Evaluating System Security Controls:
Periodically evaluating the effectiveness of security policies and
controls and acting to address any identified weaknesses are
fundamental activities that allow an agency to manage its information
security risks proactively, rather than reacting to individual problems
ad hoc after a violation has been detected or an audit finding has been
reported. Management control testing and evaluation as part of a
program review is an additional source of information that can be
considered along with controls testing and evaluation in inspector
general and other independent audits to help provide a more complete
picture of an agency's security posture. FISMA requires that federal
agencies periodically test and evaluate the effectiveness of their
information security policies, procedures, and practices as part of
implementing an agencywide security program. This testing is to be
performed with a frequency depending on risk, but no less than
annually, and consists of testing management, and operational and
technical controls for every system identified in the agency's required
inventory of major information systems. For the annual FISMA reports,
OMB requires that agencies identify the number of agency and contractor
systems for which security controls have been tested.
In 2008, federal agencies reported testing and reviewing security
controls for 93 percent of their systems, a slight decline from 95
percent in 2007. Despite this percentage remaining above 90 percent,
inspectors general continued to identify deficiencies in agencies'
testing and evaluation of security controls for their systems. For
example, one agency's inspector general reported that systems owners
only reviewed documents to assess security controls and did not use
other assessment methods as suggested by NIST guidance, such as
selecting samples for testing and interviewing responsible parties.
Another inspector general identified instances where the agency did not
document the test results in the system's security test and evaluation
report. In addition, two inspectors general reported that their
agencies had not always tested the controls for their systems at least
annually. As a result, agencies may not have reasonable assurance that
controls have been implemented correctly, are operating as intended,
and are producing the desired outcome with respect to meeting the
security requirements of the agency.
Agencies Reported Testing More Contingency Plans, but Inspectors
General often Cited Weaknesses:
Continuity of operations planning ensures that agencies will be able to
perform essential functions during any emergency or situation that
disrupts normal operations. It is important that these plans be clearly
documented, communicated to potentially affected staff, and updated to
reflect current operations. In addition, testing contingency plans is
essential to determining whether the plans will function as intended in
an emergency situation. FISMA requires that agencywide information
security programs include plans and procedures to ensure continuity of
operations for information systems that support the operations and
assets of the agency. To show the status of implementing contingency
plans testing, OMB requires that agencies report the percentage of
systems that have contingency plans tested in accordance with policy
and guidance and requests that inspectors general also report this
percentage for the subset of systems the inspector general selected for
review.
Federal agencies reported that 91 percent of their systems had
contingency plans that had been tested, an increase from 86 percent
tested in fiscal year 2007. In addition, agencies reported progress in
the number of high-risk systems with tested contingency plans; 90
percent of these systems had tested contingency plans, an increase from
77 percent in fiscal year 2007. Agencies also reported 92 percent of
moderate-risk systems, 90 percent of low-risk systems, and 96 percent
of uncategorized systems with tested contingency plans.
While agencies reported higher percentages of tested contingency plans,
14 inspectors general reported weaknesses in their agencies'
contingency planning development and testing. For example, the
inspector general of one agency reported that contingency plans were
missing required elements. Regarding the testing of contingency plans,
another inspector general reported that the agency had not ensured that
the contractor had tested contingency plans or periodically conducted
quality testing. At another agency, the inspector general reported that
the agency had not performed a full, comprehensive disaster recovery
test to ensure that essential and critical systems and applications
could be recovered. Without developing contingency plans and ensuring
that they are tested, an agency increases its risk that it will not be
able to effectively recover and continue operations when an emergency
occurs.
Agencies Reported More Systems, but Deficiencies Were Identified in
Inventory Processes:
In fiscal year 2008, 24 major agencies reported a total of 10,587
systems, composed of 8,685 agency and 1,902 contractor systems as shown
by impact level in table 1. This represents a slight increase in the
total number of systems from fiscal year 2007. Specifically, the number
of agency systems decreased slightly and the number of contractor
systems increased by 40 percent.
Table 1: Total Number of Agency and Contractor Systems in FY 2007 and
FY 2008 by Impact Level:
Impact level: High;
Agency: FY07: 1,089;
Agency: FY08: 1,043;
Contractor: FY07: 121;
Contractor: FY08: 113;
Total: FY07: 1,210;
Total: FY08: 1,156.
Impact level: Moderate;
Agency: FY07: 3,264;
Agency: FY08: 3,556;
Contractor: FY07: 513;
Contractor: FY08: 535;
Total: FY07: 3,777;
Total: FY08: 4,091.
Impact level: Low;
Agency: FY07: 4,351;
Agency: FY08: 3,943;
Contractor: FY07: 334;
Contractor: FY08: 738;
Total: FY07: 4,685;
Total: FY08: 4,681.
Impact level: Not categorized;
Agency: FY07: 229;
Agency: FY08: 143;
Contractor: FY07: 384;
Contractor: FY08: 516;
Total: FY07: 613;
Total: FY08: 659.
Impact level: Total;
Agency: FY07: 8,933;
Agency: FY08: 8,685;
Contractor: FY07: 1,352;
Contractor: FY08: 1,902;
Total: FY07: 10,285;
Total: FY08: 10,587.
Source: GAO analysis of agency FY 2007 and FY 2008 FISMA reports.
[End of table]
Eleven inspectors general identified weaknesses in their agencies'
inventory process. For example, one inspector general agreed that its
agency's inventory accurately captured the number of active systems,
but indicated the inventory had also included systems in development,
which were not labeled as such and therefore could not be labeled and
inventoried accurately. Another inspector general reported that its
agency had not verified the inventory information reported by its
components, but had instead relied on an honor system of reporting.
Other weaknesses included contractor systems not listed in the
inventory or an agency not having interfaces to other systems
identified in its inventory. Without complete, accurate inventories,
agencies cannot efficiently maintain and secure their systems.
Agencies Reported Higher Percentages, but Inspectors General Highlight
Weaknesses in the Quality of Certifications and Accreditations:
OMB has continued to emphasize its long-standing policy of requiring a
management official to formally authorize (accredit) an information
system to process information and accept the risk associated with its
operation based on a formal evaluation (certification) of the system's
security controls. For the annual FISMA reports, OMB requires agencies
to identify the number of systems and impact levels authorized for
processing after completing certification and accreditation. OMB
requests that inspectors general also report this percentage for the
subset of systems reviewed. In addition, OMB asks the inspectors
general to rate the quality of the agency's certification and
accreditation process on a scale of failing to excellent. Inspectors
general may also indicate which aspects of the certification and
accreditation process have been considered in determining that rating,
such as the security plan, system impact level, system test and
evaluation, security control testing, incident handling, security
awareness training, configurations/patching, and other items. OMB's
annual reporting template also allows the inspectors general to comment
on their agencies' certification and accreditation processes.
Federal agencies reported higher percentages of systems that have been
certified and accredited than in 2007. For fiscal year 2008, 96 percent
of the agencies' systems were reported as being certified and
accredited, as compared with 92 percent in 2007. In addition, agencies
reported certifying and accrediting 98 percent of their high-risk
systems, an increase from 95 percent in 2007.
Although agencies continue to report higher percentages of certified
and accredited systems, inspectors general continue to report mixed
results in the quality of the certification and accreditation processes
at their agencies. To illustrate, 17 inspectors general reported
specific weaknesses in their agency's certification and accreditation
processes. For example, two inspectors general rated their agencies'
certification and accreditation process as poor or failing, while both
of those agencies reported that more than 90 percent of their systems
had been certified and accredited. In another example, the inspector
general of one agency stated that systems had been authorized to
operate without sufficient testing of the adequacy of mandatory
security controls. Inspectors general also cited other weaknesses, such
as the security plan not providing an adequate basis for certification
and accreditation and the risk assessment not identifying risks for
vulnerabilities exposed by previous testing. Without ensuring the
complete certification and accreditation of a system, agency officials
may not have the most complete, accurate, and trustworthy information
possible on the security status of their information systems in order
to make timely, credible, risk-based decisions on whether to authorize
operation of those systems.
Agencies Report Having Configuration Management Policies, but Did Not
Always Implement Them:
Risk-based policies and procedures cost-effectively reduce information
security risks to an acceptable level and ensure that information
security is addressed throughout the life cycle of each information
system in an information security program; a key aspect of these
policies and procedures is having minimally acceptable configuration
standards. Configuration standards can minimize the security risks
associated with specific software applications widely used in an agency
or across agencies. Because IT products are often intended for a wide
variety of audiences, restrictive security controls are usually not
enabled by default, making many of the products vulnerable before they
are used.
FISMA requires each agency to have policies and procedures that ensure
compliance with minimally acceptable system configuration requirements,
as determined by the agency. In fiscal year 2008, for the first time,
OMB required agencies to report on whether they had implemented
security configurations prescribed under OMB's memorandum for Windows
Vista and XP operating systems.[Footnote 22] For annual FISMA
reporting, OMB requires agencies to report whether they have an
agencywide security configuration policy; the extent to which they have
implemented common security configurations, including those available
from the NIST Web site, on applicable systems; and whether or not they
have adopted and implemented Windows XP and Vista standard
configurations, documented deviations, and implemented the settings.
OMB also requested inspectors general to report on their agencies'
implementation of these configurations.
Reporting by agencies and inspectors general illustrates that, while
many agencies had configuration policies, those policies had not always
been implemented. All 24 major federal agencies reported that they had
an agencywide security configuration policy. Even though 22 inspectors
general agreed that their agency had such a policy, they did not agree
that the implementation was always as high as the agencies had
reported. For example, 12 agencies reported implementing common
security configurations 96 to 100 percent of the time, but only 6
inspectors general reported this. In another example, only one agency
reported implementing common security configurations 0 to 50 percent of
the time, while seven inspectors general reported this level of
implementation for their agencies. In addition, only seven agencies and
six inspectors general reported that the agency had implemented
standard security settings. If minimally acceptable configuration
requirements policies are not properly implemented and applied to
systems, agencies will not have assurance that products have been
configured adequately to protect those systems, which could make them
more vulnerable.
Most Agencies Reported Following Security Incident Procedures, but
Weaknesses in Procedures Continue at Selected Agencies:
Although strong controls may not block all intrusions and misuse,
agencies can reduce the risks associated with such events if they take
steps to detect and respond to them before significant damage occurs.
Accounting for and analyzing security problems and incidents are also
effective ways for an agency to improve its understanding of threats
and the potential costs of security incidents, and doing so can
pinpoint vulnerabilities that need to be addressed so that they are not
exploited again.
FISMA requires that agencies' security programs include procedures for
detecting, reporting, and responding to security incidents. NIST states
that agencies are responsible for determining specific ways to meet
these requirements. For FISMA reporting, OMB requires agencies to state
whether or not the agency follows documented policies and procedures
for reporting incidents internally, to the US-Computer Emergency
Readiness Team (US-CERT), and to law enforcement. OMB also requires
agencies to indicate additional information about their incident
detection and monitoring capabilities, including what tools and
technologies the agency uses for incident detection. For FISMA
reporting, inspectors general are also requested to state whether or
not their agencies follow documented policies and procedures for
reporting incidents internally, to US-CERT, and to law enforcement.
All of the agencies reported that they had followed policies and
procedures for reporting incidents internally and to law enforcement
during fiscal year 2008, and only one agency reported that it had not
followed documented policies and procedures for reporting incidents to
US-CERT.
While the majority of inspectors general continue to report that their
agencies are following documented procedures for identifying and
reporting incidents internally as well as to US-CERT and to law
enforcement, there was a slight increase in the number of inspectors
general who reported that their agencies were not following these
procedures. Six inspectors general noted that their agency was not
following procedures for internal incident reporting compared to five
in fiscal year 2007. Four inspectors general noted that their agency
was not following reporting procedures to US-CERT compared to two in
2007, and two noted that their agency was not following reporting
procedures to law enforcement compared to one in 2007.
At least 12 inspectors general also noted specific weaknesses in
incident procedures such as a lack of fully documented policies and
procedures for responding to security incidents, a lack of control
procedures to ensure that audit trails were being maintained and
reviewed, and instances where incidents were not always handled and
reported in accordance with requirements. An incident response
capability is necessary for rapidly detecting incidents, minimizing
loss and destruction, mitigating the weaknesses that were exploited,
and restoring computing services. Without proper incident response and
documentation, agencies risk losing valuable information needed to
prevent future exploits and to understand the nature and cost of the
threats directed at them.
Agencies Report Improvements in Remedial Actions, but Processes Could
Be Strengthened:
Developing remedial action plans is key to ensuring that remedial
actions are taken to address significant deficiencies and reduce or
eliminate known vulnerabilities. These plans should list the weaknesses
and show the estimated resource needs and the status of corrective
actions. The plans are intended to assist agencies in identifying,
assessing, prioritizing, and monitoring the progress of corrective
efforts for security weaknesses found in programs and systems. FISMA
requires that agency information security programs include a process
for planning, implementing, evaluating, and documenting remedial
actions to address any deficiencies in information security policies,
procedures, and practices. In addition, OMB requires agencies to report
quarterly regarding their remediation efforts for all programs and
systems where a security weakness has been identified. It also requests
that inspectors general assess and report annually on whether their
agency has developed, implemented, and managed an agencywide process
for these plans.
Inspectors general reported an increase in the number of agencies that
had developed and implemented plans of action and milestones (POA&M)
when weaknesses were identified. For 2008, 13 inspectors general
reported that their agency had developed POA&Ms 96 to 100 percent of
the time when weaknesses were identified; up from 11 inspectors general
reporting this in 2007. However, many still cited weaknesses with their
agency's POA&M process. Several mentioned that their agency did not
always include weaknesses or vulnerabilities identified through
security controls testing or inspector general reviews in the POA&M.
They also reported that their agency did not always properly track
weaknesses because the status of individual weaknesses was not always
accurate. Without a sound remediation process, agencies cannot be
assured that information security weaknesses have been efficiently and
effectively corrected.
Inspectors General Report Using Professional Standards for Conducting
Independent Evaluations More, but Opportunities to Improve Consistency
Remain:
An increasing number of inspectors general reported conducting annual
independent evaluations in accordance with professional standards and
provided additional information about the effectiveness of their
agency's security programs. FISMA requires agency inspectors general or
their independent external auditors to perform an independent
evaluation of the information security programs and practices of the
agency to determine the effectiveness of the programs and practices. We
have previously reported[Footnote 23] that the annual inspector general
independent evaluations lacked a common approach and that the scope and
methodology of the evaluations varied across agencies. We noted that
there was an opportunity to improve these evaluations by conducting
them in accordance with audit standards or a common approach and
framework.
In fiscal year 2008, 16 of 24 inspectors general cited using
professional standards to perform the annual FISMA evaluations, up from
8 inspectors general who cited using standards the previous year. Of
the 16 inspectors general, 13 reported performing evaluations that were
in accordance with generally accepted government auditing standards,
while the other 3 indicated using the "Quality Standards for
Inspections" issued by the President's Council on Integrity and
Efficiency.[Footnote 24] The remaining eight inspectors general cited
using internally developed standards or did not indicate whether they
had performed their evaluations in accordance with professional
standards.
In addition, an increasing number of inspectors general provided
supplemental information about their agency's information security
policies and practices. To illustrate, 21 of 24 inspectors general
reported additional information about the effectiveness of their
agency's security controls and programs that was above and beyond what
was requested in the OMB template, an increase from the 18 who had
provided such additional information in their fiscal year 2007 reports.
The additional information included descriptions of significant control
deficiencies and weaknesses in security processes that provided
additional context to the agency's security posture.
Although inspectors general reported using professional standards more
frequently, their annual independent evaluations occasionally lacked
consistency. For example,
* Three inspectors general provided only template responses and did not
identify the scope and methodology of their evaluation. (These three
inspectors general were also among those who had not reported
performing their evaluation in accordance with professional standards.)
* Descriptions of the controls evaluated during the review as
documented in the scope and methodology sections differed. For example,
according to their FISMA reports, a number of inspectors general stated
that their evaluations included a review of policies and procedures,
whereas others did not indicate whether policies and procedures had
been reviewed. Additionally, multiple inspectors general also indicated
that technical vulnerability assessments had been conducted as part of
the review, whereas others did not indicate whether such an assessment
had been part of the review.
* Eleven inspectors general indicated that their FISMA evaluations
considered the results of previous information security reviews,
whereas 13 inspectors general did not indicate whether they considered
other information security work, if any.
The development and use of a common framework or adherence to auditing
standards could provide improved effectiveness, increased efficiency,
quality control, and consistency in inspector general assessments.
Opportunities Remain for OMB to Improve Annual Reporting and Oversight
of Agency Information Security Programs:
Although OMB has supported several governmentwide initiatives and
provided additional guidance to help improve information security at
agencies, opportunities remain for it to improve its annual reporting
and oversight of agency information security programs. FISMA specifies
that OMB, among other responsibilities, is to develop policies,
principles, standards, and guidelines on information security and
report to Congress not later than March 1 of each year on agencies'
implementation of FISMA. Each year, OMB provides instructions to
federal agencies and their inspectors general for preparing their FISMA
reports and then summarizes the information provided by the agencies
and the inspectors general in its report to Congress.
Over the past 4 years, we have reported[Footnote 25] that, while the
periodic reporting of performance measures for FISMA requirements and
related analysis provides valuable information on the status and
progress of agency efforts to implement effective security management
programs, shortcomings in OMB's reporting instructions limited the
utility of the annual reports. Accordingly, we recommended that OMB
improve reporting by clarifying reporting instructions; develop
additional metrics that measure control effectiveness; request
inspectors general to assess the quality of additional information
security processes such as system test and evaluation, risk
categorization, security awareness training, and incident reporting;
and require agencies to report on additional key security activities
such as patch management. Although OMB has taken some actions to
enhance its reporting instructions, it has not implemented most of the
recommendations, and thus further actions need to be taken to fully
address them.
In addition to the previously reported shortcomings, OMB's reporting
instructions for fiscal year 2008 did not sufficiently address several
processes key to implementing an agencywide security program and were
sometimes unclear. For example, the reporting instructions did not
request inspectors general to provide information on the quality or
effectiveness of agencies' processes for developing and maintaining
inventories, providing specialized security training, and monitoring
contractors. For these activities, inspectors general were requested to
report only on the extent to which agencies had implemented the
activity but not on the effectiveness of those activities. Providing
information on the effectiveness of the processes used to implement the
activities could further enhance the usefulness of the data for
management and oversight purposes.
OMB's guidance to inspectors general for rating agencies' certification
and accreditation processes was not clear. In its reporting
instructions, OMB requests inspectors general to rate their agency's
certification and accreditation process using the terms "excellent,"
"good," "satisfactory," "poor," or "failing." However, the reporting
instructions do not define or identify criteria for determining the
level of performance for each rating. OMB also requests inspectors
general to identify the aspect(s) of the certification and
accreditation process they included or considered in rating the quality
of their agency's process. Examples OMB included were security plan,
system impact level, system test and evaluation, security control
testing, incident handling, security awareness training, and security
configurations (including patch management). While this information is
helpful and provides insight on the scope of the rating, inspectors
general were not requested to comment on the quality or effectiveness
of these items. Additionally, not all inspectors general considered the
same aspects in reviewing the certification and accreditation process,
yet all were allowed to provide the same rating. Without clear
guidelines for rating these processes, OMB and Congress may not have a
consistent basis for comparing the progress of an agency over time or
against other agencies.
In its report to Congress for fiscal year 2008, OMB did not fully
summarize the findings from the inspectors general independent
evaluations or identify significant deficiencies in agencies'
information security practices. FISMA requires OMB to provide a summary
of the findings of agencies' independent evaluations and significant
deficiencies in agencies' information security practices. Inspectors
general often document their findings and significant information
security control deficiencies in reports that support their
evaluations. However, OMB did not summarize and present this
information in its annual report to Congress. Most of the inspectors
general information summarized in the annual report was taken from the
"yes" or "no" responses or from questions having a predetermined range
of percentages as stipulated by OMB's reporting template. Thus,
important information about the implementation of agency information
security programs and the vulnerabilities and risks associated with
federal information systems was not provided to Congress in OMB's
annual report. This information could be useful in determining whether
agencies are effectively implementing information security policies,
procedures, and practices. As a result, Congress may not be fully
informed about the state of federal information security.
OMB also did not approve or disapprove agencies' information security
programs. FISMA requires OMB to review agencies' information security
programs at least annually and approve or disapprove them. OMB
representatives informed us that they review agencies' FISMA reports
and interact with agencies whenever an issue arises that requires their
oversight. However, representatives stated that they do not explicitly
or publicly declare that an agency's information security program has
been approved or disapproved. As a result, a mechanism for establishing
accountability and holding agencies accountable for implementing
effective programs was not used.
Conclusions:
Weaknesses in information security controls continue to threaten the
confidentiality, integrity, and availability of the sensitive data
maintained by federal agencies. These weaknesses, including those for
access controls, configuration management, and segregation of duties,
leave federal agency systems and information vulnerable to external as
well as internal threats. The White House, OMB, and federal agencies
have initiated actions intended to enhance information security at
federal agencies. However, until agencies fully and effectively
implement information security programs and address the hundreds of
recommendations that we and agency inspectors general have made,
federal systems will remain at an increased and unnecessary risk of
attack or compromise.
Despite these weaknesses, federal agencies have continued to report
progress in implementing key information security requirements. While
NIST, inspectors general, and OMB have all made progress toward
fulfilling their statutory requirements, the current reporting process
does not produce information to accurately gauge the effectiveness of
federal information security activities. OMB's annual reporting
instructions did not cover key security activities and were not always
clear. Finally, OMB did not include key information about findings and
significant deficiencies identified by inspectors general in its
governmentwide report to Congress and did not approve or disapprove
agency information security programs. Shortcomings in reporting and
oversight can result in insufficient information being provided to
Congress and diminish its ability to monitor and assist federal
agencies in improving the state of federal information security.
Recommendations for Executive Action:
We recommend that the Director of the Office of Management and Budget
take the following four actions:
* Update annual reporting instructions to request inspectors general to
report on the effectiveness of agencies' processes for developing
inventories, monitoring contractor operations, and providing
specialized security training.
* Clarify and enhance reporting instructions to inspectors general for
certification and accreditation evaluations by providing them with
guidance on the requirements for each rating category.
* Include in OMB's report to Congress, a summary of the findings from
the annual independent evaluations and significant deficiencies in
information security practices.
* Approve or disapprove agency information security programs after
review.
Agency Comments and Our Evaluation:
In written comments on a draft of this report, the Federal Chief
Information Officer (CIO)[Footnote 26] generally agreed with our
overall assessment of information security at the agencies. He also
identified actions that OMB is taking to clarify its reporting guidance
and to consider more effective security performance metrics. These
actions are consistent with the intent of two of our recommendations,
that OMB clarify and enhance reporting instructions and request
inspectors general to report on additional measures of effectiveness.
The Federal CIO did not address our recommendation to include a summary
of the findings and significant security deficiencies in its report to
Congress and did not concur with GAO's conclusion that OMB does not
approve or disapprove agencies' information security management
programs on an annual basis. He indicated that OMB reviews all agency
and IG FISMA reports annually; reviews quarterly information on the
major agencies' security programs; and uses this information, and other
reporting, to evaluate agencies security programs. The Federal CIO
advised that concerns are communicated directly to the agencies. We
acknowledge that these are important oversight activities. However, as
we reported, OMB did not demonstrate that it approved or disapproved
agency information security programs, as required by FISMA.
Consequently, a mechanism for holding agencies accountable for
implementing effective programs is not being effectively used.
We are sending copies of this report to the Office of Management and
Budget and other interested parties. In addition, this report will be
available at no charge on the GAO Web site at [hyperlink,
http://www.gao.gov].
If you have any questions regarding this report, please contact me at
(202) 512-6244 or by e-mail at wilshuseng@gao.gov. Contact points for
our Office of Congressional Relations and Public Affairs may be found
on the last page of this report. Key contributors to this report are
listed in appendix IV.
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
In accordance with the Federal Information Security Management Act of
2002 (FISMA) requirement that the Comptroller General report
periodically to Congress, our objectives were to evaluate (1) the
adequacy and effectiveness of agencies' information security policies
and practices and (2) federal agency implementation of FISMA
requirements.
To assess the adequacy and effectiveness of agency information security
policies and practices, we analyzed our related reports issued from May
2007 through April 2009. We also reviewed and analyzed the information
security work and products of agency inspectors general. Further, we
reviewed and summarized weaknesses identified in our reports and that
of inspectors general using five major categories of information
security controls: (1) access controls, (2) configuration management
controls, (3) segregation of duties, (4) continuity of operations
planning, and (5) agencywide information security programs. Our reports
generally used the methodology contained in the Federal Information
System Controls Audit Manual.[Footnote 27] We also examined information
provided by the U.S. Computer Emergency Readiness Team (US-CERT) on
reported security incidents.
To assess the implementation of FISMA requirements, we reviewed and
analyzed the provisions of the act[Footnote 28] and the mandated annual
FISMA reports from the Office of Management and Budget (OMB), the
National Institute of Standards and Technology (NIST), and the CIOs and
IGs of 24 major federal agencies for fiscal years 2007 and 2008. We
also examined OMB's FISMA reporting instructions and other OMB and NIST
guidance.
We also held discussions with OMB representatives and agency officials
from the National Institute of Standards and Technology and the
Department of Homeland Security's US-CERT to further assess the
implementation of FISMA requirements. We did not verify the accuracy of
the agencies' responses; however, we reviewed supporting documentation
that agencies provided to corroborate information provided in their
responses. We did not include systems categorized as national security
systems in our review, nor did we review the adequacy or effectiveness
of the security policies and practices for those systems.
We conducted this performance audit from December 2008 to May 2009 in
accordance with generally accepted government auditing standards. Those
standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe that
the evidence obtained provides a reasonable basis for our findings and
conclusions based on our audit objectives.
[End of section]
Appendix II: Comments from the Office of Management and Budget:
Executive Office Of The President:
Office Of Management And Budget:
Washington, D.C. 20503:
June 23, 2009:
Gregory Wilshusen:
Director:
The Government Accountability Office:
441 G Street, Northwest:
Washington, D.C. 20548:
Dear Mr. Wilshusen:
Thank you for the opportunity to comment on your draft report,
"Information Security: Agencies Continue to Report Progress, but Need
to Mitigate Persistent Weaknesses" (GAO-09-546).
We agree that agencies have shown progress in compliance with the
Federal Information Security Management Act (FISMA) and that they need
to continue to work to improve their information security postures.
FISMA is the foundation of Federal information security activities, and
we appreciate GAO's thoughtful analysis. We also agree that improved
consistency in the reporting of the Inspectors General would contribute
to a clearer picture of information security in the Federal government.
OMB is committed to the vision of a secure Federal government, and we
are taking steps to make that vision a reality. We have initiated a
review of the language in the current reporting instructions to
identify and clarify confusion in the annual reporting. We are in
discussions with both the Information Security and Identity Management
Committee of the CIO Council and the Council of Inspectors General on
Integrity and Efficiency (CIGIE). Both entities have provided comments
and participated in discussions about the forthcoming FY 2009 guidance
to agencies. As part of this initiative, OMB has requested that the
CIGIE provide definitions for the categories used in the annual
reporting guidance or suggest alternatives.
In addition to clarifying of the current guidance, OMB is also
undertaking a thorough review of the current reporting metrics. While
these metrics may have made sense when FISMA was enacted, they are
largely focused on compliance and as such are trailing, rather than
leading, indicators. Instead, we need metrics that give insight into
agencies' security postures and possible vulnerabilities on an on-going
basis.
To evaluate new metrics, we are taking a collaborative approach. We are
working with the community of Federal agency Chief Information Officers
and Chief Information Security Officers, as well as the Inspectors
General and the National Institute of Standards and Technology, to
consider more effective security performance metrics--ones that show
current status and are predictive in nature. In addition, we are
reaching out to a broad array of organizations, across the public and
private sectors and academia.
In addition, the current annual reporting process is both manual and
cumbersome. Currently, the more than 160 agencies that report under
FISMA send in more than 200 spreadsheets. OMB is planning to move FISMA
reporting to an internet-enabled database for FY 2009 reporting. This
automation will allow the collection of more evaluative metrics, such
as performance metrics.
While OMB is fully agrees with GAO on the need for agencies to continue
to improve their information security and comply with FISMA, we do not
concur with GAO's conclusion that OMB does not review and approve or
disapprove agencies' information security management programs on an
annual basis. OMB reviews all agency and IG FISMA reports annually. For
the major agencies, OMB also receives and reviews quarterly information
on their security programs. OMB uses this information, and other
reporting, to evaluate agencies' security management programs. Concerns
are communicated directly to the agencies.
Our nation's security and economic prosperity depend on the stability
and integrity of Federal communications and information infrastructure.
Safeguarding these important interests will require balanced decision-
making that integrates and harmonizes our national and economic
security objectives with our privacy rights, civil liberties, and open
government. As a first step, the President directed a 60-day review of
cybersecurity policies and efforts throughout the government. OMB
worked closely with other White House offices on this review. The
President has accepted the recommendations of the review, including the
appointment of a presidential advisor for cybersecurity and the update
of the National Plan to Secure Cyberspace. OMB will continue to be
involved in and support these efforts.
Thank you again for the opportunity to comment on this draft report and
to discuss our work on the implementation of FISMA.
Sincerely,
Signed by:
Vivek Kundra:
Chief Information Officer:
[End of section]
Appendix III: Cybersecurity Experts Highlighted Key Improvements for
Strengthening the Nation's Cyber Security:
In March 2009, we convened a panel of experts to discuss how to improve
key aspects of the national cyber security strategy and its
implementation as well as other critical aspects of the strategy,
including areas for improvement. The experts, who included former
federal officials, academics, and private-sector executives,
highlighted 12 key improvements that are, in their view, essential to
improving the strategy and our national cyber security posture. These
improvements are in large part consistent with our previously mentioned
reports and extensive research and experience in this area.
Table 2: Key Improvements Needed to Strengthen the Nation's
Cybersecurity Posture:
Cyber security improvement: 1. Develop a national strategy that clearly
articulates strategic objectives, goals, and priorities;
Description: The strategy should, among other things, (1) include well-
defined strategic objectives, (2) provide understandable goals for the
government and the private sector (end game), (3) articulate cyber
priorities among the objectives, (4) provide a vision of what a secure
cyber space should be in the future, (5) seek to integrate federal
government capabilities, (6) establish metrics to gauge whether
progress is being made against the strategy, and (7) provide an
effective means for enforcing action and accountability when there are
progress shortfalls. According to expert panel members, the CNCI
provides a good set of tactical initiatives focused on improving
primarily federal cyber security; however, it does not provide
strategic objectives, goals, and priorities for the nation as a whole.
Cyber security improvement: 2. Establish White House responsibility and
accountability for leading and overseeing national cyber security
policy;
Description: The strategy makes the Department of Homeland Security
(DHS) the focal point for cyber security; however, according to expert
panel members, DHS has not met expectations and has not provided the
high-level leadership needed to raise cyber security to a national
focus. Accordingly, panelists stated that to be successful and to send
the message to the nation and cyber critical infrastructure owners that
cyber security is a priority, this leadership role needs to be elevated
to the White House. In addition, to be effective, the office must have,
among other things, commensurate authority--for example, over budgets
and resources--to implement and employ incentives that will encourage
action.
Cyber security improvement: 3. Establish a governance structure for
strategy implementation;
Description: The strategy establishes a public/private partnership
governance structure that includes 18 critical infrastructure sectors,
corresponding government and sector coordinating councils, and cross-
sector councils. However, according to panelists, this structure is
government-centric and largely relies on personal relationships to
instill trust to share information and take action. In addition,
although all sectors are not of equal importance in regard to their
cyber assets and functions, the structure treats all sectors and all
critical cyber assets and functions equally. To ensure effective
strategy implementation, experts stated that the partnership structure
should include a committee of senior government representatives (for
example, the Departments of Defense, Homeland Security, Justice, State,
and the Treasury and the White House) and private-sector leaders
representing the most critical cyber assets and functions. Expert panel
members also suggested that this committee's responsibilities should
include measuring and periodically reporting on progress in achieving
the goals, objectives, and strategic priorities established in the
national strategy and building consensus to hold involved parties
accountable when there are progress shortfalls.
Cyber security improvement: 4. Publicize and raise awareness about the
seriousness of the cyber security problem;
Description: Although the strategy establishes cyberspace security
awareness as a priority, experts stated that many national leaders in
business and government, including in Congress, who can invest
resources to address cyber security problems are generally not aware of
the severity of the risks to national and economic security posed by
the inadequacy of our nation's cyber security posture and the
associated intrusions made more likely by that posture. Expert panel
members suggested that an aggressive awareness campaign is needed to
raise the level of knowledge of leaders and the general populace that
protecting our information and systems from cyber attack is ongoing.
Cyber security improvement: 5. Create an accountable, operational cyber
security organization;
Description: DHS established the National Cyber Security Division
(within the Office of Cybersecurity and Communications) to be
responsible for leading national day-to-day cyber security efforts;
however, according to panelists, this has not enabled DHS to become the
national focal point as envisioned. Panel members stated that currently
the Department of Defense and other organizations within the
intelligence community that have significant resources and capabilities
have come to dominate federal efforts. They told us that there also
needs to be an independent cyber security organization that leverages
and integrates the capabilities of the private sector, civilian
government, law enforcement, military, intelligence community, and the
nation's international allies to address incidents against the nation's
critical cyber systems and functions. However, there was not a
consensus among our expert panel members regarding where this
organization should reside.
Cyber security improvement: 6. Focus more actions on prioritizing
assets and functions, assessing vulnerabilities, and reducing
vulnerabilities than on developing additional plans;
Description: The strategy recommends actions to identify critical cyber
assets and functions, but panelists stated that efforts to identify
which cyber assets and functions are most critical to the nation have
been insufficient. According to panel members, inclusion in cyber
critical infrastructure protection efforts and lists of critical assets
are currently based on the willingness of the person or entity
responsible for the asset or function to participate and not on
substantiated technical evidence. In addition, the current strategy
establishes vulnerability reduction as a key priority; however,
according to panelists, efforts to identify and mitigate known
vulnerabilities have been insufficient. They stated that greater
efforts should be taken to identify and eliminate common
vulnerabilities and that there are techniques available that should be
used to assess vulnerabilities in the most critical, prioritized cyber
assets and functions.
Cyber security improvement: 7. Bolster public/private partnerships
through an improved value proposition and use of incentives;
Description: While the strategy encourages action by owners and
operators of critical cyber assets and functions, panel members stated
that there are not adequate economic and other incentives (i.e., a
value proposition) for greater investment and partnering in cyber
security. Accordingly, panelists stated that the federal government
should provide valued services (such as offering useful threat or
analysis and warning information) or incentives (such as grants or tax
reductions) to encourage action by and effective partnerships with the
private sector. They also suggested that public and private sector
entities use means such as cost-benefit analyses to ensure the
efficient use of limited cyber security-related resources.
Cyber security improvement: 8. Focus greater attention on addressing
the global aspects of cyberspace;
Description: The strategy includes recommendations to address the
international aspects of cyber space but, according to panelists, the
United States is not addressing global issues impacting how cyber space
is governed and controlled. They added that, while other nations are
actively involved in developing treaties, establishing standards, and
pursuing international agreements (such as on privacy), the United
States is not aggressively working in a coordinated manner to ensure
that international agreements are consistent with U.S. practice and
that they address cyber security and cyber crime considerations. Panel
members stated that the United States should pursue a more coordinated,
aggressive approach so that there is a level playing field globally for
U.S. corporations and enhanced cooperation among government agencies,
including law enforcement. In addition, a panelist stated that the
United States should work towards building consensus on a global cyber
strategy.
Cyber security improvement: 9. Improve law enforcement efforts to
address malicious activities in cyberspace;
Description: The strategy calls for improving investigative
coordination domestically and internationally and promoting a common
agreement among nations on addressing cyber crime. According to one
panelist, some improvements in domestic law have been made (e.g.,
enactment of the PROTECT Our Children Act of 2008), but implementation
of this act is a work-in-process due to its recent passage. Panel
members also stated that current domestic and international law
enforcement efforts, including activities, procedures, methods, and
laws are too outdated and outmoded to adequately address the speed,
sophistication, and techniques of individuals and groups, such as
criminals, terrorists, and others who have malicious intent. Improved
law enforcement is essential to more effectively catch and prosecute
malicious individuals and groups and, with stricter penalties, deter
malicious behavior.
Cyber security improvement: 10. Place greater emphasis on cyber
security research and development, including consideration of how to
better coordinate government and private-sector efforts;
Description: While the strategy recommends actions to develop a
research and development agenda and coordinate efforts between the
government and private sector, experts stated that the United States is
not adequately focusing and funding research and development efforts to
address cyber security or to develop the next generation of cyber space
to include effective security capabilities. In addition, the research
and development efforts currently under way are not being well
coordinated between government and the private sector.
Cyber security improvement: 11. Increase the cadre of cyber security
professionals;
Description: The strategy includes efforts to increase the number and
skills of cyber security professionals but, according to panelists, the
results have not created sufficient numbers of professionals, including
information security specialists and cyber crime investigators. Expert
panel members stated that actions to increase the number of
professionals with adequate cyber security skills should include (1)
enhancing existing scholarship programs (e.g., Scholarship for Service)
and (2) making the cyber security discipline a profession through
testing and licensing.
Cyber security improvement: 12. Make the federal government a model for
cyber security, including using its acquisition function to enhance
cyber security aspects of products and services;
Description: The strategy establishes securing the government's cyber
space as a key priority and advocates using federal acquisition to
accomplish this goal. Although the federal government has taken steps
to improve the cyber security of agencies (e.g., beginning to implement
the CNCI initiatives), panelists stated that it still is not a model
for cyber security. Further, they said the federal government has not
made changes in its acquisition function and the training of government
officials in a manner that effectively improves the cyber security
capabilities of products and services purchased and used by federal
agencies.
Source: GAO.
[End of table]
[End of section]
Appendix IV: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gregory C. Wilshusen (202) 512-6244 or wilshuseng@gao.gov:
Staff Acknowledgments:
In addition to the individual named above, Charles Vrabel (Assistant
Director); Debra Conner; Larry Crosland; Sharhonda Deloach; Neil
Doherty; Kristi Dorsey; Rosanna Guererro; Nancy Glover; Rebecca Eyler;
Mary Marshall; and Jayne Wilson made key contributions to this report.
[End of section]
Related GAO Products:
Cybersecurity: Continued Federal Efforts Are Needed to Protect Critical
Systems and Information. [hyperlink,
http://www.gao.gov/products/GAO-09-835T]. Washington, D.C.: June 25,
2009.
Privacy and Security: Food and Drug Administration Faces Challenges in
Establishing Protections for Its Postmarket Risk Analysis System.
[hyperlink, http://www.gao.gov/products/GAO-09-355]. Washington, D.C.:
June 1, 2009.
Aviation Security: TSA Has Completed Key Activities Associated with
Implementing Secure Flight, but Additional Actions Are Needed to
Mitigate Risks. [hyperlink, http://www.gao.gov/products/GAO-09-292].
Washington, D.C.: May 13, 2009.
Information Security: Cyber Threats and Vulnerabilities Place Federal
Systems at Risk. [hyperlink, http://www.gao.gov/products/GAO-09-661T].
Washington, D.C.: May 5, 2009.
Freedom of Information Act: DHS Has Taken Steps to Enhance Its Program,
but Opportunities Exist to Improve Efficiency and Cost-Effectiveness.
[hyperlink, http://www.gao.gov/products/GAO-09-260]. Washington, D.C.:
March 20, 2009.
Information Security: Securities and Exchange Commission Needs to
Consistently Implement Effective Controls. [hyperlink,
http://www.gao.gov/products/GAO-09-203]. Washington, D.C.: March 16,
2009.
National Cyber Security Strategy: Key Improvements Are Needed to
Strengthen the Nation's Posture. [hyperlink,
http://www.gao.gov/products/GAO-09-432T]. Washington, D.C.: March 10,
2009.
Information Security: Further Actions Needed to Address Risks to Bank
Secrecy Act Data. [hyperlink, http://www.gao.gov/products/GAO-09-195].
Washington, D.C.: January 30, 2009.
Information Security: Continued Efforts Needed to Address Significant
Weaknesses at IRS. [hyperlink, http://www.gao.gov/products/GAO-09-136].
Washington, D.C.: January 9, 2009.
Nuclear Security: Los Alamos National Laboratory Faces Challenges in
Sustaining Physical and Cyber Security Improvements. [hyperlink,
http://www.gao.gov/products/GAO-08-1180T]. Washington, D.C.: September
25, 2008.
Critical Infrastructure Protection: DHS Needs to Better Address Its
Cyber Security Responsibilities. [hyperlink,
http://www.gao.gov/products/GAO-08-1157T]. Washington, D.C.: September
16, 2008.
Critical Infrastructure Protection: DHS Needs to Fully Address Lessons
Learned from Its First Cyber Storm Exercise. [hyperlink,
http://www.gao.gov/products/GAO-08-825]. Washington, D.C.: September 9,
2008.
Information Security: Actions Needed to Better Protect Los Alamos
National Laboratory's Unclassified Computer Network. [hyperlink,
http://www.gao.gov/products/GAO-08-1001]. Washington, D.C.: September
9, 2008.
Cyber Analysis and Warning: DHS Faces Challenges in Establishing a
Comprehensive National Capability. [hyperlink,
http://www.gao.gov/products/GAO-08-588]. Washington, D.C.: July 31,
2008.
Information Security: Federal Agency Efforts to Encrypt Sensitive
Information Are Under Way, but Work Remains. [hyperlink,
http://www.gao.gov/products/GAO-08-525]. Washington, D.C.: June 27,
2008.
Information Security: FDIC Sustains Progress but Needs to Improve
Configuration Management of Key Financial Systems. [hyperlink,
http://www.gao.gov/products/GAO-08-564]. Washington, D.C.: May 30,
2008.
Information Security: TVA Needs to Address Weaknesses in Control
Systems and Networks. [hyperlink,
http://www.gao.gov/products/GAO-08-526]. Washington, D.C.: May 21,
2008.
Information Security: TVA Needs to Enhance Security of Critical
Infrastructure Control Systems and Networks. [hyperlink,
http://www.gao.gov/products/GAO-08-775T]. Washington, D.C.: May 21,
2008.
Information Security: Progress Reported, but Weaknesses at Federal
Agencies Persist. [hyperlink, http://www.gao.gov/products/GAO-08-571T].
Washington, D.C.: March 12, 2008.
Information Security: Securities and Exchange Commission Needs to
Continue to Improve Its Program. [hyperlink,
http://www.gao.gov/products/GAO-08-280]. Washington, D.C.: February 29,
2008.
Information Security: Although Progress Reported, Federal Agencies Need
to Resolve Significant Deficiencies. [hyperlink,
http://www.gao.gov/products/GAO-08-496T]. Washington, D.C.: February
14, 2008.
Information Security: Protecting Personally Identifiable Information.
[hyperlink, http://www.gao.gov/products/GAO-08-343]. Washington, D.C.:
January 25, 2008.
Information Security: IRS Needs to Address Pervasive Weaknesses.
[hyperlink, http://www.gao.gov/products/GAO-08-211]. Washington, D.C.:
January 8, 2008.
Veterans Affairs: Sustained Management Commitment and Oversight Are
Essential to Completing Information Technology Realignment and
Strengthening Information Security. [hyperlink,
http://www.gao.gov/products/GAO-07-1264T]. Washington, D.C.: September
26, 2007.
Critical Infrastructure Protection: Multiple Efforts to Secure Control
Systems Are Under Way, but Challenges Remain. [hyperlink,
http://www.gao.gov/products/GAO-07-1036]. Washington, D.C.: September
10, 2007.
Information Security: Sustained Management Commitment and Oversight Are
Vital to Resolving Long-standing Weaknesses at the Department of
Veterans Affairs. [hyperlink, http://www.gao.gov/products/GAO-07-1019].
Washington, D.C.: September 7, 2007.
Information Security: Selected Departments Need to Address Challenges
in Implementing Statutory Requirements. [hyperlink,
http://www.gao.gov/products/GAO-07-528]. Washington, D.C.: August 31,
2007.
Information Security: Despite Reported Progress, Federal Agencies Need
to Address Persistent Weaknesses. [hyperlink,
http://www.gao.gov/products/GAO-07-837]. Washington, D.C.: July 27,
2007.
Information Security: Homeland Security Needs to Immediately Address
Significant Weaknesses in Systems Supporting the US-VISIT Program.
[hyperlink, http://www.gao.gov/products/GAO-07-870]. Washington, D.C.:
July 13, 2007.
Information Security: Homeland Security Needs to Enhance Effectiveness
of Its Program. [hyperlink, http://www.gao.gov/products/GAO-07-1003T].
Washington, D.C.: June 20, 2007.
Information Security: Agencies Report Progress, but Sensitive Data
Remain at Risk. [hyperlink, http://www.gao.gov/products/GAO-07-935T].
Washington, D.C.: June 7, 2007.
Information Security: Federal Deposit Insurance Corporation Needs to
Sustain Progress Improving Its Program. [hyperlink,
http://www.gao.gov/products/GAO-07-351]. Washington, D.C.: May 18,
2007.
[End of section]
Footnotes:
[1] The 24 major departments and agencies (agencies) are the
Departments of Agriculture, Commerce, Defense, Education, Energy,
Health and Human Services, Homeland Security, Housing and Urban
Development, the Interior, Justice, Labor, State, Transportation, the
Treasury, and Veterans Affairs; the Environmental Protection Agency,
General Services Administration, National Aeronautics and Space
Administration, National Science Foundation, Nuclear Regulatory
Commission, Office of Personnel Management, Small Business
Administration, Social Security Administration, and U.S. Agency for
International Development.
[2] Most recently, GAO, High-Risk Series: An Update, [hyperlink,
http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January
2009).
[3] FISMA was enacted as title III, E-Government Act of 2002, Pub. L.
No. 107-347, 116 Stat. 2899, 2946 (Dec. 17, 2002).
[4] GAO, Federal Information System Controls Audit Manual (FISCAM),
[hyperlink, http://www.gao.gov/products/GAO-09-232G] (Washington, D.C.:
February 2009).
[5] GAO, Executive Guide: Information Security Management: Learning
from Leading Organizations, [hyperlink,
http://www.gao.gov/products/GAO/AIMD-98-68] (Washington, D.C.: May
1998).
[6] A material weakness is a significant deficiency, or combination of
significant deficiencies, that results in more than a remote likelihood
that a material misstatement of the financial statements will not be
prevented or detected. A significant deficiency is a control
deficiency, or combination of control deficiencies, that adversely
affects the entity's ability to initiate, authorize, record, process,
or report financial data reliably in accordance with generally accepted
accounting principles such that there is more than a remote likelihood
that a misstatement of the entity's financial statements that is more
than inconsequential will not be prevented or detected. A control
deficiency exists when the design or operation of a control does not
allow management or employees, in the normal course of performing their
assigned functions, to prevent or detect misstatements on a timely
basis.
[7] FMFIA, Pub. L. No. 97-255, 96 Stat. 814 (Sept. 8, 1982), now
codified at 31 U.S.C. § 3512, requires agencies to report annually to
the President and Congress on the effectiveness of internal controls
and any identified material weaknesses in those controls. Per OMB, for
the purposes of FMFIA reporting, a material weakness also encompasses
weaknesses found in program operations and compliance with applicable
laws and regulations. Material weaknesses for FMFIA reporting are
determined by management, whereas material weaknesses reported as part
of a financial statement audit are determined by independent auditors.
[8] The Reports Consolidation Act of 2000, Pub. L. No. 106-531, 114
Stat. 2537 (Nov. 22, 2000), requires inspectors general to include in
their agencies' performance and accountability reports a statement that
summarizes what they consider to be the most serious management and
performance challenges facing their agencies and briefly assesses their
agencies' progress in addressing those challenges. 31 U.S.C. § 3516(d).
[9] GAO, Information Security: Securities and Exchange Commission Needs
to Consistently Implement Effective Controls, [hyperlink,
http://www.gao.gov/products/GAO-09-203] (Washington, D.C.: Mar. 16,
2009).
[10] GAO, Information Security: Continued Efforts Needed to Address
Significant Weaknesses at IRS, [hyperlink,
http://www.gao.gov/products/GAO-09-136] (Washington, D.C.: Jan. 9,
2009).
[11] GAO, Information Security: Actions Needed to Better Protect Los
Alamos National Laboratory's Unclassified Computer Network, [hyperlink,
http://www.gao.gov/products/GAO-08-1001] (Washington, D.C.: Sept. 9,
2008).
[12] GAO, Information Security: TVA Needs to Address Weaknesses in
Control Systems and Networks, [hyperlink,
http://www.gao.gov/products/GAO-08-526] (Washington, D.C.: May 21,
2008) and Information Security: TVA Needs to Enhance Security of
Critical Infrastructure Controls Systems and Networks, [hyperlink,
http://www.gao.gov/products/GAO-08-755T] (Washington, D.C.: May 21,
2008).
[13] GAO, Information Security: Homeland Security Needs to Immediately
Address Significant Weaknesses in Systems Supporting the US-VISIT
Program, [hyperlink, http://www.gao.gov/products/GAO-07-870]
(Washington, D.C.: July 13, 2007).
[14] GAO, Information Security: Despite Reported Progress, Federal
Agencies Need to Address Persistent Weaknesses, [hyperlink,
http://www.gao.gov/products/GAO-07-837] (Washington, D.C.: July 27,
2007).
[15] Cryptography is used to secure transactions by providing ways to
ensure data confidentiality, data integrity, authentication of the
message's originator, electronic certification of data, and
nonrepudiation (proof of the integrity and origin of data that can be
verified by a third party).
[16] See related GAO products for a list of our recent reports on
information security.
[17] GAO, National Cybersecurity Strategy: Key Improvements Are Needed
to Strengthen the Nation's Posture, [hyperlink,
http://www.gao.gov/products/GAO-09-432T] (Washington, D.C.: Mar. 10,
2009).
[18] The White House, Cyberspace Policy Review: Assuring a Trusted and
Resilient Information and Communications Infrastructure (Washington,
D.C.: May 29, 2009).
[19] The White House, National Security Presidential Directive 54/
Homeland Security Presidential Directive 23 (Washington, D.C.: Jan. 8,
2008).
[20] Statement of the Director of National Intelligence before the
Senate Select Committee on Intelligence, Annual Threat Assessment of
the Intelligence Community for the Senate Select Committee on
Intelligence (Feb. 12, 2009).
[21] Certification is a comprehensive assessment of management,
operational, and technical security controls in an information system,
made in support of security accreditation, to determine the extent to
which the controls are implemented correctly, operating as intended and
producing the desired outcome with respect to meeting the security
requirements for the system. Accreditation is the official management
decision to authorize operation of an information system and to
explicitly accept the risk to agency operations based on implementation
of controls.
[22] OMB, Memorandum M-08-22, Guidance on the Federal Desktop Core
Configuration (Washington, D.C.: August 2008).
[23] [hyperlink, http://www.gao.gov/products/GAO-07-837] and GAO,
Information Security: Progress Reported, but Weaknesses at Federal
Agencies Persist, [hyperlink, http://www.gao.gov/products/GAO-08-571T]
(Washington, D.C.: Mar. 12, 2008).
[24] The President's Council on Integrity and Efficiency was
established by executive order to address integrity, economy, and
effectiveness issues that transcend individual government agencies and
increase the professionalism and effectiveness of inspector general
personnel throughout government. The Inspector General Reform Act of
2008 combined the council with the Executive Council on Integrity and
Efficiency to create the Council of Inspectors General on Integrity and
Efficiency.
[25] GAO, Information Security: Weaknesses Persist at Federal Agencies
Despite Progress Made in Implementing Statutory Requirements,
[hyperlink, http://www.gao.gov/products/GAO-05-552] (Washington, D.C.:
July 15, 2005); [hyperlink, http://www.gao.gov/products/GAO-07-837];
and [hyperlink, http://www.gao.gov/products/GAO-08-571T].
[26] On March 5, 2009, the President named a Federal Chief Information
Officer at the White House to direct the policy and strategic planning
of federal information technology investments and be responsible for
oversight of federal technology spending. The Federal CIO also
establishes and oversees enterprise architecture to ensure system
interoperability and information sharing and ensure information
security and privacy across the federal government.
[27] GAO, Federal Information System Controls Audit Manual, [hyperlink,
http://www.gao.gov/products/GAO-09-232G] (Washington, D.C.: February
2009).
[28] Pub. L. No. 107-347, title III, 116 Stat. 2899, 2946 (Dec. 17,
2002).
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: