Information Security

Agencies Need to Implement Federal Desktop Core Configuration Requirements Gao ID: GAO-10-202 March 12, 2010

The increase in security incidents and continuing weakness in security controls on information technology systems at federal agencies highlight the continuing need for improved information security. To standardize and strengthen agencies' security, the Office of Management and Budget (OMB), in collaboration with the National Institute of Standards and Technology (NIST), launched the Federal Desktop Core Configuration (FDCC) initiative in 2007. GAO was asked to (1) identify the goals, objectives, and requirements of the initiative; (2) determine the status of actions federal agencies have taken, or plan to take, to implement the initiative; and (3) identify the benefits, challenges, and lessons learned in implementing this initiative. To accomplish this, GAO reviewed policies, plans, and other documents at the 24 major executive branch agencies; reviewed OMB and NIST guidance and documentation; and interviewed officials.

The goals of FDCC are to improve information security and reduce overall information technology operating costs across the federal government by, among other things, providing a baseline level of security through the implementation of a set of standard configuration settings on government-owned desktop and laptop computers (i.e., workstations). To carry out the initiative, OMB required that executive branch agencies take several actions, including: (1) submit an implementation plan to OMB; (2) apply all configuration settings to all applicable workstations by February 2008; (3) document any deviations from the prescribed settings and have them approved by an accrediting authority; (4) acquire a specified NIST-validated tool for monitoring implementation of the settings; (5) ensure that future information technology acquisitions comply with the configuration settings; and (6) submit a status report to NIST. While agencies have taken actions to implement these requirements, none of the agencies has fully implemented all configuration settings on their applicable workstations. Specifically, most plans submitted to OMB did not address all key implementation activities; none of the agencies implemented all of the prescribed configuration settings on all applicable workstations, though several implemented agency-defined subsets of the settings; several agencies did not fully document their deviations from the settings or establish a process for approving them; six agencies did not acquire and make use of the required tool for monitoring FDCC compliance; many agencies did not incorporate language into contracts to ensure that future information technology acquisitions comply with FDCC; and many agencies did not describe plans for eliminating or mitigating their deviations in their compliance reports to NIST. Until agencies ensure that they are meeting these FDCC requirements, the effectiveness of the initiative will be limited. FDCC has the potential to increase agencies' information security by requiring stricter security settings on workstations than those that may have been previously in place and standardizing agencies' management of workstations, making it easier to manage changes such as applying updates or patches. In addition, a number of lessons can be learned from the management and implementation of the FDCC initiative which, if considered, could improve the implementation of future versions of FDCC or other configuration efforts. At the same time, agencies face several ongoing challenges in fully complying with FDCC requirements, including retrofitting applications and systems in their existing environments to comply with the settings, assessing the risks associated with deviations, and monitoring workstations to ensure that the settings are applied and functioning properly. As OMB moves forward with the initiative, understanding the lessons learned as well as the ongoing challenges agencies face will be essential in order to ensure the initiative is successful in ensuring public confidence in the confidentiality, integrity, and availability of government information.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Gregory C. Wilshusen Team: Government Accountability Office: Information Technology Phone: (202) 512-6244


GAO-10-202, Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements This is the accessible text file for GAO report number GAO-10-202 entitled 'Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements' which was released on April 12, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: March 2010: Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements: GAO-10-202: GAO Highlights: Highlights of GAO-10-202, a report to congressional requesters. Why GAO Did This Study: The increase in security incidents and continuing weakness in security controls on information technology systems at federal agencies highlight the continuing need for improved information security. To standardize and strengthen agencies‘ security, the Office of Management and Budget (OMB), in collaboration with the National Institute of Standards and Technology (NIST), launched the Federal Desktop Core Configuration (FDCC) initiative in 2007. GAO was asked to (1) identify the goals, objectives, and requirements of the initiative; (2) determine the status of actions federal agencies have taken, or plan to take, to implement the initiative; and (3) identify the benefits, challenges, and lessons learned in implementing this initiative. To accomplish this, GAO reviewed policies, plans, and other documents at the 24 major executive branch agencies; reviewed OMB and NIST guidance and documentation; and interviewed officials. What GAO Found: The goals of FDCC are to improve information security and reduce overall information technology operating costs across the federal government by, among other things, providing a baseline level of security through the implementation of a set of standard configuration settings on government-owned desktop and laptop computers (i.e., workstations). To carry out the initiative, OMB required that executive branch agencies take several actions, including: (1) submit an implementation plan to OMB; (2) apply all configuration settings to all applicable workstations by February 2008; (3) document any deviations from the prescribed settings and have them approved by an accrediting authority; (4) acquire a specified NIST-validated tool for monitoring implementation of the settings; (5) ensure that future information technology acquisitions comply with the configuration settings; and (6) submit a status report to NIST. While agencies have taken actions to implement these requirements, none of the agencies has fully implemented all configuration settings on their applicable workstations. Specifically, most plans submitted to OMB did not address all key implementation activities; none of the agencies implemented all of the prescribed configuration settings on all applicable workstations, though several implemented agency-defined subsets of the settings; several agencies did not fully document their deviations from the settings or establish a process for approving them; six agencies did not acquire and make use of the required tool for monitoring FDCC compliance; many agencies did not incorporate language into contracts to ensure that future information technology acquisitions comply with FDCC; and many agencies did not describe plans for eliminating or mitigating their deviations in their compliance reports to NIST. Until agencies ensure that they are meeting these FDCC requirements, the effectiveness of the initiative will be limited. FDCC has the potential to increase agencies‘ information security by requiring stricter security settings on workstations than those that may have been previously in place and standardizing agencies‘ management of workstations, making it easier to manage changes such as applying updates or patches. In addition, a number of lessons can be learned from the management and implementation of the FDCC initiative which, if considered, could improve the implementation of future versions of FDCC or other configuration efforts. At the same time, agencies face several ongoing challenges in fully complying with FDCC requirements, including retrofitting applications and systems in their existing environments to comply with the settings, assessing the risks associated with deviations, and monitoring workstations to ensure that the settings are applied and functioning properly. As OMB moves forward with the initiative, understanding the lessons learned as well as the ongoing challenges agencies face will be essential in order to ensure the initiative is successful in ensuring public confidence in the confidentiality, integrity, and availability of government information. What GAO Recommends: GAO recommends that OMB, among other things, issue guidance on assessing the risks of deviations and monitoring compliance with FDCC. GAO also recommends that 22 agencies take steps to fully implement FDCC requirements. These agencies generally concurred with GAO‘s recommendations. To view the full product, including the scope and methodology, click on [hyperlink, http://www.gao.gov/products/GAO-10-202]. For more information, contact Gregory C. Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. [End of section] Contents: Letter: Background: FDCC Aims to Improve Agencies' Information Security and Reduce IT Operating Costs: Agencies Have Not Fully Implemented FDCC Settings, but Most Have Complied with Other Requirements: Implementing FDCC Resulted in Benefits and Lessons Learned, but Agencies Continue to Face Challenges in Meeting Requirements: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: Percentage of Agency Workstations with FDCC Settings Implemented as of September 2009: Appendix III: Recommendations to Departments and Agencies: Appendix IV: Comments from the U.S. Department of Agriculture: Appendix V: Comments from the Department of Commerce: Appendix VI: Comments from the Department of Defense: Appendix VII: Comments from the General Services Administration: Appendix VIII: Comments from the Department of Homeland Security: Appendix IX: Comments from the Department of Housing and Urban Development: Appendix X: Comments from the Department of the Interior: Appendix XI: Comments from the Department of Labor: Appendix XII: Comments from the National Aeronautics and Space Administration: Appendix XIII: Comments from the Office of Personnel Management: Appendix XIV: Comments from the Social Security Administration: Appendix XV: Comments from the Department of the Treasury: Appendix XVI: Comments from the U.S. Agency for International Development: Appendix XVII: Comments from the Department of Veterans Affairs: Appendix XVIII: GAO Contact and Staff Acknowledgments: Tables: Table 1: Number of Agency FDCC Implementation Plans That Addressed Required Actions: Table 2: Range of the Number of Less-Stringent Deviations with the Corresponding Number of Agencies: Table 3: Ten Most Common Less-Stringent FDCC Deviations at Federal Agencies: Table 4: Status of Agency Compliance with Deviation Guidance: Table 5: Status of Agency Acquisition and Use of a NIST-validated SCAP Tool: Table 6: Agency Incorporation of Language into Contracts: Table 7: Agency-Reported Percentages of Workstations with FDCC Settings Implemented as of September 2009: Figure: Figure 1: Agency-Reported Implementation of FDCC Baseline as of September 2009: Abbreviations: FDCC: Federal Desktop Core Configuration: FISMA: Federal Information Security Management Act of 2002: IT: information technology: NIST: National Institute of Standards and Technology: OMB: Office of Management and Budget: SCAP: Security Content Automation Protocol: [End of section] United States Government Accountability Office: Washington, DC 20548: March 12, 2010: The Honorable Joseph I. Lieberman: Chairman: The Honorable Susan M. Collins: Ranking Member: Committee on Homeland Security and Governmental Affairs: United States Senate: The Honorable Thomas R. Carper: Chairman: Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security: Committee on Homeland Security and Governmental Affairs: United States Senate: The frequency of information security incidents at federal agencies, the wide availability of hacking tools, and steady advances in the sophistication and effectiveness of attack technology all contribute to the urgency of protecting the federal government's information and systems. In addition to these threats, we have consistently identified significant weaknesses in the security controls on federal systems, including desktops and laptops (i.e., workstations) that have impacted the confidentiality, integrity, and availability of government information. Due to the persistent nature of these vulnerabilities and associated risks, we have designated information security as a governmentwide high-risk issue since 1997 in our biennial reports to Congress.[Footnote 1] In an attempt to standardize and thereby strengthen information security, the Office of Management and Budget (OMB) launched the Federal Desktop Core Configuration (FDCC) initiative in March 2007. The initiative mandated that federal agencies implement standardized configuration settings on workstations with Windows XP or Vista operating systems. In view of the importance of FDCC in improving the ability of the federal government to safeguard its systems and protect sensitive information, you asked us to (1) identify the goals, objectives, and requirements for the initiative; (2) determine the status of actions federal agencies have taken, or plan to take, to implement the initiative; and (3) identify the benefits, challenges, and lessons learned in implementing this initiative. We conducted our review at each of the 24 major federal agencies[Footnote 2] covered by the Chief Financial Officers Act, [Footnote 3] where we obtained and analyzed policies, plans, status reports, and agency descriptions of challenges relative to the requirements of the initiative. We also developed a data collection instrument to gather information on the status of FDCC implementation at the 24 agencies as of September 2009. We compared agency documentation and descriptions of challenges with OMB program requirements and relevant National Institute of Standards and Technology (NIST) guidance, which we confirmed through interviews with OMB and NIST officials. We also met with staff from all 24 Offices of the Inspector General regarding their audit work performed relative to the initiative to obtain information on their audit methodology, findings, and related documentation. Based on our review of the adequacy of work performed, we have sufficient assurance to rely on work completed by the inspectors general in the context of our audit objective related to whether the agency had documented deviations and had incorporated language related to use of FDCC settings into its contracts. We conducted this performance audit from December 2008 to March 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Further details of our objectives, scope, and methodology are included in appendix I. Background: Cyber-based threats to federal systems and critical infrastructure are evolving and growing. These threats can be intentional or unintentional, targeted or non-targeted, and can come from a variety of sources, including criminals, terrorists, and other adversarial groups, as well as hackers and disgruntled employees. These potential attackers have a variety of techniques at their disposal, which can vastly enhance the reach and impact of their actions. For example, cyber attackers do not need to be physically close to their targets, their attacks can cross state and national borders, and they can preserve their anonymity. Further, the growing interconnectivity among different types of information systems presents increasing opportunities for such attacks. Reports of security incidents from federal agencies are on the rise, increasing by more than 200 percent from fiscal year 2006 to fiscal year 2008.[Footnote 4] In February 2009, the Director of National Intelligence testified that foreign nations and criminals had targeted government and private sector networks to potentially disrupt or destroy them, and that terrorist groups had expressed a desire to use cyber attacks as a means to target the United States.[Footnote 5] As recently as July 2009, media accounts reported that a widespread and coordinated attack over the course of several days targeted Web sites operated by major government agencies, including the Departments of Homeland Security and Defense, the Federal Aviation Administration, and the Federal Trade Commission, causing disruptions to the public availability of government information. Such attacks highlight the importance of developing a concerted response to safeguard federal information systems. Previously Reported Weaknesses in Agency Information Security Controls: Compounding the growing number and kinds of threats, we--along with agencies and their inspectors general--have identified significant weaknesses in the security controls on federal information systems,[Footnote 6] which have resulted in pervasive vulnerabilities. These include deficiencies in the security of financial systems and information and vulnerabilities in other critical federal information systems and networks. These weaknesses exist in all major categories of information security controls at federal agencies; for example, in fiscal year 2008, weaknesses were reported in such controls at 23 of the 24 major agencies. Specifically, agencies did not consistently authenticate users to prevent unauthorized access to systems; apply encryption to protect sensitive data; and log, audit, and monitor security-relevant events, among other actions. Our recent work focusing on specific agencies has also revealed security weaknesses, as illustrated by the following examples: * In 2009, we reported that three National Aeronautics and Space Administration centers had not, among other things, sufficiently restricted system access and privileges to only those users that needed access to perform their assigned duties, appropriately implemented encryption to safeguard sensitive information, and expeditiously applied a critical operating system patch or patches for a number of general third-party applications.[Footnote 7] At the same time, the agency experienced numerous cyber attacks and malicious software infections, thereby exposing critical and sensitive data to unauthorized access, disclosure, and manipulation. We recommended that the agency take steps to mitigate these weaknesses and fully implement a comprehensive information security program. * In the same year, we reported that the Financial Crimes Enforcement Network, a bureau within the Department of the Treasury, had not consistently implemented effective password controls or effectively controlled user identification and authentication.[Footnote 8] As a result, there was increased risk that malicious individuals could gain inappropriate access to sensitive systems and data. We recommended that the agency take steps to fully implement an agencywide security program. * In 2008, we reported that although the Department of Energy's Los Alamos National Laboratory--one of the nation's weapons laboratories-- had implemented measures to enhance the information security of its unclassified network, there were still vulnerabilities in monitoring and auditing compliance with security policies and controlling and documenting changes to a computer system's hardware and software. [Footnote 9] * Finally, we reported in 2007 that the Department of Homeland Security had significant weaknesses in computer security controls intended to protect the information systems used to support its U.S. Visitor and Immigration Status Indicator Technology program for border security.[Footnote 10] For example, the department had not implemented controls to effectively prevent, limit, and detect access to computer networks, systems, and information. Specifically, it had not provided adequate logging or user accountability for the mainframe, workstations, or servers and had not consistently maintained secure configurations on the application servers and workstations at a key data center and points of entry. In each of these cases, we made recommendations for strengthening or fully implementing agencies' information security programs. Federal Law Assigns Responsibility to OMB, NIST, and Agencies for Information Security: In addition to the responsibilities of individual agencies, OMB and NIST play key roles in ensuring the security of federal systems and information. Under the Federal Information Security Management Act of 2002 (FISMA),[Footnote 11] OMB is responsible for developing and overseeing the implementation of policies, principles, standards, and guidelines on information security, and reviewing agency information security programs at least annually. In addition, the act requires that OMB report to Congress no later than March 1 of each year on the status of agency compliance with FISMA. The act, which sets forth a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets, also assigned NIST responsibility for developing standards and guidelines (for systems other than national security systems) that include minimum information security requirements. FISMA also assigns specific responsibilities to agencies to document and implement agencywide security programs and report on their security policies, procedures, and practices. For example, agencies are responsible for developing and complying with minimally acceptable system configuration requirements. Finally, FISMA requires agency inspectors general to annually evaluate agency information security activities. OMB Initiated FDCC and Provided Guidance for Agency Implementation: To help carry out its responsibilities for ensuring federal information security, OMB launched the FDCC initiative in March 2007. This initiative required federal agencies to implement common security configurations on Windows XP and Vista operating systems[Footnote 12] by February 2008.[Footnote 13] Subsequently, OMB issued several other memorandums detailing additional requirements and guidance to agencies on completing implementation of the initiative. OMB also has responsibility for approving any changes to the settings or setting parameters. At the request of OMB, NIST published the first beta version of the FDCC configuration settings in July 2007 for federal workstations that use Windows XP or Windows Vista as their operating system. FDCC was based on settings developed by the Air Force in partnership with the National Security Agency, Defense Information Systems Agency, NIST, and representatives from the Army, Navy, and Marines. Over the course of the next 11 months, NIST made several updates to the content and posted the revised versions on its Web site. The first major version of the configuration settings, version 1.0, was posted on NIST's Web site in June 2008 after a period of public comment. Based on implementation information reported by the agencies to NIST in March 2008, agency feedback on settings that were problematic to implement, and comments from the federal community, OMB had NIST remove 40 settings from the original beta version for version 1.0. In addition to publishing the FDCC settings, NIST also has responsibility for: * Developing resources, in collaboration with Microsoft, to aid agencies in deploying and testing the security configuration settings within their computing environments. These include group policy objects,[Footnote 14] which allow agencies to deploy the settings to desktop and laptop computers agencywide, and virtual hard-disk files, [Footnote 15] which allow agencies to test the settings in a non- operational environment. These files were first made available for agencies to download from NIST's Web site starting in July 2007 and were later updated with the release of major version 1.0. * Establishing the Security Content Automation Protocol (SCAP), [Footnote 16] which can be used to support the automated checking, measuring, and monitoring of the FDCC settings for compliance. Product vendors can create a tool (i.e., application) that uses SCAP for these activities. * Validating SCAP tools to ensure that a tool uses the features and functionality available through SCAP. In order for a tool to receive validation, a vendor must first have the tool tested by 1 of 10 independent testing laboratories accredited under NIST's National Voluntary Laboratory Accreditation Program.[Footnote 17] The testing results are then sent by the laboratory to NIST for review. If the tool passes, NIST will validate the SCAP tool, which is valid for 1 calendar year. * Making technical changes to the SCAP that support the FDCC settings, such as when new specifications are added, existing specifications are updated, or when a more efficient method is found to test a particular setting. NIST has released two additional major versions to make technical modifications to the SCAP: version 1.1 in October 2008 and version 1.2 in April 2009. NIST also publishes patch content updates based on Microsoft's patch releases. * Posting frequently asked questions on its Web site on behalf of OMB to answer agencies' questions about testing, deployment, reporting deviations, and use of SCAP tools for evaluation of compliance. The questions have also provided clarification of the settings requirements and their applicability to different types of computers, including contractor-owned or operated machines. These questions are revised on a periodic basis as needed and as determined by NIST. FDCC Aims to Improve Agencies' Information Security and Reduce IT Operating Costs: In its March 2007 directives to agencies to implement FDCC, OMB established two goals for the initiative: improve information security and reduce overall information technology (IT) operating costs for agencies that use or plan to use Windows XP or Vista operating systems on their workstations.[Footnote 18] By implementing the initiative, OMB intended that agencies should be able to achieve the following objectives: * Provide a baseline level of security through the use of standardized configuration settings that limit access privileges granted to users and other access controls, thereby controlling what a user may or may not do on his or her workstation. The settings create a baseline from which agencies may increase the level of security by making the settings more restrictive or by employing firewalls and intrusion detection systems along with other security devices and practices. * Reduce risk from security threats and vulnerabilities by employing the use of standards that are more restrictive than the default settings of the manufacturer. For example, the required settings do not allow the installation of unauthorized software, which lowers the risk of introducing a virus or other malicious device along with the software. * Save time and resources by requiring all FDCC workstations within an agency to use the same settings. This standardization also allows an agency's IT department to be more efficient in repairing computer problems. * Improve system performance by restricting the access privileges of administrators and users to only those necessary to perform their duties. This helps to limit downloading of unapproved software and information that could tie up system and help desk resources. * Decrease operating costs by using standard configuration settings that allow IT personnel to solve a workstation problem once and then replicate that solution for every workstation in the agency, saving labor and time. * Ensure public confidence in the confidentiality, integrity, and availability of government information by standardizing strong security settings across all federal agencies. This will help to protect federal systems from cyber attacks and may help to ensure the public's confidence that their personal information will not be compromised. OMB Established Requirements for Agency Implementation of FDCC: In its initial memorandums and subsequent guidance, OMB identified several requirements with which agencies were directed to comply in order to implement FDCC. The following are the key FDCC requirements: * Submit a draft implementation plan to OMB by May 1, 2007.[Footnote 19] Agencies were required to submit an implementation plan to OMB describing how they intended to (1) test configuration settings in a non-production environment to identify any adverse effects on system functionality; (2) implement the settings and automate monitoring and use; (3) restrict administration of these settings to authorized professionals; (4) ensure, by June 30, 2007, that new IT acquisitions include the settings and require IT providers to certify that their products operate effectively using the settings; (5) apply Microsoft patches available from the Department of Homeland Security when addressing new Windows XP or Vista vulnerabilities; (6) provide to NIST documentation of any deviations[Footnote 20] from these settings and the rationale for the deviations; and (7) ensure the settings are incorporated into agency capital planning and investment control processes. * Adopt the Windows XP and Vista security configuration settings by February 1, 2008.[Footnote 21] Agencies were required to implement the FDCC configuration settings on all government-owned desktops and laptops that use Windows XP or Vista operating systems and the Internet Explorer 7 or Windows Firewall applications. This requirement was later clarified to include desktops and laptops that are owned or operated by a contractor on behalf of or for the federal government or that are integrated into a federal system. The requirement excludes servers, embedded computers, process control systems, specialized scientific or experimental systems, and similar systems using these operating systems.[Footnote 22] FDCC major version 1.0 includes 674 configuration settings for Windows XP and Windows Vista systems, when bundled with Internet Explorer 7 and Windows Firewall. Examples of these settings include the following: - Specifies the number of minutes a locked-out account remains locked out before it automatically unlocks. - Specifies the minimum number of characters a password must have. - Specifies whether or not the user is prompted for a password when the system resumes from sleep mode. - Requires the use of Federal Information Processing Standards- compliant[Footnote 23] algorithms for encryption, hashing, and signing.[Footnote 24] - Shuts the system down immediately if it is unable to log security audits.[Footnote 25] - Creates a log when Windows firewall with advanced security allows an inbound connection. The log will detail why and when the connection was formed. * Document deviations and have them approved by a designated accrediting authority. Agencies were required to document deviations initially as part of their draft implementation plan efforts.[Footnote 26] OMB later required agencies to report these deviations to NIST in March 2008.[Footnote 27] OMB also later noted[Footnote 28] that configuration setting deviations are to be approved by the department or agency accrediting authority.[Footnote 29] * Acquire a SCAP tool and use it to monitor FDCC. Agencies are required to acquire a NIST-validated SCAP tool[Footnote 30] and to use these tools when monitoring the settings.[Footnote 31] * Ensure that new acquisitions include security configuration settings. Agencies are required to ensure that new acquisitions include FDCC settings and products of information technology providers operate effectively using them.[Footnote 32] * Submit FDCC compliance reports to NIST by March 31, 2008. Agencies were required to submit a spreadsheet that summarized workstation counts, setting deviations, and descriptions of plans of action and milestones[Footnote 33] for the deviations, along with related reports generated by a SCAP tool for each operational environment present within the agency.[Footnote 34] * Report on status of FDCC compliance in annual FISMA reporting. Agencies were required to report the status of compliance with FDCC as part of FISMA reporting for fiscal year 2008. This requirement included reporting on whether the configuration settings had been adopted and implemented, with deviations documented; whether language relating to the use of FDCC settings had been included in contracts; and whether all workstations had the security settings implemented.[Footnote 35] Agency inspectors general were asked to assess agencies' compliance with the reporting requirements. For fiscal year 2009, agencies and agency inspectors general were required to report the status of compliance with specific requirements including whether deviations had been documented and language relating to the use of FDCC settings had been included in all contracts. [Footnote 36] Agencies Have Not Fully Implemented FDCC Settings, but Most Have Complied with Other Requirements: None of the agencies has fully implemented all FDCC configuration settings on all applicable workstations, although most have complied with other requirements. Specifically, 11 agencies reported they had completed implementation of an agency-approved subset of the FDCC settings and do not plan to implement all the configuration settings, while the remaining agencies reported they are still completing implementation of the settings. However, most agencies have generally complied with other initiative requirements. For instance, 19 agencies have fully documented their deviations and 16 have established a policy for having those deviations approved by a designated authority. In addition, 15 agencies have acquired and deployed a NIST-validated SCAP tool to monitor the compliance of their setting implementation. Eight agencies have also incorporated language into their contracts to ensure that new acquisitions comply with FDCC. Most Agencies Submitted FDCC Implementation Plans to OMB, but Did Not Address All Required Activities: While agencies were required to submit a draft implementation plan to OMB by May 1, 2007, fewer than half of the agencies developed plans that addressed the seven actions necessary to fully implement the initiative. Of the 24 agencies, 19 provided their plans to us, while 5 agencies either did not develop an implementation plan or were unable to locate a copy of the plan.[Footnote 37] Of the 19 plans, 11 described how the agency intended to implement each of the seven actions required by OMB. The remaining 8 plans either did not address the actions or described only some of them. Table 1 shows how many agencies addressed each of the required actions in their FDCC implementation plans. Table 1: Number of Agency FDCC Implementation Plans That Addressed Required Actions: Required action: 1. Test configurations in a non-production environment to identify adverse effects on system functionality; Agency plans that addressed the action: 16. Required action: 2. Implement the configurations and automate monitoring and use; Agency plans that addressed the action: 16. Required action: 3. Restrict administration of these configurations to authorized professionals; Agency plans that addressed the action: 15. Required action: 4. Ensure by June 30, 2007, that new acquisitions include the configurations and require information technology providers to certify that their products operate effectively using the configurations; Agency plans that addressed the action: 11. Required action: 5. Apply Microsoft patches available from Department of Homeland Security when addressing new Windows XP or Vista vulnerabilities; Agency plans that addressed the action: 12. Required action: 6. Provide NIST documentation of any deviations from these configurations and the rationale for the deviations; Agency plans that addressed the action: 15. Required action: 7. Ensure these configurations are incorporated into agency capital planning and investment control processes; Agency plans that addressed the action: 12. Source: GAO analysis of agency FDCC implementation plans submitted to OMB. [End of table] Officials from one of the agencies whose plan did not address the required activities told us that OMB had provided feedback and requested changes to the plan, but the remaining agencies indicated that OMB had not provided feedback on the submitted plans and had not requested any changes. OMB was unable to confirm whether the 24 agencies had submitted the implementation plans by the required deadline because, officials stated, this information had been archived with the previous administration. As discussed later in the section on lessons learned, agencies experienced problems in implementing this requirement due to unrealistic deadlines. All Agencies Reported Implementing a Subset of FDCC Settings: Though agencies were required to adopt and implement the FDCC settings by February 1, 2008, as of September 2009, none of the 24 major agencies reported that they had adopted and fully implemented the complete set of prescribed settings on all applicable workstations. Instead, all agencies planned to implement a subset of the FDCC settings, which they referred to as their agency baseline; these baselines included deviations from the approved parameters established by FDCC, in some cases for up to one-fifth of the settings.[Footnote 38] As of September 2009, 11 agencies reported they had completed implementation of their baselines on all applicable workstations, and 11 were still in the process of finishing implementation of their baseline. The other 2 agencies were unable to provide sufficient data to determine the status of implementation because they either lacked a SCAP tool or had data reliability issues due to using multiple tools. (See appendix II for more details on the status of each agency in implementing the FDCC settings, as of September 2009.) For those agencies that were still in the process of completing implementation of their baseline, agency officials reported various milestones for expected completion; however, some of those deadlines had not been met, and other agency officials did not report a milestone for completion. For example, a few agency officials indicated they would complete implementation by September 2009; however, this deadline was not met. Figure 1 summarizes the status of agency-reported implementation of their FDCC baselines for applicable workstations with Windows XP and Vista operating systems. Figure 1: Agency-Reported Implementation of FDCC Baseline as of September 2009: [Refer to PDF for image: vertical bar graph] Percentage of workstations: 0–24%; XP: 2; Vista: 1. Percentage of workstations: 25–49%; XP: 2; Vista: 1. Percentage of workstations: 50–74%; XP: 1; Vista: 2. Percentage of workstations: 75–100%; XP: 17; Vista: 9. Source: GAO analysis of data reported by agencies in GAO data collection instrument. [End of figure] Agency officials told us that several factors had influenced their decision to establish deviations, whether less or more stringent, from the settings. These factors included cases where FDCC settings: * had an adverse impact on applications, production, or legacy systems; * conflicted with agency policy; * prohibited agency administrators from completing tasks; and: * impaired the capability to provide customer support or remote assistance. In establishing their baselines, agencies allowed a range of deviations, some with parameters that were less stringent (e.g., less secure) than the approved parameters, while others were more stringent. Of the 24 agencies, 23 provided us a list of their deviations and 1 agency indicated it had not developed a list. Each of the 23 lists identified deviations that were less stringent than the FDCC settings. Specifically, 15 agencies had 10 or more less-stringent deviations, and 6 agencies had 40 or more less-stringent deviations, which is 6 percent of the 674 total number of FDCC settings. Table 2 shows the range of the number of less-stringent deviations and the corresponding number of agencies. Table 2: Range of the Number of Less-Stringent Deviations with the Corresponding Number of Agencies: Range of deviations: 1-9; Number of agencies: 8. Range of deviations: 10-19; Number of agencies: 4. Range of deviations: 20-39; Number of agencies: 5. Range of deviations: 40-75; Number of agencies: 3. Range of deviations: 76-130; Number of agencies: 3. Source: GAO analysis of agency reported data. [End of table] Our analysis revealed ten most common less-stringent deviations across the federal government. For example, 21 of the 23 agencies that provided deviation lists had a deviation for the use of encryption algorithms[Footnote 39] that are compliant with Federal Information Processing Standards, and 17 agencies had a deviation for the setting regarding digital signatures of client communications. Table 3 shows the 10 most common less-stringent deviations and the number of agencies that reported having them. Table 3: Ten Most Common Less-Stringent FDCC Deviations at Federal Agencies: FDCC setting: Determines whether Federal Information Processing Standards-compliant encryption algorithms must be used; Operating system: XP/Vista; Number of agencies: 21. FDCC setting: Determines whether the computer always digitally signs client communications; Operating system: XP/Vista; Number of agencies: 17. FDCC setting: Determines what happens when an attempt is made to install a device driver that has not been certified by the Windows Hardware Quality Lab; Operating system: XP; Number of agencies: 16. FDCC setting: Determines which password hashing algorithm is used for network logons; Operating system: XP/Vista; Number of agencies: 12. FDCC setting: Determines which users are allowed to use a network utility tool; Operating system: XP; Number of agencies: 12. FDCC setting: Determines whether the Server Message Block server is required to perform packet signing; Operating system: XP/Vista; Number of agencies: 12. FDCC setting: Determines who can connect to the workstation over the network; Operating system: XP/Vista; Number of agencies: 11. FDCC setting: Determines the least number of characters that a password for a user account can contain; Operating system: XP/Vista; Number of agencies: 11. FDCC setting: Determines whether a wireless configuration service can be used; Operating system: XP; Number of agencies: 10. FDCC setting: Determines whether users can make remote assistance invitations for workstations; Operating system: XP/Vista; Number of agencies: 9. Source: GAO analysis of agency data. [End of table] Additionally, 7 agencies listed deviations that were more stringent (e.g., had parameters that were more secure) than the FDCC settings. Of the 7 agencies with more-stringent deviations, 1 had 10 or more of these more-stringent deviations, while the remaining 6 agencies had fewer than 10. There is also a common set of these more-stringent deviations among the 7 agencies. For example, 3 agencies have a deviation for duration accounts can be locked out, 2 agencies have a deviation for how many invalid logon attempts can occur before an account is locked out, and 2 agencies have a deviation for the type of user who can format and eject removable media. Until those agencies that have not completed implementation of their FDCC baseline (see appendix II) establish firm milestones for completion and complete implementation, agencies risk not achieving the potential benefits of the initiative. Most Agencies Documented Deviations, but Eight Did Not Establish a Policy for Approving Them: Although OMB guidance indicates that agencies are to document and have a designated accrediting authority approve deviations from FDCC, several agencies did not do so. Of the 24 agencies, 23 had deviations and 1 did not maintain a list. Of the 23, 19 had fully documented their deviations but 4 had not. In addition, 16 agencies established a policy to have deviations approved by a designated accrediting authority, while 8 agencies have not established such a policy. Table 4 shows which agencies have documented deviations and have a policy in place to approve deviations by a designated authority. Table 4: Status of Agency Compliance with Deviation Guidance: Agency: Agriculture; Documented deviations: No; Have policy to approve deviations by designated authority: No. Agency: Commerce; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Defense; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Education; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Energy; Documented deviations: No; Have policy to approve deviations by designated authority: Yes. Agency: Environmental Protection Agency; Documented deviations: Yes; Have policy to approve deviations by designated authority: No. Agency: General Services Administration; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Health and Human Services; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Homeland Security; Documented deviations: Yes; Have policy to approve deviations by designated authority: No. Agency: Housing and Urban Development; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Interior; Documented deviations: No[A]; Have policy to approve deviations by designated authority: No[A]. Agency: Justice; Documented deviations: Yes; Have policy to approve deviations by designated authority: No. Agency: Labor; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: National Aeronautics and Space Administration; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: National Science Foundation; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Nuclear Regulatory Commission; Documented deviations: Yes; Have policy to approve deviations by designated authority: No. Agency: Office of Personnel Management; Documented deviations: No; Have policy to approve deviations by designated authority: Yes. Agency: Small Business Administration; Documented deviations: Yes; Have policy to approve deviations by designated authority: No. Agency: Social Security Administration; Documented deviations: Yes; Have policy to approve deviations by designated authority: No. Agency: State; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Transportation; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Treasury; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: U.S. Agency for International Development; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Agency: Veterans Affairs; Documented deviations: Yes; Have policy to approve deviations by designated authority: Yes. Source: GAO analysis of agency documentation and responses by agency inspectors general to fiscal year 2009 FISMA reporting question. [A] Although the Department of the Interior documented deviations and had them approved by a designated authority at the department level, all of its agency components had not implemented these requirements. [End of table] Agency officials who had not documented deviations said they either did not maintain lists for field offices or had not yet completed the process for establishing the agency baseline and documenting the deviations. Officials from agencies that did not have a policy in place for approving deviations told us they were still working to develop an approval process. Until agencies document their FDCC deviations or have a policy in place to approve those deviations, they cannot fully assess the potential risk of not implementing the required settings and they cannot ensure that configuration baselines are effectively controlled and maintained. Six Agencies Have Yet to Acquire a SCAP Tool and Use It to Monitor FDCC Configurations: Agencies were required to obtain a NIST-validated SCAP tool and use it to consistently monitor the implementation of the configuration; however, while 15 agencies reported acquiring and deploying NIST- validated tools, 6 had not. Of the 3 remaining agencies, some of their components have a NIST-validated SCAP tool, while the other components either do not have a tool or do not use a NIST-validated tool for monitoring workstation configurations. Regardless of whether the tool has been validated or not, most agencies used one to monitor FDCC implementation. However, 2 agencies that had a validated tool had not yet established a policy for monitoring compliance. Table 5 shows which federal agencies have acquired a NIST-validated tool and were using it to monitor their workstation configurations. Table 5: Status of Agency Acquisition and Use of a NIST-validated SCAP Tool: Agency: Agriculture; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Commerce; NIST-validated SCAP tool acquired and deployed: Partially; NIST-validated SCAP tool used to monitor compliance: Partially. Agency: Defense; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Education; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Energy; NIST-validated SCAP tool acquired and deployed: Partially; NIST-validated SCAP tool used to monitor compliance: Partially. Agency: Environmental Protection Agency; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: General Services Administration; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Health and Human Services; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: No[B]. Agency: Homeland Security; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: No. Agency: Housing and Urban Development; NIST-validated SCAP tool acquired and deployed: No; NIST-validated SCAP tool used to monitor compliance: No. Agency: Interior; NIST-validated SCAP tool acquired and deployed: Partially; NIST-validated SCAP tool used to monitor compliance: Partially. Agency: Justice; NIST-validated SCAP tool acquired and deployed: No[A]; NIST-validated SCAP tool used to monitor compliance: No[C]. Agency: Labor; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: National Aeronautics and Space Administration; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: National Science Foundation; NIST-validated SCAP tool acquired and deployed: No[A]; NIST-validated SCAP tool used to monitor compliance: No[C]. Agency: Nuclear Regulatory Commission; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Office of Personnel Management; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Small Business Administration; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Social Security Administration; NIST-validated SCAP tool acquired and deployed: No[A]; NIST-validated SCAP tool used to monitor compliance: No. Agency: State; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Transportation; NIST-validated SCAP tool acquired and deployed: No[A]; NIST-validated SCAP tool used to monitor compliance: No[C]. Agency: Treasury; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: U.S. Agency for International Development; NIST-validated SCAP tool acquired and deployed: Yes; NIST-validated SCAP tool used to monitor compliance: Yes. Agency: Veterans Affairs; NIST-validated SCAP tool acquired and deployed: No; NIST-validated SCAP tool used to monitor compliance: No. Source: GAO analysis of agency data. [A] Agency has acquired a NIST-validated tool but has not completed deployment at the agency. [B] Although the agency lacks a policy for monitoring compliance, it does perform scanning of its workstations using a NIST-validated SCAP tool. [C] Agency or components within the agency used a SCAP tool not currently validated by NIST to monitor compliance. Note: Agency was given a rating of "partially" if some components had acquired a validated SCAP tool and used it to monitor compliance but other components had not. [End of table] At agencies that did not have a NIST-validated SCAP tool, officials told us they were in the process of acquiring a tool but had been delayed due to funding issues. For those agencies where only some components had acquired a tool, officials told us their components were responsible for acquiring a tool and noted that funding had been an issue. At agencies without a policy for monitoring implementation, officials told us that either a policy had not been finalized or a policy would be developed once a SCAP tool had been acquired. However, officials from one of these agencies noted that although they lacked a policy, they were still performing some monitoring of workstations. Until agencies acquire and deploy a NIST-validated SCAP tool and develop, document, and implement policies to monitor compliance, they will not be able to ensure that the FDCC settings have been successfully implemented to help protect the confidentiality, integrity, and availability of their information. Most Agencies Have Not Incorporated Language into Contracts: Although OMB requires agencies to include language in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them, most agencies have not done so. Eight agencies had incorporated the language into their contracts, while 13 agencies had not, and 3 agencies had partially implemented the requirement. Table 6 shows which agencies have incorporated language into their contracts. Table 6: Agency Incorporation of Language into Contracts: Agency: Agriculture; Language incorporated: Yes. Agency: Commerce; Language incorporated: No. Agency: Defense; Language incorporated: No. Agency: Education; Language incorporated: Yes. Agency: Energy; Language incorporated: No. Agency: Environmental Protection Agency; Language incorporated: Yes. Agency: General Services Administration; Language incorporated: Yes. Agency: Health and Human Services; Language incorporated: No. Agency: Homeland Security; Language incorporated: No. Agency: Housing and Urban Development; Language incorporated: No. Agency: Interior; Language incorporated: Yes. Agency: Justice; Language incorporated: No. Agency: Labor; Language incorporated: Partially. Agency: National Aeronautics and Space Administration; Language incorporated: Yes. Agency: National Science Foundation; Language incorporated: Yes. Agency: Nuclear Regulatory Commission; Language incorporated: Partially. Agency: Office of Personnel Management; Language incorporated: No. Agency: Small Business Administration; Language incorporated: No. Agency: Social Security Administration; Language incorporated: No. Agency: State; Language incorporated: Yes. Agency: Transportation; Language incorporated: No. Agency: Treasury; Language incorporated: Partially. Agency: U.S. Agency for International Development; Language incorporated: No. Agency: Veterans Affairs; Language incorporated: No. Source: GAO analysis and agency inspector general-provided responses for FISMA fiscal year 2009 reporting. Note: Agencies were given a rating of "partially" if some components had incorporated the language into contracts but others had not, or if some contracts had the language incorporated, but others did not. [End of table] Officials from agencies that had not included language in the contracts had either included language in only a portion of the contracts reviewed, or the agency indicated it was still working on incorporating the language into its contracts. In addition, two agencies had one or more components that had not included the language in contracts. Until these agencies ensure that language is included into contracts to ensure that new acquisitions include FDCC settings and products of information technology providers operate effectively using them, agencies will not be able to ensure that new acquisitions are in compliance with FDCC requirements. Majority of Agencies Reported Status of Compliance with FDCC to NIST, but Many Indicated No Plans to Mitigate Deviations: Although most agencies submitted a compliance status report to NIST, the documentation was not always complete, including plans for mitigating deviations, or timely. Agencies were required to report to NIST the status of their compliance with FDCC by March 31, 2008, and submit a list of deviations, their plans of action and milestones for mitigating the deviations, and copies of reports generated by their SCAP tools. The majority of the agencies in our review submitted documentation to NIST; however, 2 agencies told us they had not submitted information to NIST, and 1 agency was unable to locate all the documents submitted. Of the 21 agencies that provided documentation, 12 agencies submitted all of the required information and documents. The remaining 9 agencies were either missing the required information or did not submit all of the required SCAP tool reports. In addition, while many of the agencies listed deviations, they either noted they did not plan to mitigate the deviations, or made general statements about addressing them at some point in the future. Furthermore, only 13 of the agencies in our review generally met the March 31, 2008, deadline for submission, while the remaining agencies took an additional month or more to provide documentation to NIST. As discussed later in the section on lessons learned, agencies experienced problems in implementing this requirement due to unrealistic deadlines. Implementing FDCC Resulted in Benefits and Lessons Learned, but Agencies Continue to Face Challenges in Meeting Requirements: While implementation of FDCC can result in improvements to agencies' information security as well as other benefits, such as cost savings, attempting to meet the requirements yielded lessons learned that could improve the implementation of future versions of FDCC or other workstation configurations. In addition, agencies continue to face significant challenges in meeting FDCC requirements, monitoring their implementation of the settings, and measuring benefits of the initiative, among other things. Implementing FDCC Can Enhance Security at Federal Agencies: FDCC has the potential both to increase agencies' information security and to standardize their management of workstations. Other potential benefits include cost savings arising from reduced power usage. FDCC implementation enhances security by requiring stricter security settings on workstations than those that may have been previously in place at federal agencies. Specifically, some of the key configuration settings serve to secure agency workstations by restricting user and administrative rights to particular system functions. These settings reduce the potential for malware and other known vulnerabilities to affect agency workstations because the stricter access rights would prevent their automatic download and installation. As an example, officials at two agencies reported that FDCC was responsible for protecting their workstations from recent malicious code infections. The settings also reinforce access controls by restricting users' rights to what is necessary for their work. Ten of the agencies in our review attributed either increased security or increased security awareness to implementation of the settings and were generally supportive of a stricter configuration for the agency. FDCC implementation also enabled agencies to reap the benefits of having more standardized configurations within agency computing environments. For example, a more secure enterprisewide Windows configuration and consistent workstation profile (i.e., the set of configuration settings and other software applied to a workstation) across the agency can not only improve security but can also make it easier to manage changes to the security features of workstation software, such as applying updates or patches. Updates or patches can be applied more expeditiously because there are fewer workstation profiles that they must be tested on, which also reduces the amount of necessary supporting documentation. Agency officials we spoke to confirmed that FDCC provided an improved understanding of their computing environment as well as a consistent desktop image across the department. Another official stated that adopting and implementing the configuration settings would raise awareness of the importance of workstation configuration management across the government. Beyond the benefits to enhancing security within agency computing environments, there are other potential, if unanticipated, benefits to implementing particular settings and standardizing them across the federal government. For example, while settings related to activating and password-protecting screen savers can provide added security by locking the workstation while the user is not present, they could also reduce power consumption and lead to savings in utility costs. One agency official said his agency was anticipating saving between $10 million and $15 million a year by implementing the power settings, and would be deploying a tool to track this data. In addition, an agency official from the Chief Information Officers Council's FDCC Change Control Board said the board was working on recommending what it considered "green settings" to OMB, which would also potentially reduce consumption of power and the paper used to print documents.[Footnote 40] Officials at one agency also told us that because they had observed several benefits--including improved security, cost avoidance through acquisition of workstations with settings already implemented, and a simplification of the software development process--by implementing their agency FDCC baseline, they were in the process of developing or finalizing configuration settings for other operating systems and servers. Lessons Learned: There are a number of lessons to be learned from the management and implementation of the FDCC initiative which, if considered, could improve the implementation of future versions of FDCC or other configuration efforts. Having Realistic and Established Time Frames for Completion Is Needed to Ensure Successful Implementation: OMB did not provide a realistic time frame for agencies to meet the requirements of the initiative and complete implementation of FDCC by February 2008. This is due in large part to OMB not considering several constraints when establishing time frames for agencies to complete the requirements and implement the beta version of the settings within 7 months, including: * Agencies were required to submit draft plans to implement the settings by May 1, 2007, approximately 3 months before being informed of the settings they were required to implement. * Only one SCAP tool was validated in time for agencies to use to report the status of implementation to NIST, and one agency found that the tool did not produce the needed reports required for NIST reporting. The earliest any of the other tools were validated was 7 months after the deadline. * Multiple changes occurred to the FDCC content--including the settings, SCAP, and resources--that agencies were supposed to use in order to complete implementation by the February 2008 deadline. In addition, another version of the settings was released between the February deadline and the March 2008 compliance reporting deadline. Furthermore, once the beta version of the settings was revised and major version 1.0 was released in June 2008, OMB did not establish a deadline for agencies to complete implementation of this version. OMB officials confirmed they have not established a schedule for announcing changes to FDCC versions or implementation deadlines. However, they stated they were working with the Chief Information Officers Council and its newly developed FDCC Change Control Board to provide a framework for soliciting input and feedback on future versions of the settings on a yearly basis. Nevertheless, without realistic deadlines that are effectively communicated with sufficient notice, agencies will continue to face challenges in meeting implementation deadlines for future versions of FDCC. Clarifying Guidance on Requirements for Deviations Is Necessary for Consistent Implementation: OMB and NIST guidance with regard to deviations was not always comprehensive, and agencies interpreted it in divergent ways. Specifically, OMB memorandums and guidance published on NIST's Web site were not clear as to: * under what conditions deviations were permitted; * whether deviations could be permanent, or should be mitigated in a timely manner; * how deviations should be documented, tracked, and approved by a designated authority; and: * how frequently and to whom deviations should be reported. As a result, agencies interpreted this guidance in significantly different ways. Only one agency interpreted the requirements to mean that no deviations were permitted, while other agencies, by contrast, interpreted full implementation of FDCC to mean applying 85 to 95 percent of the settings, with deviations allowed under certain circumstances. In addition, most agencies responded, either in their descriptions of plans of action and milestones or in interviews, that they had permanent deviations from FDCC, indicating they interpreted the guidance to mean that deviations could be permanent. However, several agencies also reported they may reduce the number of deviations as they upgrade, modify, or replace existing systems and applications. In addition, agency processes to document and approve deviations varied. For example, some agencies documented and approved deviations at the agency level while other agencies allowed their components to determine the number of deviations and approve them. Some agency officials told us their list of deviations may not be complete because they provided deviations from only a few components, or did not track or maintain a list of deviations at the component level. For those agencies, officials noted they did not have visibility into the deviations documented and approved at the component level because responsibility for this was delegated to the components. Furthermore, agencies' interpretation of the requirement to report deviations to NIST varied, with some agencies stating they were only supposed to report deviations to NIST in March 2008, while other agencies said they reported deviations to NIST whenever they updated their lists. OMB officials stated that full compliance with the configuration meant implementing all the settings without deviations on all applicable workstations, although they allowed agencies to document deviations and later required them to be approved. Nevertheless, without further clarification on the approval, permanence, and reporting of deviations, the federal government will continue to be hindered in consistently implementing FDCC, and OMB will be hindered in assessing the status and effectiveness of implementation across federal agencies. Certain Testing Approaches Facilitated Successful Implementation: The variety of approaches agencies took to testing the settings prior to implementation affected how successful they were. In one case, an agency implemented the settings without testing, discovered problems, and subsequently changed its approach to include testing prior to implementation. Another agency reported having success with collaborative testing among agency components, which included officials from the components sharing results and other information at regular meetings. Officials from another agency stated that automated testing was a better approach because it allows for easier confirmation that there is a standard workstation configuration in use on the agency's systems. Ensuring that testing is carried out prior to implementation, with opportunities for information sharing and consideration of the benefits of automation, can help agencies make implementation of future versions of FDCC or similar configurations more successful. Phased Approach to Implementation Aided Successful Implementation: Agencies that implemented the settings in a phased, or sequential, fashion were able to avoid disruption in their operations and identify problems that arose during implementation. Officials from four agencies cited the benefits of or need for using such a phased implementation approach, rather than implementing the settings in one pass. One agency's officials observed that sequential implementation was key to avoiding system disruption and down time because settings were not applied to all components within the agency at the same time. Following such an approach for future versions of FDCC and other configurations could prove beneficial to agencies. Further Collaboration between Agencies, OMB, and NIST Is Desired: Another success factor in implementing FDCC was frequent communication and collaboration among and within agencies. Officials from two agencies noted that collaboration among its agency components on testing was helpful in addressing problems that occurred. Agencies noted that keeping the lines of communication open, both among agency components and between OMB and NIST and other agencies, would help in making such an initiative more successful. One agency official recommended that there should be a way for NIST to communicate operational impacts prior to the release of new FDCC settings, and another suggested that future versions of FDCC should be vetted by the broader IT community before being rolled out to agencies. Officials from another agency stressed the importance of having communication and outreach among agencies to discuss FDCC issues and changes. Lastly, officials from one agency suggested having FDCC compliance sessions where agencies could discuss issues and learn from one another's experiences. Further collaboration between OMB, NIST, and agencies could increase the effectiveness of implementation among agencies and the chances for the success of similar future initiatives. Independent Testing Provides an Important Perspective on Agency Compliance: Independent testing performed by the General Services Administration and Department of the Interior's Inspector General found compliance results that differed from agency-reported information. In a policy utilization assessment[Footnote 41] conducted over 2 years in multiple phases, the General Services Administration tested FDCC implementation at three agencies between December 2008 and February 2009. The results generally differed from agency-reported information on the level of policy implementation, level of compliance, and number of deviations reported between October 2008 and November 2008. At all three agencies, the scan results showed a higher level of policy implementation than the agencies had reported. In addition, two agencies learned they had a lower number of deviations on the workstation sample than they had reported, and two agencies were provided a more accurate indication of their level of compliance. In September 2009, the Inspector General of the Department of the Interior reported widespread noncompliance with mandatory FDCC settings and noncompliance with agency directives at the agency. [Footnote 42] Based on testing performed during summer 2009, Interior averaged 68 percent compliance for the configuration settings, which varied from the compliance status reported to us. In addition, the Inspector General noted that agency components reported an additional 323 deviations at the components that were not documented and approved according to the agency's policy. The Inspector General made a recommendation to ensure Interior's compliance with FDCC guidance. These results suggest that agency self-reported compliance may not always be accurate and that continued independent testing can provide important insight into the extent of FDCC implementation. Additional independent testing performed by external parties could provide opportunities for agencies to acquire additional information to assist them in complying with FDCC requirements. Advance Notice Can Aid in Allocating Limited Resources: In launching an initiative such as FDCC, having sufficient notice to marshal the necessary resources can improve agencies' chances of success. Agencies reported that having advance notice of the requirement to implement the initiative, with sufficient time for preparation and training, was necessary to successfully implement the initiative. Officials from one agency stated that such mandates should be widely announced well in advance of anticipated completion dates to allow all agencies appropriate lead time to ensure that budgets and resources would be available and that requirements and resulting impacts could be completely assessed. Further, agencies commonly reported a lack of sufficient resources (time, money, labor, technical expertise) to implement the FDCC settings, understand how the settings would affect their environments, address issues found with testing, and purchase a SCAP tool. Some agencies cited having to reallocate approved funding to cover the costs of implementation and the purchase of the tools. Although most agencies could not provide estimates of the time and labor spent implementing FDCC, several agencies provided estimates of the costs of implementation and purchasing SCAP tools, which ranged from the tens of thousands to hundreds of thousands of dollars. In addition, officials from a few agencies stated they did not always have staff dedicated specifically to FDCC, which contributed to delayed implementation. Ensuring sufficient lead time can help agencies better plan use of their resources to implement initiatives like FDCC. Challenges Exist for Agencies in Fully Complying with FDCC Requirements: Agencies face several ongoing challenges to fully complying with FDCC requirements, including retrofitting their existing applications and systems to comply with the settings, assessing the risks associated with deviations, and monitoring workstations to ensure that the settings are applied and functioning properly. Retrofitting Applications and Legacy Systems to Comply with Configuration Settings in Complex Agency Environments: Applying the configuration settings has and will continue to cause problems for agencies due to the variety of applications, legacy systems, and agency environments that exist within the federal government. In particular, agencies have legacy systems or applications that use old software that have to be reconfigured to work with the settings. In addition, while some agency environments consist of a small number of offices with under 10 thousand workstations, other agency environments have multiple components with hundreds of thousands of workstations that are spread out geographically across the country, and in a few cases, the world. Although agencies were required to implement all the FDCC settings, the number and scope of the deviations that agencies had to implement highlight the magnitude of the challenge that agencies faced in implementing the settings. Agency officials confirmed during interviews that there were several challenges in retrofitting their systems and applications to comply with the settings, including the following examples: * Some of the settings had affected other settings on workstations and servers, and it had been a challenge to determine which FDCC settings were responsible. * Some of the settings impaired the functioning of custom programs, caused problems in environments, or interfered with basic functions (e.g., network printing). * The settings prevented the agencies from accessing legitimate Web sites, such as certain federal, state, and local government sites. * Applying particular FDCC settings to legacy systems or applications would require agencies to update their applications or operating systems. However, potential solutions to these challenges are either not simple or may not exist. As new versions of the settings or other configurations are established, it will be important for OMB to recognize that retrofitting systems and applications to comply with new settings in complex environments will remain an ongoing challenge for agencies, and that sufficient time for implementation and the use of deviations may be necessary. However, OMB has not provided guidance to agencies on submitting plans for mitigating deviations, including the resources necessary for doing so. Until OMB provides guidance to agencies on submitting plans of actions and milestones for mitigating deviations, to include resources necessary for doing so, OMB will lack sufficient information to make decisions about the use of deviations and whether potential changes to FDCC are warranted. Assessing the Risks Associated with Deviations: A related challenge for agencies is sufficiently assessing the risks associated with deviations from the official FDCC settings. As mentioned earlier, all agencies in our review had deviations, regardless of whether these deviations had been sufficiently documented or approved. There are risks associated with deviations from individual settings and groups of settings, not only at individual agencies but among agencies, depending on the agency's computing environment. For instance, having deviations such as passwords with a minimal number of characters, combined with allowing multiple users to connect to the workstation over the network and enabling wireless communication on the workstation, increases the risk that unauthorized users could gain access to workstations and sensitive government information. However, many of the agencies in our review did not describe a process for assessing the combined risk of the deviations they had in place because deviations were submitted for approval on an individual basis, were submitted as part of a configuration that included other settings beyond FDCC, or, particularly at agencies where deviation approval was left up to components, the agency did not track the deviations at the component level. Although OMB required agencies to approve deviations, it did not specify any guidance for agencies to use to consider the risks of having these deviations prior to approval. Until OMB specifies guidance for agencies to use to assess the risks of having deviations prior to approving them, including the combined risk of deviations in place across the agency, workstations may remain particularly vulnerable to cyber threats. Consistent and Comprehensive Monitoring of FDCC Implementation on Agency Workstations: Challenges also exist in effectively and consistently monitoring the implementation of FDCC in order to ensure the settings have been implemented properly and are continuing to function as intended. Specifically, the frequency and scope with which agencies scan workstations for compliance may not be sufficient to ensure the settings are working properly, and the results could potentially be incomplete or inconsistent. While some agencies scanned workstations on a weekly or bi-weekly basis, other agencies performed scans only when new patches or system updates had been installed or performed scanning only on a quarterly or annual basis. The infrequent monitoring on the part of some agencies could be due to the SCAP tool used: agency officials without an enterprisewide tool noted that frequent monitoring was impractical because regularly scanning each workstation required them to individually scan up to tens of thousands of workstations. In addition, while some agencies scanned every workstation on their network, other agencies only performed scans on test workstations, which could be insufficient if agency workstation configurations do not match the tested workstations. Scans of workstations on agency networks may also be incomplete in cases where user populations work remotely or have contractor-owned workstations. Agencies that use a SCAP tool to scan all workstations connected to their network may miss workstations belonging to these populations, which might not be connected to the network depending on the time of the scan. Consequently, agencies may be relying on incomplete information on whether the settings are working as intended. While OMB guidance indicates that agencies should monitor compliance using SCAP, the guidance does not specify the frequency or scope in which monitoring should be performed. Until OMB improves its guidance on monitoring compliance using SCAP to include information on the frequency and scope with which agencies should perform monitoring, agencies may not be scanning with sufficient rigor to ensure the settings have been successfully implemented and are working properly. Having Sufficient Tools to Perform Monitoring of Workstations: Agencies did not always have sufficient tools to monitor implementation and compliance with FDCC. In particular, issues with the current NIST-validated SCAP tools include the following: * Some tools generate errors when scanning for particular settings. * Certain settings have to be checked manually because the tools do not scan for all settings. * Some tools record false positives, particularly if the agency's parameter for a particular setting is stricter than the FDCC parameter. * It takes time for vendors to update their SCAP tools after NIST changes SCAP content to address problems, with the result that the tools perform scans based on incorrect content. Agency officials we interviewed confirmed there were issues with the SCAP tools, and many agencies and their components found it easier to use some combination of NIST-validated SCAP tools, group policy objects, or other configuration management software to monitor their configurations. In addition, several agencies indicated they had acquired or were in the process of acquiring a different SCAP tool that would provide better functionality and capabilities in order to meet their needs. NIST officials confirmed they were aware of the issues with SCAP tools and stated they are taking steps to address them. For instance, NIST intends to release new requirements that SCAP tools must meet as well as change validation requirements so that vendors will be required to have their tools tested and validated against the new requirements within 1 year of the requirements being released. NIST requested comments on a draft of this document through January 2010, but hasn't released a final version. Once NIST releases the new requirements for SCAP tools and these tools are validated against these requirements, agencies should have more sufficient tools for monitoring implementation of FDCC. Measuring Benefits of the Initiative: Although agencies have anecdotally reported a variety of benefits from efforts to implement FDCC, OMB and agencies face challenges in accurately assessing the impact and measuring the benefits of the initiative. This is because neither OMB nor the agencies have developed specific metrics to measure the effectiveness and program impact of the initiative. Specifically, they have not required or collected measures or metrics that address how effectively the initiative is mitigating security risks or reducing costs, two of its stated goals. For example, an official at one agency noted several benefits of implementing FDCC--a more secure user environment because of reduced user permissions, a stable development platform that resulted in cost savings and a simplification of the software development process, and a reduction in the number of customer support help calls and service calls by technicians. However, the official admitted that he did not have specific metrics for quantitatively measuring these benefits. Implementing metrics that assess the effectiveness and program impact could give a more complete picture of the benefits of FDCC and help determine whether future versions of the settings or configurations for other operating systems or servers should be instituted. In our September 2009 report, we recommended that OMB, among other things, direct federal agencies to use balanced sets of information security measures that include effectiveness and impact, as well as compliance, and to require agencies to report on such a balanced set of measures. [Footnote 43] Without performance measures and guidance to agencies for reporting the benefits of FDCC, OMB and federal agencies will be limited in their ability to determine if the initiative is meeting its goals of improving federal information security and reducing operating costs and if the initiative should be continued or expanded. Conclusions: While agencies have taken steps toward implementing FDCC, work remains to be done in order to meet all the requirements established by OMB. Specifically, many agencies have applied an agency-defined subset of the configuration settings to their Windows workstations; however, none of the 24 major agencies has fully applied all the FDCC settings. Further, not all agencies have put a process in place for documenting or approving deviations from the FDCC baseline and have not yet acquired the required SCAP tool to monitor compliance with the settings. Unless agencies fulfill these requirements, OMB will not be able to ensure the effectiveness of the initiative. The FDCC initiative was an innovative approach by OMB to standardize and thereby strengthen information security at federal agencies, but lessons learned indicate ways that implementation could have been more successful. Specifically, OMB did not establish realistic time frames for completion or provide comprehensive guidance on FDCC deviations, which has impacted agencies' ability to successfully implement the initiative. In addition, collaboration among OMB, NIST, and the agencies, as well as independent testing of FDCC implementation by external parties, may help agencies be more successful in their implementation efforts. Finally, there are several ongoing challenges facing agencies in fully complying with the requirements, including retrofitting systems and applications amid complex environments, assessing the risks associated with deviations across each agency, and monitoring workstations to ensure the settings are applied and functioning properly. As OMB establishes additional versions of FDCC settings--or configuration settings for other applications or operating systems--understanding the lessons learned from implementation as well as the ongoing challenges agencies face will be essential to the initiative's success in ensuring public confidence in the confidentiality, integrity, and availability of government information. Recommendations for Executive Action: To improve implementation of FDCC at federal agencies, we recommend that the Director of OMB take the following six actions: * When announcing new FDCC versions, such as Windows 7, and changes to existing versions, include clear, realistic, and effectively communicated deadlines for completing implementation. * Clarify OMB policy regarding FDCC deviations to include: whether deviations can be permanent or should be mitigated in a timely manner; requirements for plans of actions and milestones for mitigating deviations, including resources necessary for doing so; guidance to use for assessing the risk of deviations across the agency; and how frequently and to whom deviations should be reported to assist in making decisions regarding future versions. * Inform agencies of the various approaches for testing the settings and implementing the initiative in phases, which may aid successful implementation. * Assess the efficacy of, and take steps to apply as appropriate, other lessons learned during the initial implementation of this initiative such as the need for (1) additional collaboration efforts, (2) independent testing, and (3) advance notice of requirements, to assist agencies in implementing this initiative. * Provide guidance on using SCAP tools to include information on the frequency and scope with which agencies should perform monitoring. * Develop performance measures and provide guidance to agencies for reporting the benefits of FDCC. We are also making 56 recommendations to 22 of the 24 departments and agencies in our review to improve their implementation of FDCC requirements that were not being met. Appendix III contains these recommendations. Agency Comments and Our Evaluation: In providing e-mail comments on a draft of this report, the lead IT policy analyst from OMB's Office of E-Government and Information Technology stated that OMB concurred with the report's findings, conclusions, and 6 recommendations addressed to OMB. We also sent a draft of this report to the 24 agencies in our review and received written, e-mail, and/or oral responses from all 24 agencies. Of the 22 agencies to which we made recommendations, 14 (Agriculture, Defense, Environmental Protection Agency, General Services Administration, Health and Human Services, Justice, National Aeronautics and Space Administration, National Science Foundation, Nuclear Regulatory Commission, Small Business Administration, Social Security Administration, Treasury, U.S. Agency for International Development, and Veterans Affairs) generally agreed with our recommendations. One agency (Commerce) did not comment specifically on our recommendations and the remaining 7 agencies generally concurred with some of our recommendations but provided qualifying comments with others. The agencies' comments and our responses are summarized below: * In oral comments on a draft of the report, the Department of Energy's Acting Associate Chief Information Officer for Cyber Security generally concurred with 4 of our 5 recommendations. However, he requested that our recommendations to ensure that all components acquire and deploy a NIST-validated SCAP tool, and develop, document, and implement a policy to monitor compliance using a NIST-validated tool be clarified to pertain only to those components that were required to implement FDCC. We agree that this modification clarifies the intent of our recommendations and have modified those recommendations as appropriate. Further, in commenting on our fifth recommendation to ensure that FDCC acquisition language was included in contracts, the Acting Associate Chief Information Officer for Cyber Security stated that the department will continue to evaluate our recommendation and determine an appropriate implementation approach. * In written comments on a draft of the report, the Department of Homeland Security's Chief Information Officer concurred with 3 of our 4 recommendations. He also concurred, with a caveat, with our fourth recommendation to ensure that FDCC acquisition language was included in contracts. The Chief Information Officer stated that the department already has regulations in place to ensure new acquisitions meet FDCC requirements. We agree that the department has regulations in place. However, as indicated in our report, the FDCC acquisition language had not been incorporated into all contracts. The Department of Homeland Security's comments are reprinted in appendix VIII. * In written and oral comments on a draft of the report, the Department of Housing and Urban Development's Chief Information Officer generally concurred with 3 of our 4 recommendations. In written comments on our recommendation that the department ensure FDCC acquisition language is included in contracts, he stated that the department had a policy in place for including clauses in contracts. After subsequent discussion with department representatives, they orally concurred with our recommendation. In written comments on our recommendation that the department develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority, the Chief Information Officer stated that the department had provided us with a copy of its policy for approving deviations in December 2009. After reviewing additional documentation provided, we agree that the department had met the requirement, modified the report as appropriate, and removed the recommendation. The Department of Housing and Urban Development's comments are reprinted in appendix IX. * In written comments on a draft of the report, the Department of the Interior's Assistant Secretary for Policy, Management, and Budget concurred with our recommendations, subject to modifications that reduced redundancy in the recommendations and clarified that components should follow the department's policy related to documenting and approving deviations, and acquiring and deploying NIST- validated tools to monitor compliance with FDCC. We agree that the suggested modifications clarified the intent of our recommendations, and have modified the recommendations accordingly. The Department of the Interior's comments are reprinted in appendix X. * In written and oral comments on a draft of the report, the Department of Labor's Assistant Secretary for Administration and Management generally concurred with 1 of our 2 recommendations, subject to modification that clarified that FDCC acquisition language had been included in some contracts but not in all. After reviewing additional documentation provided, we modified the recommendation as appropriate. In written comments on our recommendation that the department complete deployment of a NIST-validated SCAP tool, the Assistant Secretary for Administration and Management stated that deployment of the tool had been completed prior to the end of our audit field work. After reviewing additional documentation provided, we agree that the department had met the requirement, modified the report as appropriate, and removed the recommendation. The Department of Labor's comments are reprinted in appendix XI. * In written and oral comments on a draft of the report, the Office of Personnel Management's Chief Information Officer generally concurred with 3 of our 4 recommendations. In written comments on our recommendation on documenting deviations and having them approved by a designated authority, he said that the department has documented its deviations and approved them. After subsequent discussion with department representatives, they orally concurred with our recommendation. In addition, in written comments on our recommendation to develop, document, and implement a policy to approve deviations to FDCC by a designated authority, the Chief Information Officer stated that the agency has a policy in place. After reviewing documentation provided, we agree that the department had met the requirement, modified the report as appropriate, and removed the recommendation. The Office of Personnel Management's comments are reprinted in appendix XIII. * In e-mail and oral comments on a draft of the report, the Department of Transportation's Chief Information Security Officer generally concurred with our 2 recommendations, subject to modification that clarified that the department had acquired a validated tool and was in the process of fully deploying it. After reviewing additional documentation provided, we modified table 5 in the report to include a table footnote indicating a tool had been acquired but not deployed and revised the recommendation as appropriate. In addition, in e-mail comments on our recommendation to ensure that FDCC acquisition language is included in contracts, the Chief Information Security Officer stated that the department had provided a copy of the policy guidance on contract clauses to us. After subsequent discussion with department representatives, they orally concurred with our recommendation. In addition, several agencies also provided technical comments, including one of two agencies to which we did not make recommendations. We have incorporated these comments as appropriate. The remaining agency to which we did not make recommendations stated that it did not have any comments. Furthermore, for appropriate coverage of a federal-wide information technology contract issue, the Department of Defense suggested we add a recommendation that contract language be included in the Federal Acquisition Regulation "to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them." However, it was not within the scope of our review to evaluate whether such standard contract language was necessary or what it would entail. Nonetheless, the Department of Defense may wish to pursue this suggestion with OMB and other stakeholders for possible promulgation of a Federal Acquisition Regulation rule that would serve as a governmentwide template in solicitations or contracts for ensuring that FDCC settings are effectively incorporated and applied. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to other interested congressional committees, secretaries of the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, Labor, State, Transportation, the Treasury, and Veterans Affairs; the Attorney General; the administrators of the Environmental Protection Agency, General Services Administration, National Aeronautics and Space Administration, Small Business Administration, and U.S. Agency for International Development; the commissioner of the Social Security Administration; the chairman of the Nuclear Regulatory Commission; and the directors of the National Science Foundation, Office of Management and Budget, and Office of Personnel Management. The report also is available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions regarding this report, please contact me at (202) 512-6244 or at wilshuseng@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix XVIII. Signed by: Gregory C. Wilshusen: Director, Information Security Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: Relative to the 24 major federal agencies covered by the Chief Financial Officers Act, the objectives of our review were to (1) identify the goals, objectives, and requirements for the initiative; (2) determine the status of actions federal agencies have taken, or plan to take, to implement the initiative; and (3) identify the benefits, challenges, and lessons learned in implementing this initiative. To address our first objective, we reviewed applicable policies and memorandums issued by the Office of Management and Budget (OMB) and plans, artifacts, and other documentation provided by the National Institute of Standards and Technology (NIST). We also reviewed guidance and Federal Desktop Core Configuration (FDCC) and Security Content Automation Protocol (SCAP) materials located on NIST's Web site. In addition, we held discussions with OMB and NIST representatives to further assess the initiative's requirements and confirm that the material posted on their Web sites that we considered was current and accurate. To address our second and third objectives, we obtained and analyzed polices, plans, artifacts, status reports, and other documentation relative to the requirements of the initiative from each of the 24 federal agencies in our review. We obtained information through interviews with officials from each of the 24 agencies, industry officials, security experts, officials from General Services Administration's Policy Utilization Assessment Program, and members of the Chief Information Officers Council and FDCC Change Control Board. We also met with staff from all 24 Offices of the Inspector General regarding their FDCC audit work performed as part of Federal Information Security Management Act fiscal year 2008 and 2009 reporting to obtain information on their audit methodology, findings, and related documentation. Based on our review of the adequacy of work performed, we have sufficient assurance to rely on work completed by the inspectors general in the context of our audit objective related to whether the agency had documented deviations and had incorporated language related to the use of FDCC settings into its contracts. We also analyzed the information we obtained from all sources to determine the benefits, challenges, and lessons learned from implementation of FDCC. For our second objective, in order to determine the status of FDCC implementation at federal agencies, we developed a data collection instrument to obtain information on the number of workstations that had FDCC settings applied, either with no deviations or with deviations established at these agencies. To develop our data collection instrument, we reviewed the requirements of the initiative as well as the results from a previous data collection instrument used by NIST to collect status information on FDCC as of March 2008. We designed the draft collection instrument in close collaboration with subject matter experts and participated in refining subsequent drafts of the instrument. We sent the data collection instrument to the officials at the Office of Chief Information Officer at the 24 federal agencies and asked the agencies to provide status information as of June 30, 2009, and as of September 30, 2009. We e-mailed our first data collection instrument, to collect FDCC status data as of June 30, 2009, to all 24 agencies in early June 2009. When our collection ended in July 2009, we had received 19 usable responses. After examining the results from this data collection to identify inconsistencies and other indications of error, we concluded that the extent of response error and the overall low level of participation precluded the use of these data in our report. To refine the data collection instrument to collect September 2009 data, we conducted pretests with officials from 3 agencies to clarify any ambiguous or potentially biased questions. These pretests were conducted by telephone with the 3 agencies, which were chosen to represent the variety of characteristics across the 24 agencies we would survey. These characteristics included the operating system used, type of workstation, composition and size of the agency, and method used to collect status information. We sent this instrument to agency officials in mid-September 2009. We conducted follow-up contacts by e-mail and phone to encourage response and clarify individual answers. We received usable responses from 22 agencies, and ended the data collection period in November 2009. While our evaluation of the instrument data indicates that it is usable for the purposes of this report, the information may not be complete due to the inability of some agencies to provide information in the categories we requested, including some of the data supporting our estimates of contractor-owned workstations with FDCC compliance, and possibly some other estimates. We conducted this performance audit from December 2008 to March 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: Percentage of Agency Workstations with FDCC Settings Implemented as of September 2009: The table below shows, for the 24 agencies from which we collected data using our data collection instrument, the percentage of applicable Windows XP and Vista workstations that have all FDCC settings implemented with no deviations, workstations with an agency baseline implemented and deviations documented, and workstations that do not have the settings implemented. Table 7: Agency-Reported Percentages of Workstations with FDCC Settings Implemented as of September 2009: Agency: Agriculture; Platform: XP; Implemented without deviations: 8%; Implemented with deviations (agency baseline): 0%; Not implemented: 92%. Agency: Agriculture; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 0; Not implemented: 100%. Agency: Commerce; Platform: XP; Implemented without deviations: 9%; Implemented with deviations (agency baseline): 91%; Not implemented: 0. Agency: Commerce; Platform: Vista; Implemented without deviations: 23%; Implemented with deviations (agency baseline): 77%; Not implemented: 0. Agency: Defense; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 96%; Not implemented: 4%. Agency: Defense; Platform: Vista; Implemented without deviations: 99%; Implemented with deviations (agency baseline): 0[A]; Not implemented: 1%. Agency: Education; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Education; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Energy; Platform: XP; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): 72%; Not implemented: Unknown. Agency: Energy; Platform: Vista; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): 71%; Not implemented: Unknown. Agency: Environmental Protection Agency; Platform: XP; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): Unknown; Not implemented: Unknown. Agency: Environmental Protection Agency; Platform: Vista; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): Unknown; Not implemented: Unknown. Agency: General Services Administration; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 84%; Not implemented: 16%. Agency: General Services Administration; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Health and Human Services; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 99%; Not implemented: 1%. Agency: Health and Human Services; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 94%; Not implemented: 6%. Agency: Homeland Security; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 5%; Not implemented: 95%. Agency: Homeland Security; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 29%; Not implemented: 71%. Agency: Housing and Urban Development; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Housing and Urban Development; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Interior; Platform: XP; Implemented without deviations: 1%; Implemented with deviations (agency baseline): 48%; Not implemented: 51%. Agency: Interior; Platform: Vista; Implemented without deviations: 69%; Implemented with deviations (agency baseline): 18%; Not implemented: 13%. Agency: Justice; Platform: XP; Implemented without deviations: 3%; Implemented with deviations (agency baseline): 96%; Not implemented: 1%. Agency: Justice; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Labor; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Labor; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: National Aeronautics and Space Administration; Platform: XP; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): 87%; Not implemented: Unknown. Agency: National Aeronautics and Space Administration; Platform: Vista; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): 52%; Not implemented: Unknown. Agency: National Science Foundation; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: National Science Foundation; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Nuclear Regulatory Commission; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Nuclear Regulatory Commission; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Office of Personnel Management; Platform: XP; Implemented without deviations: 1%; Implemented with deviations (agency baseline): 40%; Not implemented: 59%. Agency: Office of Personnel Management; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Small Business Administration; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Small Business Administration; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Social Security Administration; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Social Security Administration; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: State; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: State; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: Transportation; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100; Not implemented: 0. Agency: Transportation; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Treasury; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 99%; Not implemented: 1%. Agency: Treasury; Platform: Vista; Implemented without deviations: 0; Implemented with deviations (agency baseline): 99%; Not implemented: 1%. Agency: U.S. Agency for International Development; Platform: XP; Implemented without deviations: 0; Implemented with deviations (agency baseline): 100%; Not implemented: 0. Agency: U.S. Agency for International Development; Platform: Vista; Implemented without deviations: Not applicable; Implemented with deviations (agency baseline): Not applicable; Not implemented: Not applicable. Agency: Veterans Affairs; Platform: XP; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): Unknown; Not implemented: Unknown. Agency: Veterans Affairs; Platform: Vista; Implemented without deviations: Unknown; Implemented with deviations (agency baseline): Unknown; Not implemented: Unknown. Source: GAO analysis of data reported by agencies in GAO data collection instrument. Note: Percentages in the table have been rounded. Both the number of government-owned and contractor-owned workstations were included in agency totals if the number of contractor-owned workstations was not separated from the number of government-owned workstations that was provided by the agency. Agencies that did not have Vista workstations were listed as not applicable. An agency that was unable to provide sufficient data to determine the status of implementation was listed as unknown. [A] Agency reported having no deviations for the implementation of the settings on this operating system. [End of table] [End of section] Appendix III: Recommendations to Departments and Agencies: Agriculture: To improve the department's implementation of FDCC, we recommend that the Secretary of Agriculture take the following three actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * document deviations to FDCC and have them approved by a designated accrediting authority; and: * develop, document, and implement a policy to approve deviations by a designated accrediting authority. Commerce: To improve the department's implementation of FDCC, we recommend that the Secretary of Commerce take the following three actions: * ensure all components have acquired and deployed a NIST-validated SCAP tool to monitor compliance with FDCC; * ensure all components develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Defense: To improve the department's implementation of FDCC, we recommend that the Secretary of Defense take the following two actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion, and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Energy: To improve the department's implementation of FDCC, we recommend that the Secretary of Energy take the following five actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * document deviations to FDCC and have them approved by a designated accrediting authority; * ensure all components that are required to implement FDCC have acquired and deployed a NIST-validated SCAP tool to monitor compliance with FDCC; * ensure all components that are required to implement FDCC develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool; and: * ensure that language is included in contracts of those components that are required to implement FDCC to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Environmental Protection Agency: To improve the agency's implementation of FDCC, we recommend that the Administrator of the Environmental Protection Agency take the following two actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion, and: * develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority. General Services Administration: To improve the agency's implementation of FDCC, we recommend that the Administrator of the General Services Administration take the following action: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion. Health and Human Services: To improve the department's implementation of FDCC, we recommend that the Secretary of Health and Human Services take the following three actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Homeland Security: To improve the department's implementation of FDCC, we recommend that the Secretary of Homeland Security take the following four actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority; * develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Housing and Urban Development: To improve the department's implementation of FDCC, we recommend that the Secretary of Housing and Urban Development take the following three actions: * acquire and deploy a NIST-validated SCAP tool to monitor compliance with FDCC; * develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Interior: To improve the department's implementation of FDCC, we recommend that the Secretary of the Interior take the following three actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * ensure all components implement the department's existing policy to document deviations to FDCC and have those deviations approved by a designated accrediting authority; and: * ensure all components implement the department's existing policy to acquire and deploy a NIST-validated SCAP tool and monitor compliance with FDCC. Justice: To improve the department's implementation of FDCC, we recommend that the Attorney General take the following four actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority; * complete deployment of a NIST-validated SCAP tool to monitor FDCC compliance; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Labor: To improve the department's implementation of FDCC, we recommend that the Secretary of Labor take the following action: * complete efforts to ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. National Aeronautics and Space Administration: To improve the agency's implementation of FDCC, we recommend that the Administrator of the National Aeronautics and Space Administration take the following action: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion. National Science Foundation: To improve the agency's implementation of FDCC, we recommend that the Director of the National Science Foundation take the following action: * complete deployment of a NIST-validated SCAP tool to monitor FDCC compliance. Nuclear Regulatory Commission: To improve the agency's implementation of FDCC, we recommend that the Chairman of the Nuclear Regulatory Commission take the following two actions: * develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority, and: * ensure that all components include language in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Office of Personnel Management: To improve the agency's implementation of FDCC, we recommend that the Director of the Office of Personnel Management take the following three actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * document deviations to FDCC and have them approved by a designated accrediting authority; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Small Business Administration: To improve the agency's implementation of FDCC, we recommend that the Administrator of the Small Business Administration take the following two actions: * develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority, and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Social Security Administration: To improve the agency's implementation of FDCC, we recommend that the Commissioner of the Social Security Administration take the following four actions: * develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority; * complete deployment of a NIST-validated SCAP tool to monitor compliance with FDCC; * develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Transportation: To improve the department's implementation of FDCC, we recommend that the Secretary of Transportation take the following two actions: * complete deployment of a NIST-validated SCAP tool to monitor compliance with FDCC, and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Treasury: To improve the department's implementation of FDCC, we recommend that the Secretary of the Treasury take the following two actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion, and: * ensure that all components include language in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. U.S. Agency for International Development: To improve the agency's implementation of FDCC, we recommend that the Administrator of the U.S. Agency for International Development take the following action: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Veterans Affairs: To improve the department's implementation of FDCC, we recommend that the Secretary of Veterans Affairs take the following four actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * acquire and deploy a NIST-validated SCAP tool to monitor compliance with FDCC; * develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool; and: * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. [End of section] Appendix IV: Comments from the U.S. Department of Agriculture: United States Department of Agriculture: Office of the Chief Information Officer: 1400 Independence Avenue SW: Washington, DC 20250: To: Gregory Wilshusen: Director: Information Security Issues: Government Accountability Office: From: [Signed by] Christopher L. Smith: Chief Information Officer: Office of the Chief Information Officer: Subject: USDA Comments on Draft Report GA0-10-202: The United States Department of Agriculture (USDA) is pleased with the opportunity to review and comment on the draft GAO report Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements (GA0-10-202). USDA agrees with and accepts the findings of the draft Report, as they pertain to USDA. The draft Report recommends that the Secretary of Agriculture take the following three actions: * complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion; * document deviations to FDCC and have them approved by a designated accrediting authority (DAA); and; * develop, document, and implement a policy to approve deviations by a designated accrediting authority. We support GAO's call for further clarification from OMB on the governmentwide standards for documenting deviations from the FDCC and would be pleased to work with OMB, NIST and other departments and agencies to further that end. [End of section] Appendix V: Comments from the Department of Commerce: Note: GAO comment supplementing those in the report text appear at the end of this appendix. The Secretary Of Commerce: Washington, D.C. 20230: February 18, 2010: Mr. Gregory C. Wilshusen: Director, Information Security Issues: Government Accountability Office: Washington, DC 20548: Dear Mr. Wilshusen: Thank you for the opportunity to review the General Accountability Office's (GAO) draft report, "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements" (GA0-10- 202). We concur that this report is a reasonable assessment of the current Federal Desktop Core Configuration (FDCC) situation among federal agencies. The Department of Commerce (Department) offers the following comments regarding the GAO's conclusions. * As noted in GA0-10-202, there remain some technically problematic FDCC settings for many agencies and, as such, there may be some scenarios where risk should be accepted. * FDCC applicability has been clarified by the National Telecommunications and Information Administration's guidance; however, it has not been officially issued in an updated memorandum from the Office of Management and Budget (OMB). * There is not clear guidance from OMB in regard to FDCC deviations and how these deviations are documented by federal agencies; the FDCC deviations are an operational necessity in some cases. * Collaboration on future secure configuration standards should involve a broader audience. * On page 11, the report states that FDCC provides a baseline level of Security; however, during meetings with GAO, the Department's National Institute of Standards and Technology has expressed that we do not consider FDCC to be a baseline. [See comment 1] We look forward to further communications with GAO regarding its conclusions. Sincerely, Signed by: Gary Locke: The following are GAO's comments on the Department of Commerce's letter dated February 18, 2010. GAO Comment: 1. In its March 2007 directives,[Footnote 44] OMB stated that an objective of FDCC was to provide a baseline level of security to agencies. We used OMB's characterization of FDCC for this report. [End of section] Appendix VI: Comments from the Department of Defense: Office Of The Assistant Secretary Of Defense: Networks And Information Integration: 6000 Defense Pentagon: Washington, D.C. 20301-6000: Gregory C. Wilshusen: Director, Information Security Issues: Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Mr. Wilshusen: This is the Department of Defense (DoD) response to the Government Accountability Office (GAO) draft report, GAO-10-202, "Information Security: Agencies Need to Implement Federal Desktop Core Configuration (FDCC) Requirements" dated January 20, 2010 (GAO Code 311014). I share the GAO conclusion that the FDCC initiative was an innovative approach by OMB to standardize and thereby strengthen information security at federal agencies. I appreciate the opportunity to provide the enclosed comments on the draft report. My staff and I are responsible for overseeing the implementation of the GAO report recommendations. My point of contact for questions regarding FDCC is Mr. John Hunter, (703) 602-9927. Sincerely, Signed by: Gary D. Guissanie: Acting Deputy Assistant Secretary of Defense (Cyber, Identity and Information Assurance): Enclosure: As stated: [End of letter] GAO Draft Report Dated January 20, 2010: GA0-10-202 (GAO Code 311014): "Information Security: Agencies Need To Implement Federal Desktop Core Configuration Requirements" Department Of Defense Comments To The GAO Recommendations: Recommendation 1: The GAO recommends that the Secretary of Defense complete implementation of the agency's Federal Desktop Core Configuration (FDCC) baseline, including establishing firm milestones for completion. (See pages 51-52/GAO Draft Report) DoD Response: Concur. The Department of Defense has made significant progress in implementing the FDCC baseline, and the Assistant Secretary of Defense (Networks and Information Integration) will work with the Components to establish firm milestones for completion. Recommendation 2: The GAO recommends that the Secretary of Defense ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. (See pages 51- 52/GAO Draft Report) DoD Response: Concur. The Assistant Secretary of Defense (Networks and Information Integration) will work closely with the OSD staff and Components to ensure new acquisitions include FDCC settings. Additional Recommendation From Department Of Defense: Contract language should be included in the Federal Acquisition Regulation (FAR) "to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them." This would provide the appropriate coverage for a Federal-wide IT contract issue. Rationale: FDCC is a Federal Government-wide mandate not a Defense- specific acquisition requirement. [End of section] Appendix VII: Comments from the General Services Administration: U.S. General Services Administration: GSA Administrator: 1800 F Street, NW: Washington, DC 20405-0002: Telephone: (202) 501-0880: Fax: (202) 219-1243: [hyperlink, http://www.gsa.gov] February 22, 2010: The Honorable Gene L. Dodaro: Acting Comptroller General of the United States: U.S. Government Accountability Office: Washington, DC 20548: Dear Mr. Dodaro: The U.S. General Services Administration (GSA) appreciates the opportunity to review and comment on the draft report, "Information Security: Agencies Need to Implement Federal Desktop Core Configuration (FDCC) Requirements" (GAO-10-202). The U.S. Government Accountability Office (GAO) recommends that the GSA Administrator improve the agency's implementation of FDCC. We agree with the findings and recommendation and will take appropriate action. GSA will complete implementation of the agency's FOGG baseline, including establishing firm milestones for completion. If you have any additional questions or concerns, please do not hesitate to contact me. Staff inquiries may be directed to Ms. Kathleen Turco, Chief Financial Officer. She can be reached at (202) 501-1721. Sincerely, Signed by: Martha Johnson: Administrator: cc: Mr. Gregory C. Wilshusen: Director, Information Technology Security Issues: GAO: [End of section] Appendix VIII: Comments from the Department of Homeland Security: U.S. Department of Homeland Security: Washington, DC 20528: Memorandum For: Gregory C. Wilshusen: Director, Information Security Issues: Government Accountability Office: From: Richard A. Spires: Chief Information Officer: Subject: Comment to GAO Report #10-202 "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements" The Department of Homeland Security (OHS) Office of the Chief Information Officer (OCIO) has reviewed the findings of the Government Accountability Office (GAO) Report, 410-237 "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements," dated February 2010. The increase in security incidents and continuing weakness in security controls on information technology systems at federal agencies highlight the continuing need for improved information security. To standardize and strengthen agencies' security, the Office of Management and Budget (OMB), in collaboration with the National Institute of Standards and Technology (MST), launched the Federal Desktop Core Configuration (FDCC) initiative in 2007. GAO was asked to (1) identify the goals, objectives, and requirements of the initiative; (2) determine the status of actions federal agencies have taken, or plan to take, to implement the initiative; and (3) identify the benefits, challenges, and lessons learned in implementing this initiative. To accomplish this, GAO reviewed policies, plans, and other documents at the 24 major executive branch agencies; reviewed OMB and NISI guidance and documentation; and interviewed officials. GAO recommended that DHS take four actions to improve the Department's implementation of FDCC. OCIO's comments on the specific recommendations are as follows: Recommendation #1: Complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion. OCIO March 2010 Response: OCIO concurs. DHS developed a FDCC draft baseline which is currently under review by the designated accrediting authority. A copy of the FDCC draft baseline and the FDCC compliance milestone tracking status is enclosed for your reference. Recommendation #2: Develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority. OCIO March 2010 Response: OCIO concurs. DHS has developed a process to approve deviations from the FDCC baseline, which is maintained and controlled by the DI-IS Infrastructure Change Control Board (ICCB). A copy of the draft "FDCC Baseline Update Process" is enclosed for your reference. Recommendation #3: Develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated Security Content Automation Protocol (SCAP) tool. OCIO March 2010 Response: OCIO concurs. Each DHS Component has chosen a NIST-validated SCAP tool that best fits into its IT infrastructure. Below is a list of the SCAP tools used by each Component to monitor their FDCC compliance: * Customs and Border Protection uses Big Fix. * U.S. Citizenship and Immigration Services uses McAfee. * Federal Emergency Management Agency uses Tenable Nessus. * Federal Law Enforcement Training Center uses Tenable Nessus and McAfee. * DHS Headquarters uses Tenable Nessus and McAfee. * Immigration and Customs Enforcement uses Big Fix. * DHS Office of Inspector General uses Tenable Nessus. * Transportation Services Administration uses Secure Elements C5. * U.S. Coast Guard uses Secutor Prime. * U.S. Secret Service uses Threat Guard. Recommendation #4: Ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. OCIO March 2010 Response: OCIO concurs with caveat. DHS already has regulations in place to ensure new acquisitions meet FDCC requirements. The Department of Homeland Security Acquisition Regulation (HSAR) of lune 2006 establishes uniform acquisition policies and procedures, which implement and supplement the Federal Acquisition Regulation (FAR). HSAR Section 3052.204-70 "Security requirements for unclassified information technology resources of the HSAR" states: Within 6 months after contract award, the contractor, hall submit written proof of IT Security accreditation to DHS for approval by the DHS Contracting Officer. Accreditation will proceed according to the criteria of the DHS Sensitive System Policy Publication, 4300A (Version 2.1, July 26, 2004) or any replacement publication, which the Contracting Officer will provide upon request. This accreditation will include a final security plan, risk assessment, security test and evaluation, and disaster recovery plan/continuity of operations plan. This accreditation, when accepted by the Contracting Officer, shall be incorporated into the contract as a compliance document. The contractor shall comply with the approved accreditation documentation. DHS Sensitive System Policy Publication 4300A, ID 3.7.e states: "Workstations shall be configured in accordance with DHS guidance on FDCC." Enclosures:: DHS FDCC baseline: DHS FDCC compliance milestone tracking status: DHS FDCC Baseline Update Process: MD 4300A "DHS Sensitive Systems Policy Directive 4300A:" 311014 Draft GAO #10-202 for Agency Comment, "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements" [End of section] Appendix IX: Comments from the Department of Housing and Urban Development: Note: GAO's comments supplementing those in the report's text appear at the end of this appendix. U.S. Department Of Housing And Urban Development: Office Of The Chief Information Officer: Washington, D.C. 20410-3000: February 17, 2010: Mr. Gregory C. Wilshusen: Director, Information Security Issues: U.S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Mr. Wilshusen: Thank you for the opportunity to comment on the Government Accountability Office (GAO) draft report entitled, Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements (GA0-10-202). The Department of Housing and Urban Development reviewed the draft report and concurs with the following recommendations for Executive Actions: * acquire and deploy a NIST-validated SCAP tool to monitor compliance with FDCC; * develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool. With respect to the above items, HUD anticipates a contract award in the 3rd quarter of Fiscal Year 2010, with implementation by September 30, 2010. However, HUD provides the following comments to address the remaining recommendations: * develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority. [See comment 1] The Department has developed a FDCC Waiver Request Standard Operating Procedure (SOP). In response to a GAO request, the attached document was provided on December 15, 2009. * ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. [See comment 2] Attached is a standard contract clause that the HUD Chief Procurement Officer issued in June 2007 for use in all IT contracts. HUD is in compliance with the above language requirement for new acquisitions. The Department remains committed to improving information security and reducing Information Technology operating costs, the major goals of the FDCC. More definitive information with timelines will be provided once the final report has been issued. If you have any questions or require additional information, please contact Jerry E. Williams, Chief Information Officer, at 202-708-0306. Sincerely, Signed by: [Illegible], for: Jerry E. Williams: Chief Information Officer: Enclosure: The following are GAO's comments on the Department of Housing and Urban Development's letter dated February 17, 2010. GAO Comments: 1. After reviewing additional documentation provided by department representatives, we agreed that the department had met the requirement and modified the column "have policy to approve deviations by designated authority" in table 4 from "no" to "yes." The recommendation to this finding was removed from the report. 2. After subsequent discussion with department representatives, they orally concurred with our recommendation. [End of section] Appendix X: Comments from the Department of the Interior: United States Department of the Interior: Office Of The Secretary: Washington, DC 20240: February 23, 2010: Mr. Gregory C. Wilshusen: Director, Information Security Issues: U.S. Government Accountability Office: 441 G Street, N.W. Washington, D.C. 20548: Dear Mr. Wilshusen: Thank you for providing the Department of the Interior the opportunity to review and comment on the draft Government Accountability Office Report entitled, "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements" (GA0-10-202). The Department concurs with the recommendations subject to the modifications suggested in the enclosure. We hope the technical comments and the additional information provided will assist you in preparing the final report. If you have any questions, or need additional information, please contact the Department's Chief Information Security Officer (CISO), Lawrence K. Ruffin, at (202) 208-5419 or Davene Barton at (202) 208-5438. Sincerely, Signed by: Rhea Suh: Assistant Secretary: Policy, Management and Budget: Enclosure: [End of section] Appendix XI: Comments from the Department of Labor: Note: GAO's comments supplementing those in the report's text appear at the end of this appendix. U.S. Department of Labor: Office of the Assistant Secretary for Administration and Management: Washington, D.C. 20210: February 12, 2010: Gregory C. Wilshusen: Director, Information Security Issues: Government Accountability Office: 441 G Street, N.W. Washington, DC 20548: Dear Mr. Wilshusen: This letter is provided in response to the draft report GA0-10-202, Agencies Need to Implement Federal Desktop Core Configuration Requirements, dated February 2010. We take seriously our responsibility to ensure the protection of our computer systems and information with which we are entrusted. Overall, the draft reports provide a fair depiction of the Department of Labor (DOL) efforts to meet the OMB's mandate for implementing the Federal Desktop Core Configuration (FDCC). However I ask that the GAO reconsider their assessment regarding the Department's implementation of a National Institute of Standards and Technology (NIST)-validated Security Content Automation Protocol (SCAP) tool and FDCC acquisition language. The areas in the draft report to reconsider include: * Page 26, Table 5: Through the deployment and use of ThreatGuard DOL has met the requirements for acquiring and utilizing a NISI-validated SCAP tool, thus the table should indicate a "Yes' response. DOL currently utilizes the tool to monitor all DOL agency FDCC baseline configurations and also conducts periodic scans of agency baselines configuration to ensure continuing compliance. [See comment 1] * Page 28, Table 6: All appropriate new contracts awarded since the issuance of the OMB mandate includes the required FDCC acquisition language as appropriate, thus the table should indicate partial implementation. This statement is further supported by the FY09 OIG FISMA assessment results. DOL acknowledges that challenges exist in updating legacy contracts issued prior to OMB mandate. Additionally, DOL has begun a comprehensive exercise to review and modify all appropriate legacy contracts to include the required FDCC language over the next 18 months. [See comment 2] * Page 55, Bullet 1: Recommends DOL complete deployment of a NIST- validated SCAP tool to monitor FDCC compliance. DOL has implemented a NIST-validated SCAP tool called ThreatGuard. The tool provides DOL adequate capabilities for monitoring its compliance with FDCC and other NIST issued SCAP content. DOL is planning to enhance its use of ThreatGuard and other DOL implemented NIST-validated SCAP tools to provide real-time monitoring of baseline configurations in Fiscal Year 2011. [See comment 3] * Page 55, Bullet 2: Recommends DOL ensure FDCC language is included in contracts. As mentioned above, all new contacts comply with the FDCC mandate. DOL plans to modify all legacy contracts to included the required FDCC language over the next 18 months. [See comment 4] Thank you again for the opportunity to comment on the draft report. If you have any questions or you require further discussion about our comments, please have your staff contact Mrs. Tonya Manning, DOL Chief Information Security Officer, at Manning.Tonya@dol.gov or 202-693-4431. Sincerely, Signed by: T. Michael Kerr: Assistant Secretary for Administration and Management: Chief Information Officer: The following are GAO's comments on the Department of Labor's letter dated February 12, 2010. GAO Comments: 1. After reviewing additional documentation provided, we agreed that the department had met the requirement and modified the column "NIST- validated SCAP tool acquired and deployed" in table 5 from "no" to "yes." 2. After reviewing additional documentation provided by department representatives, we agreed that the department had partially met the requirement and modified the column "language incorporated" in table 6 from "no" to "partially." 3. The recommendation to this finding was removed (see comment 1). 4. The recommendation to this finding was modified as appropriate (see comment 2). [End of section] Appendix XII: Comments from the National Aeronautics and Space Administration: National Aeronautics and Space Administration: Headquarters: Office of the Chief Information Officer: Washington, DC 20546-0001: February 19, 2010: Mr. Gregory C. Wilshusen: Director, Information Security Issues: United States Government Accountability Office: Washington, DC 20548: Dear Mr. Wilshusen: The National Aeronautics and Space Administration (NASA) appreciates the opportunity to review and comment on the draft report entitled, "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements" (GA0-10-202). In the draft report, GAO makes one recommendation relating to NASA's implementation of Federal Desktop Core Configuration (FDCC) requirements, specifically: Recommendation: To improve the agency's implementation of FDCC, we recommend that the Administrator of the National Aeronautics and Space Administration complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion. Response: NASA will establish firm milestones to complete an implementation of the agency's FDCC baseline while exercising caution not to disable unique mission orientated capabilities. IT security is a compromise between available capabilities and applicable controls. NASA set a goal for 85 percent of the agency systems within the defined FDCC software and system scope to comply with the original core configuration requirement. NASA believes general purpose office automation systems are more amenable to the use of the FDCC controls than systems which provide Agency mission-unique functions. Therefore, the 85 percent implementation baseline goal represents an operational reality and offers a reasonable balance between security configuration and operational necessities. NASA would like to note that future guidance and configurations must keep pace with industry updates in common operating systems and applications. The FDCC technical guidance and policy releases tend to lag behind software releases. In order to remain relevant and viable, FDCC technical and policy development must advance at the pace of Federal Agency procurements of new commercial software. Thank you for the opportunity to review the draft report. We look forward to your final report to Congress. If you have any questions or require additional information, please don't hesitate to contact the NASA Deputy CIO for IT Security, Jerry Davis at (202) 358-1401. Sincerely, Signed by: Linda Cureton: Chief Information Officer: [End of section] Appendix XIII: Comments from the Office of Personnel Management: Note: GAO's comments supplementing those in the report's text appear at the end of this appendix. UNITED STATES OFFICE OF PERSONNEL MANAGEMENT: Office of the Director: Washington, DC 20415: Memorandum For Gregory C. Wilshusen: Director: Government Accountability Office: From: [Signed by] Matthew E. Perry: Chief Information Officer: Subject: Government Accountability Office Audit Regarding Agencies Need to Implement Federal Desktop Core Configuration Requirements: This memorandum is in response to the GAO (Government Accountability Office) audit finding released in February of 2010, GA0-10-202 Federal Desktop Core Configuration (FDCC). This memorandum will address two areas; comments specific to the factual representations within the report, as well as a response to the recommendations section of the report. Comments specific to the report: 1. Page 24, Table 4 states that the Office of Personnel Management (OPM) did not provide deviations and had no policy to review deviations. This is incorrect. OPM provided Office of Management and Budget (OMB) the list of deviations for their data call on March 31 2008. OPM has updated its workstation configuration policy to require that deviations be documented and approved through our Change Control process. Both of these artifacts were provided to GAO during their engagement. 2. Page 43-44, "GAO recommends that OMB, among other things, issue explicit guidance on assessing the risks of deviations and monitoring compliance with FDCC. GAO also recommends that agencies take steps to fully implement FDCC requirements." For FDCC to be successful, the guidance should come with funding. 3. Page 3, The initiative mandated that Federal agencies implement standardized configuration settings on workstations with Windows XP or Vista operating systems. FDCC needs to be updated to include Windows7. Response to the GAO Audit Recommendations: Finding. "complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion;" Response: OPM has completed several significant milestones for OPM's FDCC compliance including integrating FDCC compliance into the new image creation process for PCs deployed after March 2008. This ensures that all new PCs adhere to OPM standards for FDCC compliance. OPM has not established a timeline for testing and evaluating images that were deployed prior to the FDCC adoption in March of 2008. OPM has a FY 2010 project defined to coordinate the testing of FDCC settings with OPM legacy images and test all legacy COTS and custom developed applications for interoperability. Due to the complexity of this initiative, we anticipate that this project will be completed in 2011. Finding: "document deviations to FDCC and have them approved by a designated accrediting authority;" [See comment 1] Response: OPM has been documenting deviations for all FDCC settings since 2008. All images along with the deviations presently go through the OPM Change Control Board (CCB) for approval and documentation. This CCB process is in line with the accreditation boundary of the LAN/WAN general support system which includes image security controls and is monitored as part of OPM's continuous monitoring processes. Finding: "develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority;" [See comment 2] Response: OPM has updated and provided GAO the OPM Workstation Hardening Policy which details the FDCC requirements as well as the requirements to monitor and manage deviations within our change control processes. Finding: "ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them." Response: In practice, the FDCC language has been inserted into major IT initiatives ongoing at OPM, however, standard language has not been universally adopted within all contracts. The CIO's office will work to make the language standard in all new contracts and identify the best means to address contract modifications for existing contracts. In summary, OPM has addressed many of the FDCC compliance requirements and all laptop computers and images deployed after March 2008 adhere to the FDCC security settings. Additional projects are underway to address legacy images to ensure uniform compliance. The following are GAO's comments on the Office of Personnel Management's letter dated March 2, 2010. GAO Comments: 1. After subsequent discussion with agency representatives, they orally concurred with our recommendation. 2. After reviewing additional documentation provided by agency representatives, we agreed that the agency had met the requirement and modified the column "have policy to approve deviations by designated authority" in table 4 from "no" to "yes." The recommendation to this finding was removed from the report. [End of section] Appendix XIV: Comments from the Social Security Administration: Social Security Administration: The Commissioner: Baltimore, Md 21235-0001: March 2, 2010: Mr. Gregory Wilshusen: Director, Information Security Issues: U.S. Government Accountability Office: 441 G Street, NW: Washington, D.C. 20548: Dear Mr. Wilshusen: Thank you for the opportunity to review and comment on the Government Accountability Office (GAO) draft report, "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements" (GAO-10-202). Attached is our response to the report. If you have any questions, please contact me or have your staff contact Candace Skumik, Director, Audit Management and Liaison Staff at (410) 965-4636. Sincerely, Signed by: Michael J. Astrue: Enclosure: Comments On The Government Accountability Office (GAO) Draft Report, "Information Security: Agencies Need To Implement Federal Desktop Core Configuration (FDCC) Requirements" (GAO-10-202): Recommendation 1: Develop, document, and implement a policy to approve deviations to FDCC by a designated accrediting authority. Comment: We agree. We already have a formal systems security policy that we used to approve deviations to FDCC. Our policy and process for managing security configurations is contained in our Information Systems Security Handbook, Chapter 17. We will review this policy to ensure that it adequately documents the review and approval of FDCC deviations. As an agency that manages more than 100,000 Windows systems, we take the implementation of the FDCC settings very seriously. We continually look for ways to reduce our exposure to cybersecurity threats and protect our network and systems. Since the announcement of Commonly Accepted Security Configurations for Windows Operating Systems in 2007, we have successfully met all FDCC milestones. We have procured a validated Security Content Automation Protocol (SCAP) product, tested our Windows configuration settings using the SCAP product, and provided justification for SCAP deviations. Many of the SCAP deviations we found are the result of more stringent agency settings that exceed the FDCC standard. Our Office of Systems maintains approved security configurations for Windows-based systems that incorporate FDCC settings to securely accomplish our mission. We conduct regular security assessments to review our approved security configurations. Recommendation 2: Complete deployment of a NIST-validated SCAP tool to monitor compliance with FDCC. Comment: We agree. We are currently testing McAfee's National Institute of Standards and Technology (NIST)-validated Security Content Automation Protocol (SCAP) tool and anticipate deployment by the end of April 2010. Recommendation 3: Develop, document, and implement a policy to monitor FDCC compliance using a NIST-validated SCAP tool. Comment: We agree. We will finalize our policy to monitor FDCC compliance as we approach completion of NIST-validated SCAP tool testing. Recommendation 4: Ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. Comment: We agree. We will include language in our contracts to ensure that new acquisitions include FDCC settings and that information technology products can operate effectively using the settings, where appropriate. [End of section] Appendix XV: Comments from the Department of the Treasury: DEPARTMENT OF THE TREASURY: WASHINGTON, D.C. 20220: February 12, 2010: Mr. Gregory C. Wilshusen: Director, information Security Issues: U.S. Government Accountability Office: 410 G Street, NW: Washington, DC 20548: Thank you for your draft report on "Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements." In demonstrating our commitment to the Federal Desktop Core Configuration (FDCC) initiative, Treasury has implemented he 674 FDCC settings on the Department's 130,000 personal computers and laptops. The Department appreciates GAO's recommendations to complete the implementation of our FDCC baseline and to incorporate contract language to ensure new acquisitions include FDCC settings and products of IT providers operate effectively when using them. Responding to these recommendations, the Department has developed language for new acquisition contracts and anticipates completing implementation in Fiscal Year 2010 for one remaining bureau. Additionally, the Department has now completed implementation of its baseline with 100% of its personal computers and laptops being FDCC compliant. With these accomplishments, Treasury will receive the maximum protection and benefit from FDCC guidelines. Thank you for your important efforts during this review. Please do not hesitate to contact me at 202-622-1200 should you have any questions. Sincerely, Signed by: Michael D. Duffy: Deputy Assistant Secretary for Information Systems and Chief Information Officer: [End of section] Appendix XVI: Comments from the U.S. Agency for International Development: U.S. Agency tor International Development: 1300 Pennsylvania Avenue, NW: Washington, DC 20523: February 18, 2010: Mr. Thomas Melito: Director: International Affairs and Trade: U.S. Government Accountability Office: 441 G Street, N.W. Washington, D.C. 20548: Dear Mr. Melito: am pleased to provide the U.S. Agency for International Development's (USAID) formal response on the draft GAO report entitled, "Information Security Agencies Need to implement Federal Desktop Core Configuration Requirements" (GAO-10-202). The enclosed USAID comments are provided for incorporation with this letter as an appendix to the final report. Thank you for the opportunity to respond to the GAO draft report and for the courtesies extended by your staff in the conduct of this audit review. Sincerely, Signed by: Drew W. Luten: Senior Deputy Assistant Administrator: Bureau of Management: Enclosure: a/s: USAID COMMENTS ON GAO Draft Report No. (GAO-10-202): GAO Recommendation 1: To improve the agency's implementation of FDCC, we recommend that the Administrator of the Agency for International Development take the following action: * Ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. USAID Management Response: USAID concurs with the recommendation. [End of section] Appendix XVII: Comments from the Department of Veterans Affairs: Department of Veterans Affairs: Office of the Secretary: March 8, 2010: Mr. Gregory C. Wilshusen: Director: Information Security Issues: 441 G Street, NW: Washington, DC 20548: Dear Mr. Wilshusen: The Department of Veterans Affairs (VA) has reviewed the Government Accountability Office's (GAO) draft report, Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements (GAO-10202). VA agrees with GAO's conclusions and concurs with GAO's four recommendations to the Department. The enclosure provides specific details on VA's actions to GAO's recommendations. VA appreciates the opportunity to comment on your draft report. Sincerely, Signed by: John R. Gingrich: Chief of Staff: Enclosure: Department of Veterans Affairs (VA) Comment to Government Accountability Office (GAO Draft Report Information Security: Agencies Need to Implement Federal Desktop Core Configuration Requirements (GAO- 10-202): GAO recommendation: To improve the departments implementation of FDCC, we recommend that the Secretary of Veterans Affairs take the following four actions: Recommendation 1: Complete implementation of the agency's FDCC baseline, including establishing firm milestones for completion. VA Comments: Concur. The target date for completion of all FDCC baseline settings is September 30, 2010. A project plan, complete with milestones, has been established to monitor FDCC compliance. GAO Recommendation 2: Acquire and deploy a NIST-validated SCAP tool to monitor compliance with FDCC. VA Comments: Concur. The VA owns three SCAP tools; however, due to challenges involved in deploying each, none have been implemented to date. VA plans to overcome these challenges and complete implementation by September 30, 2010. GAO Recommendation 3: Develop, document, and implement a policy to monitor FDCC compliance using a NEST-validated SCAP tool. VA Comments: Concur. A project plan has been established to monitor FDCC compliance. The target date for issuance of a draft policy and handbook (procedures) is September 2010. GAO Recommendation 4: Ensure that language is included in contracts to ensure new acquisitions include FDCC settings and products of information technology providers operate effectively using them. VA Comments: Concur. Draft VA Handbook 6500.6, Contract Security (currently in final review by VA Records Management) provides the following language that can be added to contracts, as appropriate, regarding FDCC. The highlighted revisions address future versions of browsers and operating systems. Information System Design And Development: Information systems that are designed or developed for, or on behalf of VA at non-VA facilities shall comply with all VA directives developed in accordance with FISMA, HIPAA, MST, and related VA security and privacy control requirements for Federal information systems. This includes standards for the protection of electronic PHI, outlined in 45 C.F.R Part 164, Subpart C, information and system security categorization level designations in accordance with FIPS 199 and FIPS 200 with implementation of all baseline security controls commensurate with the FIPS 199 system security categorization (reference Appendix D of VA Handbook 6500, VA Information Security Program). During the development cycle a Privacy Impact Assessment (PIA) must be completed, provided to the COTR, and approved by the VA Privacy Service in accordance with Directive 6507, VA Privacy Impact Assessment. The contractor/subcontractor shall certify to the COTR that applications are fully functional and operate correctly as intended on systems using the VA Federal Desktop Core Configuration (FDCC) once approved, and the common security configuration guidelines provided by N1ST or the VA. This includes Internet Explorer 7 configured to operate on Windows XP, and Vista (inProtected Mode on Vista). The standard installation, operation, maintenance, updating, and patching of software shall not alter the configuration settings for the VA approved and FDCC configuration. Information technology staff must also use the Windows Installer Service for installation to the default "program files" directory and silently install and uninstall. [End of section] Appendix XVIII: GAO Contact and Staff Acknowledgments: GAO Contact: Gregory C. Wilshusen, (202) 512-6244 or wilshuseng@gao.gov: Staff Acknowledgments: In addition to the individual named above, Jeffrey Knott (Assistant Director), John Bainbridge, William Cook, Kami Corbett, Neil Doherty, Michele Fejfar, Nancy Glover, Valerie Hopkins, Lee McCracken, Zsaroq Powe, Carl Ramirez, and Shawn Ward made key contributions to this report. [End of section] Footnotes: [1] Most recently, GAO, High-risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January 2009). [2] The 24 major departments and agencies are the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, Justice, Labor, State, Transportation, the Treasury, and Veterans Affairs; the Environmental Protection Agency, General Services Administration, National Aeronautics and Space Administration, National Science Foundation, Nuclear Regulatory Commission, Office of Personnel Management, Small Business Administration, Social Security Administration, and U.S. Agency for International Development. [3] 31 U.S.C. § 901. [4] GAO, Information Security: Agencies Make Progress in Implementation of Requirements, but Significant Weaknesses Persist, [hyperlink, http://www.gao.gov/products/GAO-09-701T] (Washington, D.C.: May 19, 2009). [5] Statement of the Director of National Intelligence before the Senate Select Committee on Intelligence, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence (Washington, D.C.: Feb. 12, 2009). [6] GAO, Information Security: Agencies Continue to Report Progress, but Need to Mitigate Persistent Weaknesses, [hyperlink, http://www.gao.gov/products/GAO-09-546] (Washington, D.C.: July17, 2009). [7] GAO, Information Security: NASA Needs to Remedy Vulnerabilities in Key Networks, [hyperlink, http://www.gao.gov/products/GAO-10-4] (Washington, D.C.: Oct.15, 2009). [8] GAO, Information Security: Further Actions Needed to Address Risks to Bank Secrecy Act Data, [hyperlink, http://www.gao.gov/products/GAO-09-195] (Washington, D.C.: Jan. 30, 2009). [9] GAO, Information Security: Actions Needed to Better Protect Los Alamos National Laboratory's Unclassified Computer Network, [hyperlink, http://www.gao.gov/products/GAO-08-1001] (Washington, D.C.: Sept. 9, 2008). [10] GAO, Information Security: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program, [hyperlink, http://www.gao.gov/products/GAO-07-870] (Washington, D.C.: Jul. 13, 2007). [11] Enacted as title III of the E-Government Act of 2002, Pub. L. No. 107-347, 116 Stat. 2899, 2946 (Dec. 17, 2002). [12] According to agency-reported data, approximately 3.7 million workstations in use at the 24 federal agencies use either Windows XP or Windows Vista as the operating system. [13] OMB Memorandum for Chief Information Officers, Managing Security Risk By Using Common Security Configurations (Washington, D.C.: Mar. 20, 2007); OMB, Memorandum for the Heads of Departments and Agencies: Implementation of Commonly Accepted Security Configurations for Windows Operating Systems, M-07-11 (Washington, D.C.: Mar. 22, 2007). [14] A group policy object is a collection of group policy settings that is used as part of Microsoft's Active Directory service. The service enables an administrator to define and make changes to various security and policy settings for groups of users and computers. [15] A virtual hard disk holds a virtual machine or computer, which uses software to emulate a computer with a complete hardware system, on another computer. Virtual hard disks can be used to validate the effectiveness of the security configurations and test for compatibility issues with legacy applications in a simulated environment rather than on actual workstations. [16] SCAP was developed by NIST in collaboration with the Departments of Defense and Homeland Security and Mitre Corp to provide a standardized approach to maintaining the security of enterprise systems. With the announcement of FDCC, SCAP was utilized to check the configuration settings on workstations. The FDCC SCAP content is hosted on the National Checklist Program Web site. The National Vulnerability database is also being expanded to host the SCAP component standards. See also NIST, Guide to Adopting and Using the Security Content Automation Protocol (SCAP) (Draft), Special Publication 800-117 (Gaithersburg, MD: May 2009). [17] Under the NIST National Voluntary Laboratory Accreditation Program, NIST accredits independent laboratories to perform specific tests outlined in the SCAP Validation Program Derived Test Requirements document on SCAP tools seeking validation. NIST determines whether to validate a SCAP tool based on the test results provided by the laboratory. Laboratories are accredited based on requirements defined in NIST Handbook 150 and NIST Handbook 150-17. [18] OMB Memorandum for Chief Information Officers, March 20, 2007; OMB, M-07-11 (Mar. 22, 2007). [19] OMB Memorandum for Chief Information Officers, March 20, 2007. [20] A deviation occurs when the parameter for a particular setting is different from the approved or official parameter for the setting. A deviation can have more or less stringent parameters from that of the approved parameter. [21] OMB, M-07-11 (Mar. 22, 2007). [22] NIST frequently asked questions posted on NIST's FDCC Web site, January 28, 2008; OMB Memorandum for Chief Information Officers, Guidance on the Federal Desktop Core Configuration (FDCC), M-08-22 (Washington, D.C.: Aug. 11, 2008). [23] Federal Information Processing Standards are standards to be used by federal organizations that are developed and published by NIST as part of its mandates under 40 U.S.C. § 11331 and 15 U.S.C. § 278g-3, as amended by FISMA. [24] Encryption is used to provide basic data confidentiality and integrity for data by transforming plain text into cipher text using a special value known as a key and a mathematical process known as an algorithm. A cryptographic hash function computes (or hashes) a fixed- length message digest from an arbitrary-length message. A message digest may be considered as an "electronic fingerprint" of the original message. Signing with a digital signature is used to detect unauthorized modifications to data and to authenticate the identity of the signer. [25] A log is a record of the events occurring within an organization's systems and networks. Log management is essential to ensuring that computer security records are stored in sufficient detail for an appropriate period of time. Routine log analysis is beneficial for identifying security incidents, policy violations, fraudulent activity, and operational problems. Shutting down the system if it is unable to log a security event helps to ensure that an administrator will review the log and correct the problem in order to recover the system for the user. [26] OMB Memorandum for Chief Information Officers, March 20, 2007. [27] NIST Frequently Asked Questions posted on NIST's FDCC Web site, March 4, 2008; Chief Information Officers Council e-mail to chief information officers on behalf of OMB, March 24, 2008. [28] OMB, M-08-22 (Aug. 11, 2008). [29] A department or agency accrediting authority is a senior management official or executive with the authority to formally accept responsibility for operating an information system at an acceptable level of risk to agency operations, agency assets, or individuals. [30] OMB Memorandum to Chief Information Officers, Establishment of Windows XP and VISTA Virtual Machine and Procedures for Adopting the Federal Desktop Core Configurations (Washington, D.C.: July 31, 2007). [31] OMB, M-08-22 (Aug. 11, 2008). [32] OMB Memorandum for Chief Information Officers and Chief Acquisition Officers, Ensuring New Acquisitions Include Common Security Configurations, M-07-18 (Washington, D.C.: June 1, 2007). In February 2008, the Federal Acquisition Regulation was revised to require agencies to use common security configurations, as appropriate. See 48 C.F.R. § 39.101(d) (73 FR 10967, 10968, Feb. 28, 2008). [33] Plans of action and milestones, also known as remedial action plans, can help agencies identify and assess security weaknesses in information systems such as deviations in system configurations, and set priorities and monitor progress in correcting them. [34] NIST Frequently Asked Questions posted on NIST's FDCC Web site, March 4, 2008; Chief Information Officers Council e-mail to chief information officers on behalf of OMB, March 24, 2008. [35] OMB, Memorandum for Heads of Executive Departments and Agencies, FY 2008 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, M-08-21 (Washington, D.C.: July 14, 2008). [36] OMB Memorandum for Heads of Executive Departments and Agencies, FY 2009 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, M-09-29 (Washington, D.C.: Aug. 20, 2009). [37] These 5 agencies were the Departments of Education, Energy, and Transportation; the Small Business Administration; and the Social Security Administration. [38] Agency implementation of FDCC may also not include implementation of Windows Firewall or Internet Explorer 7 settings if these applications are not being used by the agency. [39] Encryption algorithms are mathematical processes used to transform plain text into cipher text for the purposes of encryption. [40] The Chief Information Officers Council established an FDCC Change Control Board in June 2009 to make recommendations to OMB and NIST for changes to the FDCC settings. The board has established a yearly process during which it solicits suggestions for modifications to the settings from federal agencies, reviews the suggestions, and provides recommendations to NIST by July 1 of each year. The board plans to make its first recommendations on settings in July 2010. [41] The General Services Administration, under the direction of OMB, established the Policy Utilization Assessment Program in order to (1) conduct a series of implementation diagnostics to determine the extent and effectiveness of agency implementation and utilization of OMB information technology policies throughout the federal government; (2) establish an assessment methodology and best practices for use by individual agencies in improving policy implementation; and (3) document lessons learned and governmentwide trends to assist OMB in improving future information technology policy development efforts. [42] Office of the Inspector General, U.S. Department of the Interior, Evaluation of Information Technology System Configuration, ISD-EV-MOA- 0003-2009 (Washington, D.C.: Sept. 23, 2009). [43] GAO, Information Security: Concerted Effort Needed to Improve Federal Performance Measures, [hyperlink, http://www.gao.gov/products/GAO-09-617] (Washington, D.C.: Sept. 14, 2009). [44] OMB Memorandum for Chief Information Officers, March 20, 2007; OMB, M-07-11 (Mar. 22, 2007). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.