Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Health website's security prompts worries
Wednesday - 11/6/2013, 5:42pm EST
WASHINGTON (AP) -- Obama administration officials are facing mounting questions about whether they cut corners on security testing while rushing to meet a self-imposed deadline to launch online health insurance markets.
Documents show that the part of HealthCare.gov that consumers interact with directly received only a temporary six-month security certification because it had not been fully tested before Oct. 1, when the website went live. It's also the part of the system that stores personal information.
The administration insists the trouble-prone website is secure, but technicians had to scramble to make a software fix earlier this week after learning that a North Carolina man tried to log on and got a South Carolina man's personal information. A serious security breach would be an unwelcome game-changer for an administration striving to turn the corner on technical problems that have inconvenienced millions of consumers and embarrassed the White House.
Two computer security experts interviewed by The Associated Press said that clearly the better option would have been to complete testing.
"The best scenario is to have done end-to-end testing," said Lisa Gallagher, vice president of technology solutions for the Healthcare Information and Management Systems Society, a medical technology nonprofit. That it wasn't done "would cause me some mild concern," she continued, adding she would advise a relative or close friend to wait until the website is stabilized before plunging in.
Asked former White House chief information officer Theresa Payton, "If you haven't done end-to-end testing, how can we say with certainty how hard or easy it is for cybercriminals to attack at different points in the process?"
"It makes me shudder a little," said Payton, a former bank security executive who now has her own company.
Payton served in the George W. Bush administration and has been consulted by congressional Republicans but says she has no partisan agenda on the health care law. "We need to help because we have to make this right," she said.
The website was supposed to provide easy access to a menu of government-subsidized coverage options under President Barack Obama's health care law. Administration officials say they remain confident it is secure.
"When consumers fill out the online application, they can trust that the information they've provided is protected by stringent security standards and that the technology underlying the application process has been tested and is secure," Medicare administrator Marilyn Tavenner assured the Senate's Health Committee on Tuesday.
But a short while later, Tavenner acknowledged the Carolinas security breach. "We actually were made aware of that" Monday, she said in response to a question from Sen. Johnny Isakson, R-Ga. "We implemented a software fix."
It was not immediately clear how the North Carolina man was able to view the personal information of the man in South Carolina. However, a vulnerability that has afflicted websites for years is known as "horizontal privilege escalation," in which a legitimate user of a website slightly alters the string of random-looking characters in the website's address or inside downloaded data files known as "cookies," causing the system to display information about the accounts of other users. It can be protected against by a well-designed website.
The administration has declined to explain what happened and how the problem was fixed. A Health and Human Services department official, speaking on condition of anonymity to discuss operations, said they have no evidence such a scenario was involved.
Tavenner, a respected former hospital executive, has emerged as a key cybersecurity decision-maker for the health care law. Her agency, the Centers for Medicare and Medicaid Services, is charged with carrying out the Affordable Care Act.
According to federal law and policy, all government computer systems must have a security certification before going live.
Tavenner approved the Sept. 27 security certification for the health website, which read: "Aspects of the system that were not tested due to the ongoing development exposed a level of uncertainty that can be deemed as a high risk."
It called for a four-step mitigation plan, including ongoing monitoring and testing, leading to a full security control assessment.
The agency's top three information security professionals signed on an accompanying page that said that "the mitigation plan does not reduce the risk to the ... system itself going into operation on Oct. 1" but that its added protections would reduce risk later and ensure full testing within six months.
HealthCare.gov has two major components: an electronic "back room" that did get full security certification and the consumer-facing "front room" that's temporarily certified.