Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
GAO slams agency cyber efforts
Monday - 10/3/2011, 6:25pm EDT
Agencies continue to struggle to secure their computer systems even 10 years after Congress passed the Federal Information Security Management Act, or FISMA.
The Government Accountability Office found all 24 agencies it reviewed had weaknesses in security controls. These include access control, configuration management and security management.
"An underlying reason for these weaknesses is that agencies have not fully implemented their information security programs," auditors wrote in the report issued today. "As a result, they have limited assurance that controls are in place and operating as intended to protect their information resources, thereby leaving them vulnerable to attack or compromise."
GAO found 19 of 24 agencies had inadequate information security controls for financial reporting purposes. Specifically, eight agencies identified material weaknesses, increasing from six agencies, while 11 reported significant deficiencies, decreasing from 15 agencies in fiscal 2009.
Additionally, GAO said 23 of 24 inspectors general cited information security as a "major management challenge" for their agency, reflecting an increase from 2009, when 20 of 24 inspectors general cited this issue.
GAO also found most agencies had weaknesses in five major areas of information controls:
- Access controls, which ensure that only authorized individuals can read, alter or delete data.
- Configuration management controls, which provide assurance that only authorized software programs are implemented.
- Segregation of duties, which reduces the risk that one individual can independently perform inappropriate actions without detection.
- Continuity of operations planning, which helps avoid significant disruptions in computer-dependent operations.
- Agencywide information security programs, which provide a framework for ensuring that risks are understood and that effective controls are selected and implemented.
"These findings are all the more troubling given that GAO has been telling us for some time that these are areas of vulnerability and must be addressed, yet we still haven't made enough progress in shoring up these obvious weaknesses," said Sen. Tom Carper (D-Del.), in a statement. "Federal agencies need to fully implement meaningful security programs that can withstand the serious cyber challenges we face today and will face for the foreseeable future, and they need the proper oversight and guidance to accomplish that goal."
Carper, along with Sens. Joseph Lieberman and Susan Collins (R-Maine), introduced the Cybersecurity and Internet Freedom Act of 2011 to modernize FISMA.
It is one of dozens of bills Congress is considering to improve agency oversight and fix problems with agency computer networks.
The report comes during cybersecurity awareness month. President Barack Obama issued a proclamation today as well touting the administration's cyber proposal released in May. The President also called on citizens "to recognize the importance of cybersecurity and to observe this month with activities, events, and trainings that will enhance our national security and resilience."
And there seems to be a lot of work that still needs to be done. GAO found several continuing holes in agency systems.
For instance, GAO found a the lack of training of federal employees. Despite the focus by the Office of Management and Budget over the last five years, GAO said inspectors general for 17 of 24 major agencies cited weaknesses in their agency's training programs. Five inspectors general reported that less than 90 percent of employees with log-in privileges had attended security awareness training in the last year. In addition, 11 inspectors general reported that less than 90 percent of employees, contractors, and other users with significant security responsibilities had attended specialized training in the past year. Inspectors general for 11 agencies also reported that identification tracking of those with significant security responsibilities were not adequate.
GAO found another risk agencies continue to face is how they oversee contractor systems with federal data.
"Inspectors general for 18 agencies identified weaknesses in agency programs for overseeing contractor operations," auditors wrote. "For example, inspectors general for two agencies revealed that their agency did not have a program in place, and the remaining 16 identified weaknesses in their agency's program. Illustrative examples included 10 inspectors general reporting that their agency had not fully developed or consistently implemented policies and procedures to oversee systems operated on the agency's behalf by contractors or other entities. Eight inspectors general also reported that systems owned or operated by contractors and entities did not meet OMB and NIST FISMA requirements."
OMB and the Homeland Security Department have been trying to address many of these problems from a governmentwide and agency specific perspective over the last five years.
For instance, since July 2011, DHS has held CyberStat sessions with seven agencies discussing various topics including continuous monitoring.