Information Security: Serious Weaknesses Place Critical Federal Operations and Assets at Risk (Chapter Report, 09/23/98, GAO/AIMD-98-92). Recent audit evidence indicates that serious and widespread weaknesses in information security are jeopardizing the government's ability to adequately protect (1) federal assets from fraud and misuse; (2) sensitive information from inappropriate disclosure; and (3) critical operations, including some affecting public safety, from disruption. Significant information security weaknesses were reported in each of the 24 largest federal agencies, with inadequately restricted access to sensitive data being the most commonly cited problem. These weaknesses place critical government operations, such as national defense, tax collection, law enforcement, and benefits payments, as well as the assets associated with these operations, at great risk for fraud, disruption, and inappropriate disclosures. Also, many intrusions or other potentially malicious acts could be occurring but going undetected because agencies have not introduced effective controls to identify suspicious activity in their networks and computer systems. Individual agencies have not done enough to effectively address these problems. Similarly, agency performance in this area is not being adequately managed from a governmentwide perspective, although some important steps have been taken. In GAO's view, what is needed is a coordinated and comprehensive strategy that incorporates the worthwhile efforts already under way and takes advantage of the expanded amount of evidence that has become available in recent years. GAO summarized this report in testimony before Congress; see: Information Security: Strengthened Management Needed to Protect Critical Federal Operations and Assets, by Gene L. Dodaro, Assistant Comptroller General for Accounting and Information Management Issues, before the Senate Committee on Governmental Affairs. GAO/T-AIMD-98-312, Sept. 23 (19 pages). --------------------------- Indexing Terms ----------------------------- REPORTNUM: AIMD-98-92 TITLE: Information Security: Serious Weaknesses Place Critical Federal Operations and Assets at Risk DATE: 09/23/98 SUBJECT: Computer security Confidential communication Data integrity Internal controls Information leaking Classified information Computer crimes Hackers Information resources management IDENTIFIER: NIST Federal Computer Incident Response Capability Program ****************************************************************** ** This file contains an ASCII representation of the text of a ** ** GAO report. Delineations within the text indicating chapter ** ** titles, headings, and bullets are preserved. Major ** ** divisions and subdivisions of the text, such as Chapters, ** ** Sections, and Appendixes, are identified by double and ** ** single lines. The numbers on the right end of these lines ** ** indicate the position of each of the subsections in the ** ** document outline. These numbers do NOT correspond with the ** ** page numbers of the printed product. ** ** ** ** No attempt has been made to display graphic images, although ** ** figure captions are reproduced. Tables are included, but ** ** may not resemble those in the printed version. ** ** ** ** Please see the PDF (Portable Document Format) file, when ** ** available, for a complete electronic file of the printed ** ** document's contents. ** ** ** ** A printed copy of this report may be obtained from the GAO ** ** Document Distribution Center. For further details, please ** ** send an e-mail message to: ** ** ** ** <info@www.gao.gov> ** ** ** ** with the message 'info' in the body. ** ****************************************************************** Cover ================================================================ COVER Report to the Committee on Governmental Affairs, U.S. Senate September 1998 INFORMATION SECURITY - SERIOUS WEAKNESSES PLACE CRITICAL FEDERAL OPERATIONS AND ASSETS AT RISK GAO/AIMD-98-92 Federal Information Security (919161) Abbreviations =============================================================== ABBREV CFO - Chief Financial Officer CIO - Chief Information Officer DOD - Department of Defense FAA - Federal Aviation Administration FedCIRC - Federal Computer Incident Response Capability FMFIA - Federal Managers' Financial Integrity Act IG - Inspector General GAO - General Accounting Office HCFA - Health Care Financing Administration HHS - Department of Health and Human Services NIST - National Institute of Standards and Technology OMB - Office of Management and Budget PDD - Presidential Decision Directive SSA - Social Security Administration VA - Department of Veterans Affairs Letter =============================================================== LETTER B-278910 September 23, 1998 The Honorable Fred Thompson Chairman The Honorable John Glenn Ranking Minority Member Committee on Governmental Affairs United States Senate In response to your request, this report describes (1) the overall state of federal information security based on recently issued audit reports and (2) executive branch efforts over the last 2 years to improve the federal government's performance in this important area. These efforts include actions by individual agencies, the Office of Management and Budget, and the Chief Information Officers Council, as well as initiatives outlined in the recently issued Presidential Decision Directive 63 on critical infrastructure protection. Many of these improvement efforts respond to recommendations made in our September 1996 report Information Security: Opportunities for Improved OMB Oversight of Agency Practices (GAO/AIMD-96-110), which was also developed at your request. If you have any questions, please call me at (202) 512-2600. This report was developed under the direction of Robert F. Dacey, Director, Consolidated Audit and Computer Security Issues, and Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems. Major contributors to this report are listed in appendix IV. Gene L. Dodaro Assistant Comptroller General EXECUTIVE SUMMARY ============================================================ Chapter 0 PURPOSE ---------------------------------------------------------- Chapter 0:1 Due to growing concerns about our government's reliance on inadequately protected information systems to support critical and sensitive operations, the Chairman and Ranking Minority Member of the Senate Committee on Governmental Affairs asked GAO to (1) evaluate the effectiveness of federal information security practices based on the results of recent audits and (2) review efforts to centrally oversee and manage federal information security. This report describes the results of that analysis and outlines management practices that could improve the effectiveness of federal agency security programs. BACKGROUND ---------------------------------------------------------- Chapter 0:2 Federal agencies rely on computers and electronic data to perform functions that are essential to the national welfare and directly affect the lives of millions of individuals. More and more, these functions, which include national defense, tax collection, benefits payments, and law enforcement, depend on automated, often interconnected, systems and on electronic data rather than on manual processing and paper records. This shift has resulted in a number of benefits so that information can now be processed quickly and communicated almost instantaneously among federal offices, departments, and outside organizations and individuals. In addition, vast amounts of useful data are at the disposal of anyone with access to a personal computer, a modem, and telephone. However, the government's increasing reliance on interconnected systems and electronic data also increases the risks of fraud, inappropriate disclosure of sensitive data, and disruption of critical operations and services. The same factors that benefit federal operations--speed and accessibility--also make it possible for individuals and organizations to inexpensively interfere with or eavesdrop on these operations from remote locations for purposes of fraud or sabotage, or other malicious or mischievous purposes. Threats of such actions are increasing, in part, because the number of individuals with computer skills is increasing and because intrusion, or "hacking," techniques have become readily accessible through media such as magazines and computer bulletin boards. In addition, natural disasters and inadvertent errors by authorized computer users can have negative consequences if information resources are poorly protected. Gauging the level of risk is difficult because summary data on computer security incidents and related damage are incomplete. However, break-ins and damage of varying levels of significance have been acknowledged in both the public and private sectors, and media reports on intrusions, fraud, and sabotage abound. In a recent survey conducted by the Computer Security Institute in cooperation with the Federal Bureau of Investigation, 64 percent of the 520 respondents, which were from both the private and public sectors, reported computer security breaches within the last 12 months--a 16 percent increase in security breaches over those reported in a similar survey in 1997. While many of the survey respondents did not quantify their losses, those that did cited losses totaling $136 million.\1 In an October 1997 report entitled Critical Foundations: Protecting America's Infrastructures, the President's Commission on Critical Infrastructure Protection described the potentially damaging implications of poor information security from a national perspective, noting that computerized interaction within and among infrastructures has become so complex that it may be possible to do harm in ways that cannot yet be fully conceived. To guard against such problems, federal agencies must take steps to understand their information security risks and implement policies and controls to reduce these risks, but previous reports indicate that agencies have not adequately met this responsibility. In September 1996, GAO reported that a broad array of federal operations were at risk due to information security weaknesses and that a common underlying cause was inadequate security program management. In that report, GAO recommended that the Office of Management and Budget (OMB) play a more proactive role in leading federal improvement efforts, in part through its role as chair of the Chief Information Officers (CIO) Council. Subsequently, in a February 1997 series of reports to the Congress, GAO designated information security as a new governmentwide high-risk area.\2 More recently, in its March 31, 1998, report on the federal government's consolidated financial statements, GAO reported that widespread computer control deficiencies also contribute to problems in federal financial management because they diminish confidence in the reliability of financial management data.\3 -------------------- \1 "Issues and Trends: 1998 CSI/FBI Computer Crime and Security Survey," March 4, 1998. \2 High Risk Series: Information Management and Technology (GAO/HR-97-9, February 1997). \3 Financial Audit: 1997 Consolidated Financial Statements of the United States Government (GAO/AIMD-98-127, March 31, 1998). RESULTS IN BRIEF ---------------------------------------------------------- Chapter 0:3 The expanded amount of audit evidence that has become available since mid-1996 describes widespread and serious weaknesses in the federal government's ability to adequately protect (1) federal assets from fraud and misuse, (2) sensitive information from inappropriate disclosure, and (3) critical operations, including some affecting public safety, from disruption. Significant information security weaknesses were reported in each of the 24 largest federal agencies, with inadequately restricted access to sensitive data being the most widely reported problem. This and the other types of weaknesses identified place critical government operations, such as national defense, tax collection, law enforcement, and benefit payments, as well as the assets associated with these operations, at great risk of fraud, disruption, and inappropriate disclosures. In addition, many intrusions or other potentially malicious acts could be occurring but going undetected because agencies have not implemented effective controls to identify suspicious activity on their networks and computer systems. Individual agencies have not yet done enough to effectively address these problems. Specifically, agency officials have not instituted procedures for ensuring that risks are fully understood and that controls implemented to mitigate risks are effective. Implementing such procedures as part of a proactive, organization-wide security management program is essential in today's interconnected computing environments. Similarly, agency performance in this area is not yet being adequately managed from a governmentwide perspective, although some important steps have been taken. The CIO Council, under OMB's leadership, designated information security as a priority area in late 1997 and, since then, has taken some steps to develop a preliminary strategy, promote awareness, and identify ways to improve a federal incident response program developed by the National Institute of Standards and Technology (NIST). In May 1998, Presidential Decision Directive (PDD) 63 on critical infrastructure protection was issued. PDD 63 acknowledged computer security as a national security risk and established several entities within the National Security Council, the Department of Commerce, and the Federal Bureau of Investigation to address critical infrastructure protection, including federal agency information infrastructures. At the close of GAO's review in August 1998, it was too early to determine how the Directive's provisions would be implemented and how they would relate to other ongoing efforts, such as those initiated by the CIO Council. What needs to emerge is a coordinated and comprehensive strategy that incorporates the worthwhile efforts already underway and takes advantage of the expanded amount of evidence that has become available in recent years. The objectives of such a strategy should be to encourage agency improvement efforts and measure their effectiveness through an appropriate level of oversight. This will require a more structured approach for (1) ensuring that risks are fully understood, (2) promoting use of the most cost-effective control techniques, (3) testing and evaluating the effectiveness of agency programs, and (4) acting to address identified deficiencies. This approach needs to be applied at individual departments and agencies and in a coordinated fashion across government. PRINCIPAL FINDINGS ---------------------------------------------------------- Chapter 0:4 SIGNIFICANT WEAKNESSES AT 24 MAJOR AGENCIES PLACE CRITICAL OPERATIONS AT RISK -------------------------------------------------------- Chapter 0:4.1 Audit reports issued from March 1996 through August 1998 identified significant information security weaknesses in each of the 24 agencies covered by the analysis. The most widely reported type of weakness was poor control over access to sensitive data and systems. This type of weakness makes it possible for an individual or group to inappropriately modify or destroy sensitive data or computer programs or inappropriately obtain or disclose confidential information for malicious purposes, such as personal gain or sabotage. In today's increasingly interconnected computing environment, poor access controls can expose an agency's information and operations to attacks from remote locations all over the world by individuals with minimal computer and telecommunications resources and expertise. These weaknesses place a broad range of critical operations and assets at great risk of fraud, misuse, and disruption. For example, weaknesses at the Department of Defense increase the vulnerability of various military operations that support the Department's warfighting capability, and weaknesses at the Department of the Treasury increase the risk of fraud associated with billions of dollars of federal payments and collections. In addition, information security weaknesses place an enormous amount of highly sensitive data at risk of inappropriate disclosure. For example, weaknesses at agencies such as the Internal Revenue Service, the Health Care Financing Administration, the Social Security Administration, and the Department of Veterans Affairs place sensitive tax, medical, and other personal records at risk of disclosure. As significant as these reported weaknesses are, it is likely that the full extent of control problems at individual agencies has not yet surfaced because key areas of controls at many agencies have not been assessed. In particular, agency managers, who are primarily responsible for ensuring adequate security, have not fully evaluated the adequacy of their computer-based controls. In addition, audits at most agencies have not yet fully covered controls associated with operating system software, which are critical to the security of all of the applications the systems support. In agencies where this control area was reviewed, weaknesses were always identified. IMPROVED SECURITY PROGRAM PLANNING AND MANAGEMENT NEEDED AT INDIVIDUAL AGENCIES -------------------------------------------------------- Chapter 0:4.2 Poor security program planning and management continue to be fundamental problems. Agencies have not yet developed effective procedures for assessing computer security risks, determining which risks are significant, assigning responsibility for taking steps to reduce risks, and ensuring that these steps remain effective. Security planning and management deficiencies were reported for 17 of the 24 agencies included in GAO's analysis and numerous recommendations have been made to address specific agency deficiencies. To identify potential solutions to this problem, GAO studied the security management practices of eight organizations known for their superior security programs. These organizations included two financial institutions, a retailer, an equipment manufacturing company, a state university, a state agency, a regional electric utility, and a computer vendor. GAO found that these organizations managed their information security risks through a cycle of risk management activities, and it identified 16 specific practices that supported these risk management principles. These practices involve (1) establishing a central security management focal point, (2) assessing risk, (3) selecting and implementing cost-effective policies and controls, (4) promoting awareness, and (5) continually evaluating and improving control effectiveness. They also emphasize the importance of viewing information security program management as an integral component of managing agency operations and of involving both program managers and technical experts in the process. GAO published the findings from this study in the May 1998 executive guide Information Security Management: Learning From Leading Organizations (GAO/AIMD-98-68), which has been endorsed by the Federal CIO Council. The guide's findings are summarized in chapter 3 of this report. The security management practices described in GAO's executive guide are most likely to be successful if they are implemented as part of broader improvements to information technology management. Such improvements are underway across government due to specific information technology management reforms mandated by the Paperwork Reduction Act amendments of 1995 and the Clinger-Cohen Act of 1996. INITIATIVES TO IMPROVE CENTRAL COORDINATION AND MANAGEMENT NEED TO PROVIDE A COMPREHENSIVE STRATEGY -------------------------------------------------------- Chapter 0:4.3 Individual agencies are primarily responsible for the security of their information resources, but central management also is important to (1) ensure that federal executives understand risks to their operations, (2) monitor agency performance in mitigating these risks, (3) facilitate implementation of any needed improvements, and (4) address issues that affect multiple agencies. Under the Paperwork Reduction Act, this oversight responsibility lies with OMB. Since September 1996 when GAO reported that OMB needed to strengthen its oversight of agency practices, the CIO Council, under OMB's leadership, has become a component of the administration's efforts to address federal information security problems and has taken some actions in this regard. Specifically, during 1997, the Council designated information security as one of six priority areas and, late in the year, established a Security Committee. Since then, the Committee has (1) developed a preliminary plan for addressing various aspects of the problem, (2) established links with other federal entities involved in security issues, (3) held a security awareness day for federal CIOs, deputy CIOs, and security officers, and (4) developed plans for reorienting the Federal Computer Incident Response Capability (FedCIRC), a program initiated by NIST to assist agencies in improving their security incident response capabilities and other aspects of their security programs. In addition, OMB has continued to monitor selected agency system-related projects, many of which have significant security implications. However, neither OMB nor the CIO Council has yet developed a program for comprehensively overseeing and managing the security of critical federal operations by ensuring that agency programs are adequately evaluated and that the results are used to measure and prompt improvements, as recommended in GAO's September 1996 report. Concurrent with OMB and CIO Council efforts during late 1997 and early 1998, the administration developed and issued PDD 63 in response to recommendations made by the President's Commission on Critical Infrastructure Protection. The Directive acknowledges computer security risk as a national security risk, addresses a range of national infrastructure protection issues, and includes several provisions intended to ensure that critical federal computer, or "cyber-based," systems are protected from attacks by our nation's enemies. Also, it establishes a National Coordinator for Security, Infrastructure Protection, and Counter-Terrorism, who reports to the President through the Assistant to the President for National Security Affairs; a Critical Infrastructure Coordination Group; and a Critical Infrastructure Assurance Office within the Department of Commerce. The Directive outlines planned actions pertaining to federal information security, which include: -- requiring each federal department and agency to develop a plan for protecting its own critical infrastructure, including its cyber-based systems; -- reviewing existing federal, state, and local entities charged with information assurance tasks; -- enhancing collection and analysis of information on the foreign information warfare threat to our critical infrastructures; -- establishing a National Infrastructure Protection Center within the Federal Bureau of Investigation to facilitate and coordinate the federal government's investigation and response to attacks on its critical infrastructures; -- assessing U.S. Government systems' vulnerability to interception and exploitation; and -- incorporating agency infrastructure assurance functions in agency strategic planning and performance measurement frameworks. Though some of these efforts have begun, at this early stage of implementation, it is unclear how the provisions outlined in the Directive will be implemented and how they will be coordinated with other related efforts, such as those of the CIO Council. CONCLUSION ---------------------------------------------------------- Chapter 0:5 Since September 1996, the need for improved federal information security has received increased visibility and attention. Important efforts have been initiated to address this issue, but more effective actions are needed both at the individual agency level and at the governmentwide level. Many aspects of the recommendations GAO made in September 1996 are still applicable. In particular, a comprehensive governmentwide strategy needs to be produced. The CIO Council's efforts during late 1997 and the first half of 1998, as well as issuance of PDD 63 in May 1998, indicate that senior federal officials are increasingly concerned about information security risks, both to federal operations as well as to privately controlled national infrastructures, and are now moving to address these concerns. Coordinated efforts throughout the federal community, as envisioned by PDD 63, will be needed to successfully accomplish the objectives of these efforts and substantively improve federal information security. It is especially important that a governmentwide strategy be developed that clearly defines and coordinates the roles of new and existing federal entities in order to avoid inappropriate duplication of effort and ensure governmentwide cooperation and support. RECOMMENDATION ---------------------------------------------------------- Chapter 0:6 GAO recommends that the Director of OMB and the Assistant to the President for National Security Affairs ensure that the various existing and newly initiated efforts to improve federal information security are coordinated under a comprehensive strategy. Such a strategy should -- ensure that executive agencies are carrying out the responsibilities outlined in laws and regulations requiring them to protect the security of their information resources; -- clearly delineate the roles of the various federal organizations with responsibilities related to information security; -- identify and rank the most significant information security issues facing federal agencies; -- promote information security risk awareness among senior agency officials whose critical operations rely on automated systems; -- identify and promote proven security tools, techniques, and management best practices; -- ensure the adequacy of information technology workforce skills; -- ensure that the security of both financial and nonfinancial systems is adequately evaluated on a regular basis; -- include long-term goals and objectives, including time frames, priorities, and annual performance goals; and -- provide for periodically evaluating agency performance from a governmentwide perspective and acting to address shortfalls. AGENCY COMMENTS AND OUR EVALUATION ---------------------------------------------------------- Chapter 0:7 In commenting on a draft of this report, OMB's Acting Deputy Director for Management stated that OMB and the CIO Council, working with the National Security Council, have developed a plan to address the PDD 63 provision that the federal government serve as a model for critical infrastructure protection and to coordinate the new requirements of the PDD with the existing requirements of the various laws pertaining to federal information security. The comments further stated that the plan is to develop and promote a process by which government agencies can (1) identify and assess their existing security posture, (2) implement security best practices, and (3) set in motion a process of continued maintenance. Also described are plans for a CIO Council-sponsored interagency security assist team that will review agency security programs. Regarding our conclusion that many aspects of the recommendations in our September 1996 report are still applicable, OMB reiterated its concern that the 1996 report's "overemphasis on OMB's role could distract program managers in the Federal agencies from their primary responsibility for assuring information security." The full text of OMB's comments is reprinted in appendix III. OMB's comments indicate that it, the CIO Council, and the National Security Council are moving to coordinate their responsibilities and beginning to develop the comprehensive strategy that is needed. Based on the description provided, the plans being developed include several key elements, most notably a means of evaluating agency performance. These plans were still being finalized at the close of our work and were not yet available for our review. Accordingly, we are not able to comment on their content, scope, and detail, or whether they will be effective in improving federal information security. Regarding OMB's concern that we have overemphasized its role, we agree that agency managers are primarily responsible for the security of their operations. Increased attention and support from central oversight, if done effectively, should not distract agencies from their responsibilities in this area. On the contrary, active oversight of agency performance is more likely to have the effect of emphasizing the agency managers' accountability and providing more visibility for agencies that are achieving their information assurance goals as well as those that are falling short. INTRODUCTION ============================================================ Chapter 1 This report provides a summary analysis of recently reported information security weaknesses at federal agencies and describes management practices that federal agencies can adopt to help improve their security programs. It also describes centralized efforts to oversee and manage federal information security from a governmentwide perspective. The vulnerabilities associated with our nation's reliance on interconnected computer systems are a growing concern. At the federal level, such systems process, store, and transmit enormous amounts of sensitive data and are indispensable to many federal agency operations. Because of the importance of establishing and maintaining adequate security over federal operations, Senators Fred Thompson and John Glenn, Chairman and Ranking Minority Member, respectively, of the Senate Committee on Governmental Affairs, have undertaken an effort to address the various management, technical, and operational aspects of this problem. As part of that effort, they requested that we (1) summarize the effectiveness of federal information security, based on recently issued audit reports, (2) describe actions agencies can take to improve their security programs, and (3) evaluate actions taken by the Office of Management and Budget (OMB) and the federal Chief Information Officers (CIO) Council to address federal information security problems. This resulting report is one of several reviews that Chairman Thompson and Senator Glenn have requested as part of their ongoing oversight of federal information security and other aspects of information technology management. Related GAO reports are listed in appendix I. COMPUTERS AND ELECTRONIC DATA ARE INDISPENSABLE TO FEDERAL OPERATIONS ---------------------------------------------------------- Chapter 1:1 Federal agencies perform important functions that are essential to the national welfare and directly affect the lives of millions of individuals everyday. More and more, these functions, which include national defense, tax collection, import control, benefits payments, and law enforcement, depend on automated, often interconnected, systems and on electronic data rather than on manual processing and paper records. The benefits of this shift are increasingly obvious--information can be processed quickly and communicated almost instantaneously among federal offices, departments, and outside organizations and individuals. In addition, vast amounts of data are at the disposal of anyone with access to a personal computer, a modem, and telephone. However, the government's increasing reliance on interconnected systems and electronic data also increases the risks of fraud, inappropriate disclosure of sensitive data, and disruption of critical operations and services. The same factors that benefit federal operations--speed and accessibility--also make it possible for individuals and organizations to inexpensively interfere with or eavesdrop on these operations from remote locations for purposes of fraud or sabotage, or other malicious or mischievous purposes. Threats of such actions are increasing, in part, because the number of individuals with computer skills is increasing and because intrusion, or "hacking," techniques have become readily accessible through magazines and on computer bulletin boards. In addition, natural disasters and inadvertent errors by authorized computer users can have devastating consequences if information resources are poorly protected. Gauging the risk is difficult because summary data on computer security incidents and related damage are incomplete. However, in an October 1997 report entitled Critical Foundations: Protecting America's Infrastructures, the President's Commission on Critical Infrastructure Protection described the potentially devastating implications of poor information security from a national perspective, noting that computerized interaction within and among infrastructures has become so complex that it may be possible to do harm in ways we cannot yet conceive. According to a recent statement by the Director of the National Security Agency, attacks on public and private systems occur everyday. For example, in February 1998, hackers used tools and techniques readily available on Internet bulletin boards to attack systems at the Department of Defense. Media reports on intrusions, fraud, and sabotage abound, and, in a recent survey conducted by the Computer Security Institute in cooperation with the Federal Bureau of Investigation, 64 percent of the 520 respondents from the private and public sector reported computer security breaches within the last 12 months. This is a 16-percent increase in security breaches over those reported in a similar survey in 1997 and a 22-percent increase over those reported in 1996.\1 To guard against such problems, federal agencies, like other computer-dependent organizations, must take steps to understand their information security risks and implement policies and controls to reduce these risks. Specifically, federal agencies must protect the integrity and, in some cases, the confidentiality of the enormous amounts of sensitive data they maintain, such as personal information on individuals, financial transactions, defense inventories, operational plans, and regulatory inspection records. In addition, they must take steps to ensure that computerized operations supporting critical government functions are not severely disrupted. -------------------- \1 "Issues and Trends: 1998 CSI/FBI Computer Crime and Security Survey," March 4, 1998. PREVIOUS REPORTS HAVE IDENTIFIED SIGNIFICANT SECURITY PROBLEMS ---------------------------------------------------------- Chapter 1:2 Although the government's reliance on computers and telecommunications has been rapidly growing, reports over the last few years indicate that federal operations and data are inadequately protected and that these problems are serious and pervasive. In September 1996, we reported that, since September 1994, serious weaknesses had been reported for 10 of the largest 15 federal agencies.\2 In that report we concluded that poor information security was a widespread federal problem with potentially devastating consequences, and we recommended that OMB play a more proactive role in overseeing agency practices and managing improvements, in part through its role as chair of the CIO Council. Subsequently, in February 1997, in a series of reports to the Congress, we designated information security as a new governmentwide high-risk area.\3 Most recently, in our March 31, 1998, report on the federal government's consolidated financial statements, we reported that widespread and serious computer control weaknesses affect virtually all federal agencies and significantly contribute to many material deficiencies in federal financial management.\4 In that report, we also noted that these weaknesses place enormous amounts of federal assets at risk of fraud and misuse, financial data at risk of unauthorized modification or destruction, sensitive information at risk of inappropriate disclosure, and critical operations at risk of disruption. During 1996 and 1997, federal information security was also addressed by the President's Commission on Critical Infrastructure Protection, which had been established to investigate our nation's vulnerability to both "cyber" and physical threats. In its October 1997 report, Critical Foundations: Protecting America's Infrastructures, the Commission described the potentially devastating implications of poor information security from a national perspective. The report also recognized that the federal government must "lead by example," and included recommendations for improving government systems security, expediting efforts to facilitate the use of encryption, developing risk assessment methods, measuring performance, and elevating threat assessments as a foreign intelligence priority. A number of factors contribute to poor federal information security including insufficient awareness and understanding of risks, a shortage of staff with needed technical expertise, a lack of systems and security architectures to facilitate implementation and management of security controls, and various problems associated with the availability and use of specific technical controls and monitoring tools. All of these are important; however, an underlying theme that was identified in our September 1996 report is a lack of security program management and oversight to ensure that risks are identified and addressed and that controls are working as intended. -------------------- \2 Information Security: Opportunities for Improved OMB Oversight of Agency Practices (GAO/AIMD-96-110, September 24, 1996). \3 High Risk Series: Information Management and Technology (GAO/HR-97-9, February 1997). \4 Financial Audit: 1997 Consolidated Financial Statements of the United States Government (GAO/AIMD-98-127, March 31, 1998). RESPONSIBILITIES OUTLINED IN LAWS AND GUIDANCE ---------------------------------------------------------- Chapter 1:3 The need to protect sensitive federal data maintained on automated systems has been recognized for years in various laws and in federal guidance. The Privacy Act of 1974, as amended; the Paperwork Reduction Act of 1980, as amended; and the Computer Security Act of 1987 all contain provisions requiring agencies to protect the confidentiality and integrity of the sensitive information that they maintain. The Computer Security Act (Public Law 100-235) defines sensitive information as "any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under the Privacy Act, but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy." In accordance with the Paperwork Reduction Act of 1980 (Public Law 96-511), OMB is responsible for developing information security policies and overseeing agency practices. In this regard, OMB has provided guidance for agencies in OMB Circular A-130, Appendix III, "Security of Federal Automated Information Resources." Since 1985, this circular has directed agencies to implement an adequate level of security for all automated information systems that ensures (1) effective and accurate operations and (2) continuity of operations for systems that support critical agency functions. The circular establishes a minimum set of controls to be included in federal agency information system security programs and requires agencies to periodically review system security. Responsibility for developing technical standards and providing related guidance for sensitive data belongs primarily to the National Institute of Standards and Technology (NIST), under the Computer Security Act. The Clinger-Cohen Act of 1996 recently reemphasized OMB, NIST, and agency responsibilities regarding information security under a broader set of requirements aimed at improving information technology management in general. In particular, the act stipulated that agency heads are directly responsible for information technology management, including ensuring that the information security policies, procedures, and practices of their agencies are adequate. The act also required the appointment of a CIO for each of the 24 largest federal agencies to provide the expertise needed to implement needed reforms. Subsequently, in July 1996, the President established the CIO Council, chaired by OMB, to address governmentwide technology issues and advise OMB on policies and standards needed to implement legislative reforms. Council members include CIOs and Deputy CIOs from each of the major agencies. The adequacy of controls over computerized data and the management of these controls are also addressed indirectly by the following additional laws: -- The Federal Managers' Financial Integrity Act (FMFIA) of 1982 requires agency managers to annually evaluate their internal control systems and report to the President and the Congress any material weaknesses that could lead to fraud, waste, and abuse in government operations. -- The Chief Financial Officers (CFO) Act of 1990, as expanded by the Government Management Reform Act of 1994, requires agency CFOs to develop and maintain financial management systems that provide complete, reliable, consistent, and timely information. Under the act, major federal agencies prepare annual financial statements and have them audited by their respective inspectors general. In practice, such audits generally include evaluating and testing controls over the security of automated financial management systems. -- The Federal Financial Management Improvement Act of 1996 requires auditors to report whether agency financial management systems comply with certain established financial management systems requirements. OMB guidance to agency CFOs and IGs lists these systems requirements, which include security over financial systems provided in accordance with OMB Circular A-130, Appendix III, "Security of Federal Automated Information Resources." Agency managers are responsible for developing remediation plans to address the problems noted by the auditors. -- The Government Performance and Results Act of 1993 requires agencies to establish goals for program performance, measure results, and report annually on program performance to the President and the Congress. In May 1998, Presidential Decision Directives 62 and 63 established additional requirements for ensuring protection of our nation's critical infrastructures from both physical and "cyber," or computer-based, threats. At the close of our fieldwork in August 1998, it was too early to determine how these directives would be implemented. However, the provisions pertaining to federal agency information security that are specified in Directive 63 are summarized in chapter 4. Presidential Decision Directive 62, which pertains to counter-terrorism responsibilities, is classified and, therefore, is not discussed in this report. OBJECTIVES, SCOPE, AND METHODOLOGY ---------------------------------------------------------- Chapter 1:4 The objectives of this report are to -- describe the extent of federal information security problems and the associated risks based on reports issued since March 1996, -- identify management actions that could effect significant and long-term improvements in information security at the individual agency level, and -- evaluate governmentwide efforts to improve information security, especially actions taken since September 1996 by OMB and the CIO Council, and identify needed additional actions. To describe the extent of information security problems and associated risks, we analyzed findings from over 80 GAO and agency reports, including inspector general (IG) reports, issued from March 1996 through September 1998. These included some reports for which distribution has been restricted because they discuss sensitive aspects of agency operations. Although we considered the results of these restricted reports when developing summary data on agency weaknesses, the related findings are not discussed in detail nor the agency identified. The reports we considered pertained to the 24 federal departments and agencies covered by the CFO Act. Together these departments and agencies accounted for about 99 percent of the total reported federal net outlays in fiscal year 1997. The reports we analyzed, excluding those that are restricted, are listed in appendixes I and II. In analyzing reported findings, we categorized them into six basic areas of general control: security program planning and management, access control, application program change control, segregation of duties, operating systems security, and service continuity. These six areas of general controls provide a framework for comprehensively evaluating information security. The six categories are defined and described in chapter 2. To identify management actions that could effect fundamental improvements in security at individual agencies, we summarized the results of our recent study of information security program management practices at leading organizations. We performed this study because previous audits had shown that poor security program management was an underlying cause of information security control weaknesses. In May 1998, we published the results of this study as an executive guide entitled Information Security Management: Learning From Leading Organizations (GAO/AIMD-98-68). To assess OMB's leadership and coordination of federal information security efforts, we met with officials from OMB's Office of Information and Regulatory Affairs to discuss their activities related to information security and progress on recommendations made in our report Information Security: Opportunities for Improved OMB Oversight of Agency Practices (GAO/AIMD-96-110, September 24, 1996). We also discussed the information security-related activities of the federal CIO Council with members of the Council's Security Committee and reviewed related documentation, such as meeting minutes and the CIO Council's January 1998 governmentwide strategic plan for information resources management. We also obtained and reviewed Presidential Decision Directive 63, which was issued May 22, 1998, late in our review. This directive specifies requirements for protecting our nation's critical infrastructures and includes provisions pertaining to federal agency information security. Our review was conducted from December 1997 through August 1998 in accordance with generally accepted government auditing standards. One of the reports we relied on, VA Information Systems: Computer Control Weaknesses Increase Risk of Fraud, Misuse, and Improper Disclosure (GAO/AIMD-98-175), is being issued in September 1998. However, a complete draft was available at the close of our review in August. OMB provided written comments on a draft of this report, which are discussed in the "Agency Comments and Our Evaluation" section in chapter 4 and reprinted in appendix III. RELATED GAO EFFORTS ---------------------------------------------------------- Chapter 1:5 In addition to this report, we have worked with the Congress, primarily the Senate Committee on Governmental Affairs, to pursue a comprehensive strategy for addressing the federal information security problems. This strategy involves supplementing our audit work with research projects and other actions to promote and provide support for federal efforts in this area. This strategy comprises the following activities: -- To assess the effectiveness of federal information security and assist the Congress in its oversight role, we are continuing to perform audits at selected individual agencies and develop specific recommendations for improvement. Some of these evaluations are performed as part of our financial statement audits at individual agencies and some pertain to nonfinancial mission-critical systems. -- To assist agency inspectors general in conducting or arranging for information security audits, we began an extensive effort during 1997 to evaluate such audit efforts at each of 24 major federal agencies. We performed, and will continue to perform, this work in conjunction with our annual audits of the consolidated financial statements of the federal government, which are required under the CFO Act as expanded by the Government Management Reform Act. At many of these agencies, we have provided extensive on-site guidance to the inspector general staff to ensure that we could rely on their audit conclusions. -- To promote more comprehensive audits of federal information security, in August 1997, we issued an exposure draft of our Federal Information System Controls Audit Manual (GAO/AIMD-12.19.6), which describes a methodology for evaluating federal agency information security programs. This methodology has guided our own audit work for several years and has recently been adopted by many agency inspectors general. -- To assist in improving the expertise of federal audit staff, we have engaged contractors and partnered with organizations, such as the Information Systems Audit and Control Association, to offer technical training sessions for GAO and IG staff involved in evaluating computer-based controls. -- To promote a broader understanding among federal managers of the practices that make an information security program successful, during 1997, we studied the practices of eight nonfederal organizations and developed an executive guide that summarizes the results. This guide, entitled Information Security Management: Learning From Leading Organizations (GAO/AIMD-98-68) was published in May 1998. We are now working with agencies, including OMB, and the CIO Council to encourage agencies to implement these practices. -- To promote more effective central leadership, oversight, and coordination, we are continuing to monitor and work with OMB, the CIO Council, NIST, and others with a governmentwide role regarding information security, including entities established under Presidential Decision Directive 63 to protect our nation's critical infrastructures. -- To assist the Congress, we are continuing to provide status reports on information security as a high-risk issue and information on related topics, as requested. SIGNIFICANT WEAKNESSES IDENTIFIED AT ALL MAJOR AGENCIES ============================================================ Chapter 2 Evaluations of computer security published since March 1996 present a disturbing picture of the federal government's lack of success in protecting its assets from fraud and misuse, sensitive information from inappropriate disclosure, and critical operations from disruption. Significant information security weakness were identified in each of the 24 agencies covered by our analysis--agencies that in fiscal year 1997 accounted for 99 percent of reported federal net outlays. These weaknesses place a broad range of critical operations and assets at risk for fraud, misuse, and disruption. In addition, they place an enormous amount of highly sensitive data, much of it on individual taxpayers and beneficiaries, at risk of inappropriate disclosure. Weaknesses were reported in a variety of areas that we have categorized into six areas of "general controls." General controls are the policies, procedures, and technical controls that apply to all or a large segment of an entity's information systems and help ensure their proper operation. The most widely reported weakness was poor control over access to sensitive data and systems. This type of weakness makes it possible for an individual or group to inappropriately modify, destroy, or disclose sensitive data or computer programs for purposes such as personal gain or sabotage. In today's increasingly interconnected computing environment, poor access controls can expose an agency's information and operations to attacks from remote locations all over the world by individuals with minimal computer and telecommunications resources and expertise. The full extent of control problems is not known because all six of the general control areas were reviewed at only 9 of the 24 agencies. In particular, most audits have not yet covered controls associated with system software, which are critical to the security of all applications supported by a system. In agencies where this control area was reviewed, weaknesses were always found, as shown in table 1. Table 1 provides an overview of the types of weaknesses reported throughout the government, as well as the gaps in audit coverage. The pages following Table 1 describe (1) the risks these weaknesses pose to major federal operations and (2) common types of deficiencies identified in each of the six general control categories. Table 2.1 Areas of Information Security Weakness Reported for the 24 Largest Agencies Number of agencies ---------------------------------- No Significan significan t weakness t weakness Area not General control area identified identified reviewed ---------------------------------- ---------- ---------- ---------- Entitywide security program 17 0 7 planning and management Access controls 23 0 1 Application software development 14 4 6 and change controls Segregation of duties 16 1 7 System software controls 9 0 15 Service continuity controls 20 0 4 ---------------------------------------------------------------------- Note: Most of the audits used to develop this table were performed as part of financial statement audits. At some agencies with primarily financial-related missions, such as the Department of the Treasury and the Social Security Administration, these audits covered the bulk of mission-related operations. However, at other agencies whose missions are primarily nonfinancial, such as the Departments of Defense and Justice, the audits used to develop this table may provide a less complete picture of the agency's overall security posture because the audit objectives focused on the financial statements and did not include evaluating systems supporting nonfinancial operations. Nevertheless, at agencies where computer-based controls over nonfinancial operations have been audited, similar weaknesses have been identified. EXAMPLES OF WEAKNESSES AT INDIVIDUAL AGENCIES HIGHLIGHT RISKS ---------------------------------------------------------- Chapter 2:1 To understand the significance of the weaknesses summarized in table 1, it is necessary to link them to the risks they present to federal operations and assets. Virtually all federal operations are supported by automated systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions and account for their resources without these information assets. Descriptions of reported weaknesses and related risks to selected major federal operations follow. DEPARTMENT OF THE TREASURY -------------------------------------------------------- Chapter 2:1.1 The Department of the Treasury, which includes the Internal Revenue Service; U.S. Customs Service; Bureau of the Public Debt; Financial Management Service; and Bureau of Alcohol, Tobacco, and Firearms; relies on computer systems to process, collect or disburse, and account for over a trillion dollars in federal receipts and payments annually. In addition, the department's computers handle enormous amounts of highly sensitive data associated with taxpayer records and law enforcement operations and support operations critical to financing the federal government, maintaining the flow of benefits to individuals and organizations, and controlling imports and exports. Protecting these operations and assets is essential to the welfare of our nation. However, weaknesses have been reported for several of Treasury's major bureaus, and, in some cases, these weaknesses have been outstanding for years. For example: -- In March 1998, the Treasury IG reported that deficiencies in the effectiveness of computer-based controls in multiple bureaus constituted a material weakness in the department's internal control structure and increased the risk that unauthorized individuals could intentionally or inadvertently add, alter, or delete sensitive data and programs.\1 -- In three 1997 reports,\2 we identified a wide range of continuing serious weaknesses in IRS systems, including inadequate controls over employee browsing of taxpayer records, an area that has received considerable attention for several years and was recently addressed by legislation specifying penalties for such browsing.\3 -- In March 1998, the Treasury IG reported Customs Service weaknesses associated with systems supporting trade, financial management, and law enforcement functions. Many of these weaknesses had been reported annually since 1994.\4 Numerous recommendations have been made to Treasury bureaus over the years to correct these weaknesses, and many corrective actions are underway. In particular, IRS recently began a broad effort to strengthen its overall security program by centralizing responsibility for security issues within a newly created executive-level office and increasing investments in physical security. Further, the Financial Management Service concurred with our recommendations and is developing corrective action plans. -------------------- \1 Report on the Department of the Treasury's Fiscal Year 1997 Custodial Schedules and Administrative Statements (OIG-98-066, March 30, 1998), as included in the Department of the Treasury's Accountability Report for Fiscal Year 1997. \2 IRS Systems Security: Tax Processing Operations and Data Still at Risk Due to Serious Weaknesses (GAO/AIMD-97-49, April 8, 1997); Financial Audit: Examination of IRS' Fiscal Year 1996 Administrative Financial Statements (GAO/AIMD-97-89, August 29, 1997); Financial Audit: Examination of IRS' Fiscal Year 1996 Custodial Financial Statements (GAO/AIMD-98-18, December 24, 1997). \3 Taxpayer Browsing Protection Act (Public Law 105-35). \4 Department of the Treasury's Inspector General Report: Report on the U.S. Customs Service's Fiscal Years 1997 and 1996 Financial Statements (OIG-98-050, March 5, 1998). DEPARTMENT OF DEFENSE -------------------------------------------------------- Chapter 2:1.2 The Department of Defense (DOD) relies on a vast and complex information infrastructure to support critical operations such as designing weapons, identifying and tracking enemy targets, paying soldiers, mobilizing reservists, and managing supplies. Indeed, its very warfighting capability is dependent on computer-based telecommunications networks and information systems. Defense's computer systems are particularly susceptible to attack through connections on the Internet, which Defense uses to enhance communication and information sharing. In May 1996, we reported that attacks on Defense computer systems were a serious and growing threat.\5 The exact number of attacks could not be readily determined because tests showed that only a small portion were actually detected and reported. However, the Defense Information Systems Agency estimated that attacks numbered in the hundreds of thousands per year, were successful 65 percent of the time, and that the number of attacks was doubling each year. At a minimum, these attacks are a multimillion dollar nuisance to Defense. At worst, they are a serious threat to national security. According to Defense officials, attackers have obtained and corrupted sensitive information--they have stolen, modified, and destroyed both data and software. They have installed unwanted files and "back doors" which circumvent normal system protection and allow attackers unauthorized access in the future. They have shut down and crashed entire systems and networks, denying service to users who depend on automated systems to help meet critical missions. Numerous Defense functions have been adversely affected, including weapons and supercomputer research, logistics, finance, procurement, personnel management, military health, and payroll. In March 1998, DOD announced that it had recently identified a series of organized intrusions, indicating that such events continue to be a problem. The same weaknesses that allow attacks from outsiders could also be exploited by authorized users to commit fraud or other improper or malicious acts. In fact, a knowledgeable insider with malicious intentions can be a more serious threat to many operations since he or she is more likely to know of system weaknesses and how to disguise inappropriate actions. Subsequent reports have identified a broad array of specific control weaknesses that increase the risks of damage from such attacks, as well as from malicious acts and inadvertent mistakes by authorized users. For example, in September 1997, we reported that Defense had not adequately (1) controlled the ability of computer programmers to make changes to systems supporting the Military Retirement Trust Fund, (2) controlled access to sensitive information on pension fund participants, or (3) developed or tested a comprehensive disaster recovery plan for the sites that process Fund data. These weaknesses expose sensitive data maintained by these systems to unnecessary risk of disclosure and, should a disaster occur, there is no assurance that the operations supported by these facilities could be restored in a timely manner.\6 Similarly, In October 1997, the Defense IG reported serious authentication and access control weaknesses associated with a system that, in fiscal year 1996, maintained contract administration and payment data associated with a reported 387,000 contracts for which the reported value was over $810 billion.\7 Weaknesses in other areas, too sensitive to be reported publicly, pose risks of more serious consequences. Reports to DOD have included numerous recommendations related to specific control weaknesses as well as the need for improved security program management. DOD is taking a variety of steps to address these problems and is establishing the Departmentwide Information Assurance Program to improve and better coordinate the information security-related activities of the military services and other DOD components. -------------------- \5 Information Security: Computer Attacks at Department of Defense Pose Increasing Risks (GAO/AIMD-96-84, May 22, 1996). \6 Financial Management: Review of the Military Retirement Trust Fund's Actuarial Model and Related Computer Controls (GAO/AIMD-97-128, September 9, 1997). \7 General and Application Controls Over the Mechanization of Contract Administration Services System, DODIG, Report Number 98-007, October 9, 1997. DEPARTMENT OF HEALTH AND HUMAN SERVICES -------------------------------------------------------- Chapter 2:1.3 In August 1997 and April 1998, the Health and Human Services (HHS) IG reported serious control weaknesses affecting the reliability, confidentiality, and availability of data throughout the department.\8 Most significant were weaknesses associated with the Department's Health Care Financing Administration (HCFA), which, according to its reports, was responsible for processing health care claims for over 38 million beneficiaries and expending 84 percent of HHS' $340 billion fiscal year 1997 budget. HCFA relies on extensive data processing operations at its central office and about 60 contractors using multiple shared systems to collect, analyze and process personal health, financial, and medical data associated with about 853 million Medicare claims, annually. In the 1997 report, the IG reported that Medicare contractors were not adequately protecting confidential personal and medical information associated with claims submitted. As a result, contractor employees could potentially browse data on individuals, search out information on acquaintances or others, and, possibly, sell or otherwise use this information for personal gain or malicious purposes. Similar conditions were reported in 1998. In the 1998 report, the IG reported that data security remained a major concern at HCFA's central office. Auditor's tests showed that although HCFA corrected weaknesses found in the prior year, it was possible to gain access to the mainframe database and modify managed care production files. In addition, the IG found that users without specific authorization could potentially gain update access to those same files. Further, as reported in 1997 and 1998, because controls over operating system software were ineffective, knowledgeable individuals could surreptitiously modify or disable security controls without detection. In both its 1997 and 1998 reports, the IG recommended that (1) systems access be properly controlled, passwords be granted consistent with assigned responsibilities, and passwords be periodically changed, (2) application development and program change control procedures be in place to protect against unauthorized changes, (3) computer-related duties be properly segregated, and (4) service continuity plans be kept current and periodically tested. HHS has recognized the need to protect the security of information technology systems and the data contained in them. Starting in 1997, HHS began to revise security policies and guidance and required each major operating division to develop and implement corrective action plans to address each major weakness identified in the August 1997 report. -------------------- \8 Report on the Financial Statement Audit of the Department of Health and Human Services for Fiscal Year 1996 (A-17-96-0001, August 29, 1997) and Report on the Financial Statement Audit of the Department of Health and Human Services for Fiscal Year 1997 (A-17-98-0001, April 1, 1998). SOCIAL SECURITY ADMINISTRATION -------------------------------------------------------- Chapter 2:1.4 The Social Security Administration (SSA) relies on extensive information processing resources to carry out its operations, which, for 1997, included payments that totaled $390 billion to 50 million beneficiaries. This represents about 25 percent of the $1.6 trillion in that year's federal expenditures. The administration also issues social security numbers and maintains earnings records and other personal information on virtually all U. S. citizens. According to SSA, no other public program or public-service entity directly touches the lives of so many people. The public depends on SSA to protect trust fund revenues and assets from fraud and to protect sensitive information on individuals from inappropriate disclosure. In addition, many current beneficiaries rely on the uninterrupted flow of monthly payments to meet their basic needs. However, in November 1997, the Social Security Administration IG reported widespread weaknesses in controls over access, continuity of service, and software program changes that unnecessarily place these assets and operations at risk.\9 Access control weaknesses exposed the agency and its computer systems to external and internal intrusion, thus subjecting sensitive SSA information to potential unauthorized access, modification, or disclosure. Other weaknesses increased risks of introducing errors or irregularities into data processing operations and allowed some individuals to bypass critical controls, such as authorization and supervisory review. Such weaknesses increase the risk that an individual or group could fraudulently obtain payments by creating fictitious beneficiaries or increasing payment amounts. Similarly, such individuals could secretly obtain sensitive information and sell or otherwise use it for personal gain. The recent growth in "identity theft," where personal information is stolen and used fraudulently by impersonators for purposes such as obtaining and using credit cards, has created a market for such information. According to the SSA IG's September 30, 1997, report to the Congress (included in the SSA's fiscal year 1997 Accountability Report), 29 criminal convictions involving SSA employees were obtained during fiscal year 1997, most of which involved creating fictitious identities, fraudulently selling SSA cards, misappropriating refunds, or abusing access to confidential information. In two separate letters issued to SSA management, the IG and its contractor made recommendations to address the weaknesses reported in November 1997. SSA agreed with the majority of the recommendations in the first letter and has developed related corrective action plans. The Administration is still reviewing the second set of recommendations and planning related corrective actions. -------------------- \9 Social Security Accountability Report for Fiscal Year 1997, SSA Pub. No. 31-231, November 1997. DEPARTMENT OF VETERANS AFFAIRS -------------------------------------------------------- Chapter 2:1.5 The Department of Veterans Affairs (VA) relies on a vast array of computer systems and telecommunications networks to support its operations and store the sensitive information the department collects in carrying out its mission. In September 1998, we reported that general computer control weaknesses placed critical VA operations, such as financial management, healthcare delivery, benefit payments and life insurance services at risk of misuse and disruption.\10 In addition, sensitive information contained in VA's systems, including financial transaction data and personal information on veteran medical records and benefit payments, was vulnerable to inadvertent or deliberate misuse, fraudulent use, improper disclosure, or destruction--possibly occurring without detection. VA operates the largest healthcare delivery system in the United States and guarantees loans on about 20 percent of the homes in the country. In fiscal year 1997, VA spent over $17 billion on medical care and processed over 40 million benefit payments totaling over $20 billion. The department also provided insurance protection through more than 2.5 million policies that represented about $24 billion in coverage at the end of fiscal year 1997. In addition, the VA systems support the department's centralized accounting and payroll functions. In fiscal year 1997, VA's payroll was almost $11 billion, and the centralized accounting system generated over $7 billion in additional payments. In our report, we noted significant problems related to the department's control and oversight of access to its systems. VA did not adequately limit the access of authorized users or effectively manage user identifications and passwords. The department also had not established effective controls to prevent individuals, both internal and external, from gaining unauthorized access to VA systems. VA's access control weaknesses were further compounded by ineffective procedures for overseeing and monitoring systems for unusual or suspicious access activities. In addition, the department was not providing adequate physical security for its computer facilities, by not assigning duties in such a way as to segregate incompatible functions, controlling changes to powerful operating system software, or updating and testing disaster recovery plans to prepare its computer operations to maintain or regain critical functions in emergencies. Many of these access and other general computer control weaknesses were similar to weaknesses that had been previously identified by VA's Office of Inspector General and consultant evaluations. A primary reason for VA's continuing general computer control problems is that the department does not have a comprehensive computer security planning and management program. An effective program would include guidance and procedures for assessing risks and mitigating controls, and monitoring and evaluating the effectiveness of established controls. In our report to VA, we recommended that the Secretary direct the CIO to (1) work with the other VA CIOs to address all identified computer control weaknesses, (2) develop and implement a comprehensive departmentwide computer security planning and management program, and (3) monitor and periodically report on the status of improvements to computer security throughout the department. In commenting on this report, VA agreed with these recommendations and stated that the department would immediately correct the identified computer control weaknesses and was developing plans to correct deficiencies previously identified by the VA IG and by internal evaluations. -------------------- \10 VA Information Systems: Computer Control Weaknesses Increase Risk of Fraud, Misuse and Improper Disclosure (GAO/AIMD-98-175, September 23, 1998). DEPARTMENT OF STATE -------------------------------------------------------- Chapter 2:1.6 In May 1998, we reported that the Department of State did not have a program for comprehensively managing the information security risks associated with its many sensitive operations.\11 State relies on numerous decentralized information systems and networks to carry out its worldwide responsibilities and support business functions. Unclassified data stored in these systems are sensitive and make an attractive target for individuals and organizations desiring to learn about and damage State operations. For example, computerized information on Americans and Foreign Service Nationals, such as personnel records, pay data, private health records, and background investigation information about employees being considered for national security clearances could be useful to foreign governments wishing to build personnel profiles, and its disclosure might unnecessarily endanger State employees. Despite its reliance on computers, State (1) lacked a central security management group to oversee and coordinate security activities, (2) did not routinely perform risk assessments so that its sensitive information could be protected based on its sensitivity, criticality, and value, (3) relied on a primary information security policy document that was outdated and incomplete, (4) did not adequately ensure that computer users were fully aware of risks and of their responsibilities for protecting sensitive information, and (5) lacked key controls for monitoring and evaluating the effectiveness of its security program, including procedures for responding to security incidents. We also noted that State's information systems and the information contained within them were vulnerable to access, change, disclosure, disruption or even denial of service by unauthorized individuals. Our penetration tests, which were designed to determine how susceptible State's systems were to unauthorized access, revealed that it was possible to access sensitive information. Further, these tests went largely undetected, further underscoring the department's serious vulnerability. As a result, individuals or organizations seeking to damage State operations, commit terrorism, or obtain financial gain could possibly exploit the department's information security weaknesses. In our report to State, we made a variety of recommendations directed toward improving the department's management of its information security efforts and assisting State in developing a comprehensive information security program. State formally acknowledged weaknesses in its information security management and generally agreed with our recommendations. Senior State managers say that their commitment to improving information security has increased but that fully implementing our recommendations will require time and resources. -------------------- \11 Computer Security: Pervasive, Serious Weaknesses Jeopardize State Department Operations (GAO/AIMD-98-145, May 18, 1998). DEPARTMENT OF JUSTICE -------------------------------------------------------- Chapter 2:1.7 In September 1997, the Department of Justice IG reported serious departmentwide computer-based control weaknesses that jeopardized a number of sensitive operations.\12 Access controls were weak over files supporting various operations at the Federal Bureau of Investigation, Drug Enforcement Administration, Immigration and Naturalization Service, and the U.S. Marshals Service. User passwords were not required to be changed, security software was not configured to prevent access by inactive users, system programmers had been inappropriately provided the ability to make numerous types of modifications to files that would allow them to circumvent security controls or assist others in such actions. Program change control procedures for system and application software were not formally documented or uniformly followed, increasing the risk that unauthorized software changes or unintentional errors could be made. Further, the IG reported that the department did not have a plan to recover primary systems, critical data processing applications, or key business processes in the event of a disaster. An underlying problem was that written security policies and procedures were outdated and did not define the roles and responsibilities of managers and others with security responsibilities. The Department of Justice management agreed with the findings and has stated that each departmental component will work with Justice's CIO to develop corrective actions. -------------------- \12 U.S. Department of Justice Annual Financial Statement for Fiscal Year 1996 (DOJ/OIG-97-24B, September 1997). OTHER FEDERAL OPERATIONS -------------------------------------------------------- Chapter 2:1.8 Examples of risks at other agencies include the following: -- In May 1998, we reported that weak computer security practices at the Federal Aviation Administration (FAA) jeopardize flight safety.\13 FAA's air traffic control network is an enormous, complex collection of interrelated systems, including navigation, surveillance, weather, and automated information processing and display systems that reside at, or are associated with, hundreds of facilities. All the critical areas included in our review--facilities physical security, operational systems information security, future systems modernization security, and management structure and policy implementation were ineffective. For example, in the physical security area, a March 1997 inspection of one facility that controls aircraft disclosed 13 physical security weaknesses, including unauthorized personnel being granted unescorted access to restricted areas. FAA is unaware of the weaknesses and vulnerabilities that may currently exist at other locations because the agency has not assessed the physical security controls at 187 facilities since 1993. When we met with FAA officials in late July 1998, they acknowledged that major improvements are needed in all areas of FAA's security program and discussed preliminary efforts to address most of our recommendations. -- In April 1997, the Department of Transportation's IG identified multiple security exposures in the Department's extended wide area network which connects hundreds of local area networks and 50,000 computer workstations that support operations throughout the department, including the Federal Aviation Administration, Federal Highway Administration, United States Coast Guard, Federal Railroad Administration, National Highway Safety Traffic Administration as well as DOT headquarters.\14 -- In April 1997, the Department of Housing and Urban Development's IG identified a variety of weaknesses that affected systems critical to supporting all facets of the department's operations, including providing (1) housing subsidies for low and moderate income families, (2) grants to states and communities, and (3) direct loans for construction and rehabilitation of housing projects.\15 In particular, weaknesses associated with an application that annually processed over $9 billion in disbursements increased the risk of over or underpayments to housing authorities, inaccurate budget projections, and users maliciously entering unauthorized transactions for payments. -- In July 1997, the audit of the Department of Education's fiscal year 1996 and 1995 financial statements reported access control weaknesses in the Payment Management System, which controlled disbursements of over $28 billion annually. As a result, unauthorized users could potentially have accessed confidential data, changed data, made unauthorized payments, or disabled the system.\16 -- In April 1997, the Department of the Interior's IG reported\17 that the Bureau of Indian Affairs' had not implemented an effective system security program for the Bureau's major and sensitive mainframe applications, including the Land Records Information System and the Individual Indian Monies System, that processed approximately 2.5 million transactions weekly. In particular, the Bureau had inadequate (1) access controls over the mainframe computers, (2) software development and change controls, and (3) segregation of duties for the systems support functions, including data administration, data security, and quality assurance/testing. In addition, a service continuity plan had not been developed and the off-site storage facility was not secure or environmentally protected. -- In March 1997, the Department of Commerce Inspector General reported material weaknesses at several Commerce Bureaus. For example, the Economic Development Administration, which managed a $1 billion grant program in fiscal year 1997, did not adequately segregate programming responsibilities or adequately restrict access to its information systems. Inappropriately segregated duties can lead to implementation of unauthorized or inadequately tested programs. Further, unrestricted access can lead to accidental or intentional changes to program data.\18 Recommended corrective actions have been provided to each of these agencies, and many have begun to implement them. -------------------- \13 Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety (GAO/AIMD-98-155 May 18, 1998). \14 Report on the Department of Transportation Fiscal Year 1996 Consolidated Financial Statement (AD-OT-7-004, April 10, 1997). \15 Audit of the U.S. Department of Housing and Urban Development's Fiscal Year 1996 Financial Statements (97-FO-177-0003, April 10, 1997). \16 U.S. Department of Education Fiscal Years 1996 and 1995 Financial Statements and Accompanying Notes, Price Waterhouse, LLP July 31, 1997. \17 Audit Report on General Controls Over Automated Information Systems, Operations Service Center, Bureau of Indian Affairs (Number 97-I-771, April 30, 1997). \18 The U.S. Department of Commerce Consolidating Financial Statements Fiscal Year 1996 (Audit Report No FSD-9355-7-0001, March 1997) (attachment 1, Department of Commerce IG report, Economic Development Administration report, p. 5). ALTHOUGH NATURE OF RISKS VARY, CONTROL WEAKNESSES ACROSS AGENCIES ARE SIMILAR ---------------------------------------------------------- Chapter 2:2 Although the nature of agency operations and the related risks vary, there are striking similarities in the specific types of general control weaknesses reported and in their serious negative impact on an agency's ability to ensure the integrity, availability, and appropriate confidentiality of its computerized operations. In many cases, agencies have developed policies and begun to implement control techniques that could provide effective security. However, they have not yet done enough to ensure that these policies and controls remain effective on an ongoing basis. The following sections describe each of the six areas of general controls and the specific weaknesses that were most widespread at the agencies covered by our analysis. ENTITYWIDE SECURITY PROGRAM PLANNING AND MANAGEMENT -------------------------------------------------------- Chapter 2:2.1 Each organization needs a set of management procedures and an organizational framework for identifying and assessing risks, deciding what policies and controls are needed, periodically evaluating the effectiveness of these policies and controls, and acting to address any identified weaknesses. These are the fundamental activities that allow an organization to manage its information security risks cost effectively, rather than reacting to individual problems ad hoc only after a violation has been detected or an audit finding has been reported. Despite the importance of this aspect of an information security program, we found that poor security planning and management was a widespread problem. Of 17 agencies where this aspect of security was reviewed, all had deficiencies. Many agencies had not developed security plans for major systems based on risk, had not formally documented security policies, and had not implemented a program for testing and evaluating the effectiveness of the controls they relied on. Examples include the following. -- In August 1997, the IG at the Department of Health and Human Services reported that the Health Care Financing Agency had not reviewed internal controls or developed security plans for its computer center, telecommunications networks, or significant applications. Further, it did not have a consistent set of policies for overseeing the effectiveness of security at its contractor locations.\19 -- In July 1997, the Department of the Treasury IG reported that the Bureau of Alcohol, Tobacco and Firearms had not developed formal policies, standards, and procedures; had not established a formal program for security awareness and training; and had not identified all of its major applications.\20 -- In April 1997, we reported that the Internal Revenue Service needed to strengthen computer security management and that its approach to computer security was not effective in preventing serious and persistent computer security control weaknesses that exposed tax processing operations to the serious risk of disruption and taxpayer data to the risk of unauthorized use, modification, and destruction.\21 -- In May 1997, independent auditors recommended that the Office of Personnel Management develop security plans, identify system owners, and require periodic independent reviews of security controls.\22 -- In May 1996, we reported that the Department of Defense needed to establish a more comprehensive information systems security program. Specific weaknesses included (1) outdated and incomplete policies for detecting and reacting to computer attacks, (2) lack of awareness among computer users, and (3) inadequately trained system and network administrators.\23 As a result of these types of deficiencies, agencies (1) were not fully aware of the information security risks to their operations, (2) had accepted an unknown level of risk by default rather than consciously deciding what level of risk was tolerable, (3) had a false sense of security because they were relying on controls that were not effective, and (4) could not make informed judgments as to whether they were spending too little or too much of their resources on security. Security program management is discussed in greater detail in chapter 3. -------------------- \19 Report on the Financial Statement Audit of the Department of Health and Human Services for Fiscal Year 1996 (A-17-96-00001, August 29, 1997). \20 Audit of the Bureau of Alcohol, Tobacco, and Firearms Fiscal Years 1996 and 1995 Financial Statements (OIG-97-094, July 9, 1997). \21 IRS Systems Security: Tax Processing Operations and Data Still at Risk Due to Serious Weaknesses (GAO/AIMD-97-49, April 8, 1997). \22 Financial Statements, Fiscal Year 1996, U.S. Office of Personnel Management, Independent Auditors' Report (May 30, 1997). \23 Information Security: Computer Attacks at Department of Defense Pose Increasing Risks (GAO/AIMD-96-84, May 22, 1996). ACCESS CONTROLS -------------------------------------------------------- Chapter 2:2.2 Access controls limit or detect inappropriate access to computer resources (data, equipment, and facilities) thereby protecting these resources against unauthorized modification, loss, and disclosure. Access controls include physical protections, such as gates and guards, as well as logical controls, which are controls built into software that (1) require users to authenticate themselves through the use of secret passwords or other identifiers and (2) limit the files and other resources that an authenticated user can access and the actions that he or she can execute. Without adequate access controls, unauthorized individuals, including outside intruders or terminated employees, can surreptitiously read and copy sensitive data and make undetected changes or deletions for malicious purposes or personal gain. In addition, authorized users could unintentionally modify or delete data or execute changes that are outside of their span of authority. For access controls to be effective, they must be properly implemented and maintained. First, an organization must analyze the responsibilities of individual computer users to determine what type of access (e.g., read, modify, delete) they need to fulfill their responsibilities. Then, specific control techniques, such as specialized access control software, must be implemented to restrict access to these authorized functions. Such software can be used to limit a user's activities associated with specific systems or files and to keep records of individual users' actions on the computer. Finally, access authorizations and related controls must be maintained and adjusted on an ongoing basis to accommodate new or terminated employees and changes in users' responsibilities and related access needs. Access control weaknesses were reported for all 23 of the agencies for which this area of controls was evaluated. Specific common problems included the following. -- Managers had not precisely identified access needs for individual users or groups of users. Instead, they had provided overly broad access privileges to very large groups of users. As a result, far more individuals than necessary had the ability to browse and, sometimes, modify or delete sensitive or critical information. At one agency, for instance, a number of interconnected systems with very poorly implemented access controls were accessible from remote locations by anyone who had the telephone number for the supporting network. Because access controls associated with both the network and the systems were weak, an anonymous intruder could easily have dialed into the network, accessed any one of several systems, and committed any number of malicious actions, including reading, modifying, and deleting both data and other users' access rights and severely disrupting service. At another agency, 90 employees could change amounts available to grantees and contractors associated with an $8 billion grant program. -- Access was not appropriately authorized and documented. For example, at one agency, user access was verbally requested and approved and no related documentation was maintained. -- Users shared accounts and passwords or posted their passwords in plain view, making it impossible to trace specific transactions or modifications to an individual. Also, use of default, easily guessed, and unencrypted passwords significantly increased the risk of unauthorized access. -- Software access controls were improperly implemented, resulting in unintended access or gaps in access control coverage. For example, at one agency location, any one of 17,000 system users could search, view, and print information in any of the other users' print files because access to temporary files holding users' output was not adequately restricted. -- User activity was not adequately monitored to deter and identify inappropriate actions, and when suspicious activity was noticed, it was often not investigated nor the perpetrator penalized. For example, records of user activity, referred to as audit logs, were either not maintained, not maintained in a useable format, or were too voluminous to be practical. As a result, it was either not possible or practical to review these logs to identify inappropriate actions and link any such actions to individual users. Such monitoring is especially important to prevent users with access to sensitive data from inappropriately browsing data that do not pertain to the work at hand and to identify activity indicating an intrusion into a network or system. However, tests showed that most attacks at this agency were not detected and reported. -- Access was not promptly terminated when users either left the agency or adjusted when their responsibilities no longer required them to have access to certain files. In addition, inactive user identifications were not routinely identified and deleted. As a result, contractors and former employees who were no longer associated with the agency, could still read, modify, copy, or delete data, and employees who changed positions within an agency had access to files that were not needed in their new positions. For example, at one location, automated controls were set to allow former employees access for 90 days after their employment had terminated. To illustrate the risks associated with poor authentication and access controls, in recent years, we have begun to incorporate penetration testing into our audits of information security. Such tests involve attempting to gain unauthorized access to sensitive files and data by searching for ways to circumvent existing controls, often from remote locations. Unfortunately, our auditors have been successful, in almost every test, in readily gaining unauthorized access that would allow intruders to read, modify, or delete data for whatever purpose they had in mind. APPLICATION SOFTWARE DEVELOPMENT AND CHANGE CONTROLS -------------------------------------------------------- Chapter 2:2.3 Application software development and change controls prevent unauthorized software programs or modifications to programs from being implemented. Key aspects of such controls are ensuring that (1) software changes are properly authorized by the managers responsible for the agency program or operations that the application supports, (2) new and modified software programs are tested and approved prior to their implementation, and (3) approved software programs are maintained in carefully controlled libraries to protect them from unauthorized changes and ensure that different versions are not misidentified. Such controls can prevent both errors in software programming as well as malicious efforts to insert unauthorized computer program code. Without adequate controls, incompletely tested or unapproved software can result in erroneous data processing that, depending on the application, could lead to losses or faulty outcomes. In addition, individuals could surreptitiously modify software programs to include processing steps or features that could later be exploited for personal gain or sabotage. The effectiveness of software change controls is of particular concern as agencies design, test, and implement changes to ensure that their computer software will properly handle the year-2000 date change. As the end of the millennium approaches, agencies are under increasing pressure to ensure that their computers can distinguish between the year 1900 and the year 2000, since many use only the last two digits when identifying years. In an effort to accomplish these changes on time, agencies may be forced to speed up their software change process and increase their reliance on newly hired personnel or contractors. In such an environment, it will be especially important to ensure that software changes are properly tested and approved before they are implemented. Weaknesses in software program change controls were identified for 14 of the 18 agencies where such controls were evaluated. The most common types of weaknesses in this area included the following: -- Testing procedures were undisciplined and did not ensure that implemented software operated as intended. For example, at one agency, changes were made directly to software programs in operation rather than in a separate and controlled test environment, increasing the risk that erroneous or unauthorized software would result in miscalculations of pension liability. -- Implementation procedures did not ensure that only authorized software was used. In particular, procedures did not ensure that emergency changes were subsequently tested and formally approved for continued use and that implementation of "locally-developed" unauthorized software programs was prevented or detected. -- Access to software program libraries was inadequately controlled. For example, at one agency, most system users--over 13,000 individuals--had the ability to modify application programs that processed millions of dollars in financial transactions. At another agency, approximately 16,000 users had unrestricted access to application programs, which allowed them to modify and delete programs and data. SEGREGATION OF DUTIES -------------------------------------------------------- Chapter 2:2.4 Segregation of duties refers to the policies, procedures, and organizational structure that help ensure that one individual cannot independently control all key aspects of a process or computer-related operation and thereby conduct unauthorized actions or gain unauthorized access to assets or records without detection. For example, one computer programmer should not be allowed to independently write, test, and approve program changes. Although segregation of duties, alone, will not ensure that only authorized activities occur, inadequate segregation of duties increases the risk that erroneous or fraudulent transactions could be processed, that improper program changes could be implemented, and that computer resources could be damaged or destroyed. For example, -- an individual who was independently responsible for authorizing, processing, and reviewing payroll transactions could inappropriately increase payments to selected individuals without detection; or -- a computer programmer responsible for authorizing, writing, testing, and distributing program modifications could either inadvertently or deliberately implement computer programs that did not process transactions in accordance with management's policies or that included malicious code. Controls to ensure appropriate segregation of duties consist mainly of documenting, communicating, and enforcing policies on group and individual responsibilities. Enforcement can be accomplished by a combination of physical and logical access controls and by effective supervisory review. Segregation of duties was evaluated at 17 of the 24 agencies covered by our analysis. Weaknesses were identified at 16 of these agencies. Common problems involved computer programmers and operators who were authorized to perform a wide variety of duties, thus providing them the ability to independently modify, circumvent, and disable system security features. For example, at one data center, a single individual could independently develop, test, review, and approve software changes for implementation. Segregation of duty problems also were identified related to transaction processing. For example, at one agency, all users of the financial management system could independently perform all of the steps needed to initiate and complete a payment--obligate funds, record vouchers for payment, and record checks for payment--making it relatively easy to make a fraudulent payment. SYSTEM SOFTWARE CONTROLS -------------------------------------------------------- Chapter 2:2.5 System software controls limit and monitor access to the powerful programs and sensitive files associated with the computer systems operation. Generally, one set of system software is used to support and control a variety of applications that may run on the same computer hardware. System software helps control and coordinate the input, processing, output, and data storage associated with all of the applications that run on the system. Some system software can change data and program code on files without leaving an audit trail or can be used to modify or delete audit trails. Examples of system software include the operating system, system utilities, program library systems, file maintenance software, security software, data communications systems, and database management systems. Controls over access to and modification of system software are essential in providing reasonable assurance that operating system-based security controls are not compromised and that the system will not be impaired. If controls in this area are inadequate, unauthorized individuals might use system software to circumvent security controls to read, modify, or delete critical or sensitive information and programs. Also, authorized users of the system may gain unauthorized privileges to conduct unauthorized actions or to circumvent edits and other controls built into application programs. Such weaknesses seriously diminish the reliability of information produced by all of the applications supported by the computer system and increase the risk of fraud, sabotage, and inappropriate disclosures. Further, system software programmers are often more technically proficient than other data processing personnel and, thus, have a greater ability to perform unauthorized actions if controls in this area are weak. The control concerns for system software are similar to the access control issues and software program change control issues discussed earlier in this section. However, because of the high level of risk associated with system software activities, most entities have a separate set of control procedures that apply to them. Operating system software controls were covered in audits for only 9 of the 24 agencies included in our review. However, problems were identified for all 9 agencies, illustrating the importance of reviewing operating system controls. A common type of problem reported was insufficiently restricted access that made it possible for knowledgeable individuals to disable or circumvent controls in a wide variety of ways. For example, at one facility, 88 individuals had the ability to implement programs not controlled by the security software and 103 had the ability to access an unencrypted security file containing passwords for authorized users. SERVICE CONTINUITY CONTROLS -------------------------------------------------------- Chapter 2:2.6 Service continuity controls ensure that, when unexpected events occur, critical operations continue without undue interruption and critical and sensitive data are protected. For this reason, an agency should have (1) procedures in place to protect information resources and minimize the risk of unplanned interruptions and (2) a plan to recover critical operations should interruptions occur. These plans should consider the activities performed at general support facilities, such as data processing centers, as well as the activities performed by users of specific applications. To determine whether recovery plans will work as intended, they should be tested periodically in disaster simulation exercises. Although often referred to as disaster recovery plans, controls to ensure service continuity should address the entire range of potential disruptions. These may include relatively minor interruptions, such as temporary power failures or accidental loss or erasing of files, as well as major disasters, such as fires or natural disasters that would require reestablishing operations at a remote location. Losing the capability to process, retrieve, and protect information maintained electronically can significantly affect an agency's ability to accomplish its mission. If controls are inadequate, even relatively minor interruptions can result in lost or incorrectly processed data, which can cause financial losses, expensive recovery efforts, and inaccurate or incomplete financial or management information. Service continuity controls include (1) taking steps, such as routinely making backup copies of files, to prevent and minimize potential damage and interruption, (2) developing and documenting a comprehensive contingency plan, and (3) periodically testing the contingency plan and adjusting it as appropriate. Service continuity controls were evaluated for 20 of the agencies included in our analysis. Weaknesses were reported for all of these agencies. Common weaknesses included the following: -- Plans were incomplete because operations and supporting resources had not been fully analyzed to determine which were the most critical and would need to be resumed as soon as possible should a disruption occur. For example, one agency had identified critical workloads and processing priorities that would need to be resumed and supported after a disruption but had not identified the specific software needed for users to perform their jobs. Such information could be difficult to compile in the confusion that would be likely after a major disruptive event. -- Disaster recovery plans were not fully tested to identify their weaknesses. One agency's plan was based on an assumption that key personnel could be contacted within 10 minutes of the emergency, an assumption that had not been tested. CONCLUSION ---------------------------------------------------------- Chapter 2:3 Important operations at every major federal agency are at some type of risk due to weak information security controls. There are many specific causes of these weaknesses, but many result from poor security program management and poor administration of available control techniques. The audit reports cited in this chapter include numerous recommendations to individual agencies that address the specific weaknesses reported. For this reason, we are making no additional recommendations to these agencies in this report. However, our executive guide, Information Security Management: Learning From Leading Organizations (GAO/AIMD-98-68), discusses the results of our recent study of information security best practices and outlines a number of principles and practices that could enable federal agencies to implement more effective information security programs. Chapter 3 summarizes the principles outlined in the executive guide. NEED FOR IMPROVED SECURITY PROGRAM PLANNING AND MANAGEMENT AT INDIVIDUAL AGENCIES ============================================================ Chapter 3 Although auditors can provide periodic independent assessments of agency operations, ultimately it is agency management that is responsible for ensuring that internal controls, including information security controls, are appropriately selected and effectively implemented on an ongoing basis. In September 1996, we reported that an underlying cause of poor federal information security was that many agencies had not instituted a framework for proactively managing the information security risks associated with their operations.\1 Instead, there was a tendency to react to individual audit findings as they were reported, with little ongoing attention to the systemic causes of control weaknesses. Since then, as discussed in chapter 2, additional audits have identified the same underlying problem. Security program planning and management deficiencies were reported for 17 of the 24 agencies included in our analysis. In particular, agencies were not adequately assessing risks and monitoring control effectiveness. To identify potential solutions to this problem, during 1997, we studied the security management practices of eight nonfederal organizations known for their superior security programs. We found that these organizations managed their information security risks through a cycle of risk management activities, and we identified 16 specific practices that supported these risk management principles. These findings were initially published as an exposure draft in November 1997. Subsequently, they were published in May 1998 in an executive guide entitled Information Security Management: Learning From Leading Organizations (GAO/AIMD-98-68). The guide is generally consistent with OMB and NIST guidance on information security program management, and it has been endorsed by the CIO Council as a useful resource for agency managers. The guide's major points are summarized below. -------------------- \1 Information Security: Opportunities for Improved OMB Oversight of Agency Practices (GAO/AIMD-96-110, September 24, 1996). BEST PRACTICES PROVIDE A FRAMEWORK FOR IMPROVEMENT ---------------------------------------------------------- Chapter 3:1 Our study of information security management practices identified a fundamental set of management principles and 16 specific practices. Together, these principles and practices constitute a cycle of activity for managing risk. THE RISK MANAGEMENT CYCLE -------------------------------------------------------- Chapter 3:1.1 The risk management cycle, as depicted in figure 3.1, begins with an assessment of risk and determination of needs, including selecting cost-effective policies and related controls. Once policies and controls are decided on, they must be implemented. Then, policies and controls, as well as the risks that prompted their adoption, must be communicated to those responsible for complying with them. Finally, and perhaps most importantly, there must be procedures for evaluating the effectiveness of policies and related controls and reporting the resulting conclusions to those who can take appropriate corrective action. Also, our study found that a strong central security management focal point can help ensure that the major elements of the risk management cycle are carried out and serve as a communications link among organizational units. This cycle of activity, coordinated by a central focal point, can help ensure that existing controls are effective and that new, more advanced control techniques are prudently and effectively selected and implemented. Figure 3.1: The Risk Management Cycle (See figure in printed edition.) The elements of the risk management cycle are not new. They have been described in various ways in OMB and NIST guidance and in various other guides on information security and internal controls. Nevertheless, as basic as these principles are, audits continue to show that many federal agencies have not implemented this cycle of activity. One possible cause for this deficiency is that some senior agency officials, like many private sector executives, may be just beginning to realize how critical their information resources are to their program operations and may not fully understand that security weaknesses present formidable risks to mission-related operations. Another reason is that maintaining adequate information security can be difficult. The complicated and technical nature of many of the risks and controls requires that organizations adopt more defined processes than are needed to manage other types of internal controls. These defined processes are needed to ensure that personnel with the right mix of expertise are involved in risk management decisions; that all pertinent factors are considered; that the effectiveness of controls, especially technical controls, is reliably evaluated; and that the results of these evaluations and their potential effects on critical operations are clearly reported to senior officials. Within this basic risk management cycle, we identified 16 practices that were key to the effectiveness of an information security program. A brief description of these practices, organized according to the five elements of the risk management cycle, follows. A more detailed description accompanied by case examples can be found in our executive guide. ASSESS RISK AND DETERMINE NEEDS -------------------------------------------------------- Chapter 3:1.2 PRACTICE 1: RECOGNIZE INFORMATION RESOURCES AS ESSENTIAL ORGANIZATIONAL ASSETS ------------------------------------------------------ Chapter 3:1.2.1 Organizations that have become heavily dependent on computers, electronic data, and telecommunications to conduct their activities must recognize that these information resources are critical assets, essential to supporting business operations. Information protection should be viewed as an integral element of operational management and strategic planning. In particular, senior executives must understand the importance of data and systems and be willing to devote an appropriate level of resources to protecting these assets. PRACTICE 2: DEVELOP PRACTICAL RISK ASSESSMENTS THAT LINK SECURITY TO BUSINESS NEEDS ------------------------------------------------------ Chapter 3:1.2.2 Security needs should be based on risk, and this requires some type of risk assessment. Various methods can be used, from relatively informal discussions to complex analyses. Key success factors are that risk assessments -- be required and involve defined minimum procedures; -- involve a mix of individuals with knowledge of business operations and technical aspects of the organization's systems; -- rank, but not necessarily precisely quantify, risks; -- require sign-off by business managers indicating agreement with risk reduction decisions and acceptance of the residual risk; and -- result in documentation that is provided to more senior officials and internal auditors, so that participants can be held accountable for their decisions. PRACTICE 3: HOLD PROGRAM AND BUSINESS MANAGERS ACCOUNTABLE ------------------------------------------------------ Chapter 3:1.2.3 Primary responsibility for managing risk should rest with business or program managers because they are in the best position to determine what the business impact of a loss of integrity, confidentiality, or availability of information resources would be. The security specialists, on the other hand, should play more of an educational and advisory role. However, they should not hesitate to elevate discussions to higher levels if they believe that inappropriate risk management decisions are being made. PRACTICE 4: MANAGE RISK ON A CONTINUING BASIS ------------------------------------------------------ Chapter 3:1.2.4 Risk must be continuously reassessed because the factors that affect risk---threats, technology, known vulnerabilities, and the sensitivity of the operations being supported--frequently change. ESTABLISH A CENTRAL MANAGEMENT FOCAL POINT -------------------------------------------------------- Chapter 3:1.3 PRACTICE 5: DESIGNATE A CENTRAL GROUP TO CARRY OUT KEY ACTIVITIES ------------------------------------------------------ Chapter 3:1.3.1 Central security management groups can ensure that the various elements of the risk management cycle are implemented. They can also serve as a conduit for communicating information across organizational lines and from outside sources. PRACTICE 6: PROVIDE THE CENTRAL GROUP READY AND INDEPENDENT ACCESS TO SENIOR EXECUTIVES ------------------------------------------------------ Chapter 3:1.3.2 Regardless of their organizational position, an organization's central security manager must feel that he or she can comfortably raise issues to higher levels. Independent access to senior executives allows senior security managers to provide an objective assessment of security needs and gives them the clout to be effective throughout their organizations. PRACTICE 7: DESIGNATE DEDICATED FUNDING AND STAFF ------------------------------------------------------ Chapter 3:1.3.3 Central groups should have defined budgets that allow them to plan and set goals. However, they may also rely on a network of subordinate security specialists who work in other organizational units. PRACTICE 8: ENHANCE STAFF PROFESSIONALISM AND TECHNICAL SKILLS ------------------------------------------------------ Chapter 3:1.3.4 Develop security managers into a cadre of respected specialists. Technical training and professional certification should be encouraged and kept current. IMPLEMENT APPROPRIATE POLICIES AND RELATED CONTROLS -------------------------------------------------------- Chapter 3:1.4 PRACTICE 9: LINK POLICIES TO BUSINESS RISKS ------------------------------------------------------ Chapter 3:1.4.1 Policies and the controls to implement policies should flow directly from risk assessments and, thus, be linked to business risks. Also, as risk factors change, policies and controls should be updated. PRACTICE 10: DISTINGUISH BETWEEN POLICIES AND GUIDELINES ------------------------------------------------------ Chapter 3:1.4.2 Distinguishing between policies and guidelines provides flexibility for individual business units. However, high-risk operations are likely to require a more detailed set of mandatory policies and standards. PRACTICE 11: SUPPORT POLICIES THROUGH THE CENTRAL SECURITY GROUP ------------------------------------------------------ Chapter 3:1.4.3 Central groups can promote consistency in policy implementation by developing the related written documents, based on input from business managers, attorneys, and others, and by serving as the organizational focal point for policy questions. PROMOTE AWARENESS -------------------------------------------------------- Chapter 3:1.5 PRACTICE 12: CONTINUALLY EDUCATE USERS AND OTHERS ON RISKS AND RELATED POLICIES ------------------------------------------------------ Chapter 3:1.5.1 Awareness of both risks and policies should be vigorously promoted so that users understand the importance of complying with policies and controls. In particular, sensitizing employees and other users to risks can make users (1) think twice before revealing sensitive data and (2) more likely to notice and report suspicious activity. PRACTICE 13: USE ATTENTION-GETTING AND USER-FRIENDLY TECHNIQUES ------------------------------------------------------ Chapter 3:1.5.2 Various promotion techniques, such as intranet websites, awareness days, and posters can keep security in the forefront of users' minds. Two effective techniques are customized briefings to individual business units and videos featuring top organization executives promoting security as everyone's responsibility. MONITOR AND EVALUATE POLICY AND CONTROL EFFECTIVENESS -------------------------------------------------------- Chapter 3:1.6 PRACTICE 14: MONITOR FACTORS THAT AFFECT RISK AND INDICATE SECURITY EFFECTIVENESS ------------------------------------------------------ Chapter 3:1.6.1 Managers should develop procedures for periodically evaluating the effectiveness of their information security programs, paying closest attention to the controls associated with the most critical operations. Monitoring and evaluation efforts should focus primarily on (1) determining if controls are operating as intended and (2) evaluating the effectiveness of the security program in communicating policies, raising awareness levels, and reducing incidents. Testing controls, including penetration testing, is an effective way to determine if policies and controls are operating effectively. Other types of monitoring and evaluation activities include periodic reports on compliance with various policies, the number of inquiries from users, and the number and nature of security incidents reported. PRACTICE 15: USE RESULTS TO DIRECT FUTURE EFFORTS AND HOLD MANAGERS ACCOUNTABLE ------------------------------------------------------ Chapter 3:1.6.2 The full benefits of monitoring are not achieved unless results are reported to officials who can take any actions needed to improve the security program. Such action can include (1) reassessing previously identified risks, (2) identifying new problem areas, (3) reassessing the appropriateness of existing controls and security-related activities, (4) identifying the need for new controls, (5) redirecting subsequent monitoring efforts, and (6) holding managers accountable for compliance. Effecting change and holding managers accountable generally requires involvement of an organization's most senior executives. PRACTICE 16: BE ALERT TO NEW MONITORING TOOLS AND TECHNIQUES ------------------------------------------------------ Chapter 3:1.6.3 Because new technology is being introduced at a fast pace, with related security controls often lagging behind, security specialists must keep abreast of information on new risks and control techniques through professional organizations and literature. IMPROVED SECURITY DEPENDS ON BROADER IMPROVEMENTS TO INFORMATION TECHNOLOGY MANAGEMENT ---------------------------------------------------------- Chapter 3:2 The risk management activities described in our executive guide and summarized above are likely to be most successful if implemented in the context of broader improvements to federal information technology management. Over the last few years, the Congress has enacted legislation that is prompting landmark reforms in this broader area. In particular, the Paperwork Reduction Act of 1995 and the Clinger-Cohen Act of 1996 emphasize the need for agencies to apply information resources to effectively support agency missions and delivery of services to the public. These laws stress the importance of involving senior executives in information management decisions, appointing senior-level chief information officers, and using performance measures to assess the contribution of technology in achieving mission results. Both specify security as an aspect of information management that must be addressed. These broader information management improvements are apt to improve security management because they prompt senior agency officials to take a more active role in managing their organizations' use of information technology. Further, agencies may find this environment of reform conducive to rethinking their security programs and considering new practices. CONCLUSION ---------------------------------------------------------- Chapter 3:3 Although existing federal guidance outlines basic security planning and management requirements, many, if not most, of the reported weaknesses in agency information security controls can be traced to poor performance in this area. Good management is essential to ensure that relied-upon controls are working effectively on a continuous basis. It is also important to help ensure that agencies promptly identify emerging risks and take full advantage of more sophisticated security controls as they become available. Our executive guide, which outlines the risk management practices employed by leading organizations, provides a framework of solutions that supplement existing federal guidance and can assist agencies in strengthening their management of this critical area. CENTRALLY DIRECTED IMPROVEMENT EFFORTS HAVE INCREASED, BUT MOST HAVE NOT PROGRESSED BEYOND PLANNING STAGE ============================================================ Chapter 4 Several new governmentwide efforts to improve federal information security have been initiated since we last reported on this topic in September 1996, such as the recent issuance of Presidential Decision Directive (PDD) 63 on critical infrastructure protection. Most of these efforts, however, had only recently been started and had not progressed far beyond the planning stages at the close of our review. In addition, while these efforts address some important information security problems, such as inadequate risk awareness and incident reporting capabilities, none provides a comprehensive strategy for adequate monitoring and oversight of agency performance in this area. Federal agencies are primarily responsible for protecting their respective information resources, but governmentwide leadership, coordination, and oversight are important to (1) ensure that federal executives understand the risks to their operations, (2) monitor agency performance in mitigating these risks, (3) ensure implementation of needed improvements, and (4) facilitate actions to resolve issues affecting multiple agencies. To help achieve this, the Paperwork Reduction Act of 1980 made OMB responsible for developing information security policies and overseeing related agency practices. Since September 1996, OMB has continued to review selected agency system-related projects and provide input through various federal task forces and working groups. These efforts were supplemented in late 1997 when the CIO Council, under OMB's leadership, designated information security as one of six priority areas and established a Security Committee. The Committee, in turn, has developed a preliminary plan and taken several actions primarily related to promoting awareness, planning for improving agency access to incident response services, and establishing links with other federal entities involved in security issues. However, neither OMB nor the Council has developed a comprehensive strategy for ensuring that agency security programs are effective. More recently, in May 1998, PDD 63 was issued, which established several entities within the National Security Council, the Department of Commerce, and the Federal Bureau of Investigation to address critical infrastructure protection, including federal agency information infrastructures. This directive specified several requirements related to evaluating and coordinating federal agency information security practices. However, at the close of our review in early August 1998, it was not clear how and when these new requirements would be implemented and how they would be coordinated with existing requirements and with efforts underway at other federal entities. PREVIOUS RECOMMENDATIONS URGED MORE ACTIVE OVERSIGHT ---------------------------------------------------------- Chapter 4:1 In 1996, we reported that, although OMB had improved federal guidance pertaining to information security, its oversight efforts were uneven, and it generally did not proactively attempt to identify and promote resolution of fundamental security program weaknesses that were likely to be at the root of reported deficiencies at individual agencies. Our report recommended that OMB -- take advantage of the wide range of information currently reported in financial statement audit reports and agency self-assessments to monitor agency compliance with OMB's guidance and the effectiveness of agency information security programs, and -- implement a program for increasing its program examiners' understanding of information security management issues so that they can more readily identify and understand the implications of information security weaknesses on agency programs. We also recommended that OMB promote the CIO Council's (1) adoption of information security as one of its top priorities and (2) development of a strategic plan for increasing awareness of the importance of information security, especially among senior agency executives, and improving information security program management governmentwide. We suggested that the CIO Council's strategic plan include plans for -- developing information on the existing security risks associated with nonclassified systems currently in use, -- developing information on the risks associated with evolving practices, such as Internet use, -- identifying best practices regarding information security programs so that they can be adopted by federal agencies, -- establishing a program for reviewing the adequacy of individual agency information security programs, -- ensuring adequate review coverage of agency information security practices by considering the scope of various types of audits and reviews performed and acting to address any identified gaps in coverage, -- developing or identifying training and certification programs that can be shared among agencies, and -- identifying proven security tools and techniques. CIO COUNCIL PLANS FOCUS ON SOLVING SELECTED CROSSCUTTING PROBLEMS ---------------------------------------------------------- Chapter 4:2 The CIO Council has begun to lay the groundwork for improvements in several areas, but has not developed a comprehensive strategy that identifies the most critical issues affecting federal information security and includes long-term goals and objectives, including annual performance goals. During 1997, the Council discussed various critical information management issues, and in late 1997, formally declared information security as one of six priority areas that will guide the Council's activities. The stated goal for this area is to "ensure implementation of security practices within the Federal Government that gain public confidence and protect Government service, privacy, and sensitive and national security information." Two other priority areas--defining an interoperable architecture and improving information technology workforce skills--may also support security improvements. An interoperable federal computer systems architecture will make it easier to implement and manage security controls, and improving technical workforce skills will help provide expertise needed to select and properly implement technical controls. To guide activities associated with its information security goal, the Council established the Security Committee, also in late 1997. Since then, the Committee has taken some steps to coordinate its plans with related activities at other federal entities and address some of the most prominent governmentwide problems associated with information security, such as insufficient awareness of risks, inadequate technical training, and poor incident response capabilities. These projects have been conducted during monthly meetings and by part-time efforts of individual committee members between meetings. Accomplishments as of August 1998 are described below. PRELIMINARY STRATEGIC PLAN DEVELOPED -------------------------------------------------------- Chapter 4:2.1 During late 1997, the Security Committee developed a preliminary strategic plan, which was incorporated into a larger strategic information technology management plan developed jointly by OMB and the CIO Council and issued in January 1998.\1 The information security segment of the plan includes three general objectives: promote awareness and training, identify best practices, and address technology and resource issues. Under each of these objectives, three or four specific activities and related milestones are briefly identified. Committee members told us that they expect to expand on this initial plan as the year progresses. Expansion of the plan is important to help ensure that the many facets of this problem are identified, prioritized, and addressed efficiently and effectively. Ideally, such a plan would identify the many policy, technical, legal, and human resource issues that affect federal information security and describe the various roles and activities of other federal entities involved in improving the protection of unclassified federal data. Such entities include, but are not limited to, NIST, the National Security Agency, and the Government Information Technology Services Board. A description of the information security-related activities of OMB's Office of Information and Regulatory Affairs, Office of Federal Financial Management, and program examiners also would be useful. Further, the plan could include long-term goals and objectives, including time frames, priorities, and expected accomplishments, and annual performance goals. For example, to better coordinate agency activities, increase efficiency, and build on existing expertise, the plan could provide for identifying and sharing individual agency solutions to common challenges, such as incident handling, investigations, contingency planning, security plan development, virus protection, security awareness, and system architecture design. Related efforts could include, for each functional area, -- designating an individual to serve as a focal point; -- developing a consolidated e-mail directory for key agency personnel; -- identifying useful web sites and evaluation tools; -- publicizing software and training aids and opportunities; and -- reviewing, filtering, and distributing notices and advisories on software vulnerabilities, such as those issued by Carnegie-Mellon University's Computer Emergency Response Team. In addition to coordinating and optimizing the value of agency efforts, such a plan could help inform agency managers about their information security responsibilities, maximize the value of audit results, and facilitate administration and Congressional oversight. Further, it could provide support for the governmentwide performance plan that OMB is required to include in the president's annual budget submission to the Congress under the Government Performance and Results Act. The first governmentwide performance plan and related "priority management objectives" were published in early 1998 as part of the President's Fiscal Year 1999 Budget. However, that plan provided few details on the administration's strategy for addressing widespread deficiencies in federal information security. -------------------- \1 The Paperwork Reduction Act requires OMB to annually submit a governmentwide information technology plan to the Congress. The 1998 plan is the first such plan jointly prepared by OMB and the CIO Council. EFFORTS TO FACILITATE PROJECTS SPONSORED BY OTHERS -------------------------------------------------------- Chapter 4:2.2 The Security Committee has established links with other federal entities with information security responsibilities, including NIST and the National Security Agency; requested briefings on other federally sponsored information security efforts; and acted to support and facilitate these efforts. For example, in late 1997 and early 1998, the Committee explored ways to gain broader federal agency participation in FedCIRC, a program initiated by NIST in 1996 to provide agencies a means of responding to computer security incidents. OMB Circular A-130, Appendix III, requires agencies to have a capability to (1) help users when a security incident, such as a suspected system intrusion, occurs, (2) share information on common vulnerabilities and threats, and (3) assist in pursuing appropriate legal action. In May 1998, the Council took action on the FedCIRC issue by endorsing the Security Committee's recommendation to shift sponsorship of FedCIRC to GSA and to change the funding mechanism. As of August 1998, the Council was developing detailed arrangements in anticipation of implementing the change at the start of fiscal year 1999. Other briefing topics at Security Committee meetings have included our study of information security management best practices, which is discussed in chapter 3, and the "Information Security Countermeasures Assessment Project," sponsored by the Air Force Research Laboratory. The latter is an effort to develop a better understanding of the effectiveness of administrative and technical measures for preventing security incidents. SECURITY AWARENESS SEMINAR -------------------------------------------------------- Chapter 4:2.3 In February 1998, the Security Committee arranged for and held a security awareness seminar to brief federal officials on information security risks. Speakers included representatives from the National Security Agency, NIST, and private sector organizations who described the latest challenges to maintaining adequate security. The seminar was attended by about 80 individuals--primarily agency CIO and federal agency information security officers. Comments from seminar attendees indicated that the program was a success and that more such programs addressing an expanded variety of topics would be welcome. The results of our recent study of information security management practices indicate that it would be valuable to expand the reach of such awareness seminars beyond agency CIO offices to a broader audience of senior program executives. If program officials have a more thorough understanding of the information security risks to their operations and assets, they will be more likely to (1) encourage their staff to comply with security requirements, (2) devote resources for security, and (3) make prudent decisions regarding the appropriate levels of protection needed. OVERSIGHT OF AGENCIES REMAINS LIMITED ---------------------------------------------------------- Chapter 4:3 A major aspect of our previous recommendations that is not being addressed by either OMB or the CIO Council is establishing a more structured program for ensuring that agency security programs are adequately evaluated and the results used to measure performance and prompt improvement. Minimum requirements for agency security programs are outlined in OMB Circular A-130, Appendix III, "Security of Federal Automated Information Resources." Updated in February 1996, Appendix III requires agencies to assign responsibility for security, develop a system security plan, screen and train individual users, assess risk, plan for disasters and contingencies, and periodically review their security safeguards. It also requires agencies to clearly define responsibilities and expected behavior for all individuals with access to automated systems and to implement security incident response and reporting capabilities. Central oversight of the effectiveness of agency security programs is important because audit results indicate that agencies are not adequately identifying and addressing security weaknesses on their own. One resource for such oversight is the large body of audit evidence that has become available in the last few years, primarily due to reviews of computer security controls performed as part of financial statement audits. Although, as discussed in chapter 2, comprehensive audits of computer security are not yet being performed at all agencies, analyses of these audit results and related reports could provide a starting point for measuring progress. The results can also be useful in identifying continuing problem areas and encouraging agency managers to take a more proactive role in identifying and addressing weaknesses themselves--before the weaknesses are discovered and reported by auditors. OMB'S OVERSIGHT EFFORTS FOCUS ON INDIVIDUAL ISSUES AND PROJECTS -------------------------------------------------------- Chapter 4:3.1 OMB's program examiners may consider information security during their broader review of an agency's mission-related programs, generally, as part of their review of agency information technology investment plans. Program examiners are assisted in this area by policy analysts in OMB's Information Policy and Technology Branch. In addition to their own specialized expertise, these policy analysts keep abreast of governmentwide information security issues by interacting with other federal entities such as the Federal Computer Security Managers Forum, the National Security Telecommunications and Information Systems Security Committee, the Security Policy Board, and the National Security Telecommunications Advisory Committee. In 1996, we reported that few of the program examiners had significant experience or expertise in dealing with information systems or related security issues and most did not consider the effectiveness of an agency's overall information security program. For this reason, in our September 1996 report, we recommended that OMB implement a program for increasing its program examiners' understanding of information security management issues and of the related audit results that were available to them. Since then, officials in OMB's Information Policy and Technology Branch say that they have provided two specialized security training sessions to program examiners and have continued to advise them on various security-related issues, such as the adequacy of system security plans, authentication, encryption, privacy of data and databases, and Internet and World Wide Web use. Agency projects cited as receiving attention pertaining to information security since early 1997 include (1) DOD's Defense Messaging System, (2) the FBI's National Crime Information Center information sharing initiative, (3) encryption of online services at the Departments of Education and the Interior and the Office of Personnel Management, and (4) critical infrastructure protection issues at the Federal Aviation Administration and the Departments of Energy and Defense. A MORE COMPREHENSIVE AND STRUCTURED ASSESSMENT PROGRAM WOULD PROVIDE BENEFITS -------------------------------------------------------- Chapter 4:3.2 While OMB's policy analysts and program examiners can provide valuable oversight of specific issues and projects, in light of the continuing reports of serious deficiencies, a more structured approach for measuring broader compliance with Circular A-130, Appendix III, and the effectiveness of agency security programs is needed. To be effective, such an approach must include comprehensive evaluations and tests of agency security programs at major agencies and reports at regular intervals that show improvements and deteriorations in program effectiveness. Much could be learned by analyzing the results that are already available from financial statement audits, as discussed in chapter 2. Also, agency-initiated assessments, required by both OMB Circular A-130, Appendix III, and FMFIA, can be a source of evaluation results. Periodic evaluations initiated by agency management are an essential step in helping determine whether controls are effective, which is an essential aspect of managing risk, as discussed in chapter 3. However, recent audits have identified numerous serious information security weaknesses that have apparently not been identified by agency managers and have not been reported in annual reports to the President and the Congress, as required by FMFIA. As a result, these reports are of limited value for oversight and, more importantly, agencies do not have the information they need to manage their information security risks. To assist agencies in reviewing their computer-based controls and supplement audit information that is already available, OMB or the CIO Council could establish an independent cadre of experts to review critical areas of agency operations that are not being adequately evaluated. Such a cadre of experts could be created by drawing on the resources of many federal agencies, as we suggested in our September 1996 report, or a specialized unit could be established at an agency that already has a relatively high degree of expertise, such as NIST or the National Security Agency. Regardless of how and by whom evaluations are conducted, results could be used to measure agency performance, identify recurring or longstanding problems, and identify gaps in audit coverage. For example, annual summary reports could be developed to show (1) the most commonly reported types of problems and (2) agencies where the same information security weaknesses were identified for more than 1 year. More refined performance indicators could distinguish between weaknesses classified as "material weaknesses" and those considered "reportable conditions," which are less serious than material weaknesses. These are standard classifications used in financial statement audit reports. OMB and the CIO Council could work with agency IGs, through the President's Council on Integrity and Efficiency, to develop other performance indicators. Such an annual "report card" could highlight improvements in agency performance as well as provide agencies an additional incentive to avoid being designated as an organization with long-standing information security problems. PDD 63 SUPPLEMENTS EXISTING REQUIREMENTS FROM A NATIONAL SECURITY PERSPECTIVE ---------------------------------------------------------- Chapter 4:4 PDD 63 provides for additional central oversight of agency practices by the National Security Council in the Executive Office of the President. However, at the close of our review in August 1998, it was too early to determine how these provisions would be implemented, how effective they would be, and how they would be coordinated with ongoing efforts by the CIO Council and others. In its October 1997 report, Critical Foundations: Protecting America's Infrastructures, the President's Commission on Critical Infrastructure Protection recognized the need for improved oversight of agency security practices and recommended assigning responsibility for oversight of federal systems security to a proposed Office of National Infrastructure Assurance within the National Security Council. As envisioned by the Commission, this Office would be given "overall program responsibility for infrastructure assurance matters, including policy implementation, strategy development, federal interagency coordination, and liaison with state and local governments and the private sector." On May 22, 1998, PDD 63 established such an entity under the National Coordinator for Security, Infrastructure Protection and Counter-Terrorism, who is to report to the President through the Assistant to the President for National Security Affairs. This new entity, termed the Critical Infrastructure Coordination Group, is to be supported by a newly created Critical Infrastructure Assurance Office within the Department of Commerce. The PDD addresses a range of national infrastructure protection issues and includes several provisions intended to ensure that critical federal computer, or "cyber-based," systems are protected from attacks by our nation's enemies. Specifically, it states that "the Federal Government shall serve as a model to the private sector on how infrastructure assurance is best achieved" and that federal department and agency CIOs shall be responsible for information assurance. Although details are not provided, the Directive requires each department and agency to develop a plan within 180 days from the issuance of the Directive in May 1998 for protecting its own critical infrastructure, including its cyber-based systems. The Critical Infrastructure Coordination Group is then to sponsor an "expert review process" for those plans. Other key provisions related to the security of federal information systems include -- a review of existing federal, state, and local bodies charged with information assurance tasks; -- enhanced collection and analysis of information on the foreign information warfare threat to our critical infrastructures; -- establishment of a National Infrastructure Protection Center within the Federal Bureau of Investigation to facilitate and coordinate the federal government's investigation and response to attacks on its critical infrastructures; -- assessments of U. S. Government systems' susceptibility to interception and exploitation; and -- incorporation of agency infrastructure assurance functions in agency strategic planning and performance measurement frameworks. Several of these provisions appear to overlap with existing requirements prescribed in the Paperwork Reduction Act of 1980, OMB Circular A-130, Appendix III, the Computer Security Act, the Clinger-Cohen Act, and the Federal Managers' Financial Integrity Act. In addition, some of PDD 63's objectives are similar to objectives being addressed by other federal entities, such as development of the FedCIRC program by NIST and the CIO Council. The relationship among these requirements and existing efforts had not been clarified at the conclusion of our review. CONCLUSION ---------------------------------------------------------- Chapter 4:5 Since September 1996, the need for improved federal information security has received increased visibility and attention. However, central oversight has remained limited and a comprehensive strategy has not been developed. As a result, many aspects of the recommendations we made in September 1996 are still applicable. The CIO Council's efforts during late 1997 and the first half of 1998, as well as issuance of PDD 63 in May 1998, indicate that senior federal officials are increasingly concerned about information security risks, both to federal operations as well as to privately-controlled national infrastructures, and are now moving to address these concerns. Coordinated efforts throughout the federal community, as envisioned by PDD 63, will be needed to successfully accomplish the objectives of these efforts and substantively improve federal information security. It is especially important that a governmentwide strategy be developed that clearly defines and coordinates the roles of new and existing federal entities in order to avoid inappropriate duplication of effort and ensure governmentwide cooperation and support. RECOMMENDATION ---------------------------------------------------------- Chapter 4:6 Accordingly, we recommend that the Director of the Office of Management and Budget and the Assistant to the President for National Security Affairs ensure that the various existing and newly initiated efforts to improve federal information security are coordinated under a comprehensive strategy. Such a strategy should -- ensure that executive agencies are carrying out the responsibilities outlined in laws and regulations requiring them to protect the security of their information resources; -- clearly delineate the roles of the various federal organizations with responsibilities related to federal information security; -- identify and rank the most significant information security issues facing federal agencies; -- promote information security risk awareness among senior agency officials whose critical operations rely on automated systems; -- identify and promote proven security tools, techniques, and management best practices; -- ensure the adequacy of information technology workforce skills; -- ensure that the security of both financial and nonfinancial systems is adequately evaluated on a regular basis; -- include long-term goals and objectives, including time frames, priorities, and annual performance goals; and -- provide for periodically evaluating agency performance from a governmentwide perspective and acting to address shortfalls. AGENCY COMMENTS AND OUR EVALUATION ---------------------------------------------------------- Chapter 4:7 In commenting on a draft of this report, OMB's Acting Deputy Director for Management stated that OMB and the CIO Council, working with the National Security Council, have developed a plan to address the PDD 63 provision that the federal government serve as a model for critical infrastructure protection and to coordinate the new requirements of the PDD with the existing requirements of the various laws pertaining to federal information security. The comments further stated that the plan is to develop and promote a process by which government agencies can (1) identify and assess their existing security posture, (2) implement security best practices, and (3) set in motion a process of continued maintenance. Also described are plans for a CIO Council-sponsored interagency security assist team that will review agency security programs. Regarding our conclusion that many aspects of the recommendations in our September 1996 report are still applicable, OMB reiterated its concern that the 1996 report's "overemphasis on OMB's role could distract program managers in the Federal agencies from their primary responsibility for assuring information security." OMB's comments indicate that it, the CIO Council, and the National Security Council are moving to coordinate their responsibilities and beginning to develop the comprehensive strategy that is needed. Based on the description provided, the plans being developed include several key elements, most notably a means of evaluating agency performance. These plans were still being finalized at the close of our work and were not yet available for our review. Accordingly, we are not able to comment on their content, scope, and detail, or whether they will be effective in improving federal information security. Regarding OMB's concern that we have overemphasized its role, we agree that agency managers are primarily responsible for the security of their operations. Increased attention and support from central oversight, if done effectively, should not distract agencies from their responsibilities in this area. On the contrary, active oversight of agency performance is more likely to have the effect of emphasizing the agency managers' accountability and providing more visibility for agencies that are achieving their information assurance goals as well as those that are falling short. GAO REPORTS ON INFORMATION SECURITY ISSUED SINCE MARCH 1996 =========================================================== Appendix I Note: This list does not include products for which distribution was limited to official use because the products contained sensitive information. VA Information Systems: Computer Control Weaknesses Increase Risk of Fraud, Misuse and Improper Disclosure (GAO/AIMD-98-175, September 23, 1998). FAA Systems: Serious Challenges Remain in Resolving Year 2000 and Computer Security Problems (GAO/T-AIMD-98-251, August 6, 1998). Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety (GAO/AIMD-98-155, May 18, 1998). Computer Security: Pervasive, Serious Weaknesses Jeopardize State Department Operations (GAO/AIMD-98-145, May 18, 1998). Executive Guide: Information Security Management: Learning From Leading Organizations (GAO/AIMD-98-68, May 1998). U.S. Government Financial Statements: Results of GAO's Fiscal Year 1997 Audit (GAO/T-AIMD-98-128, April 1, 1998). Financial Audit: Examination of IRS' Fiscal Year 1996 Custodial Financial Statements (GAO/AIMD-98-18, December 24, 1997). Financial Management: Review of the Military Retirement Trust Fund's Actuarial Model and Related Computer Controls (GAO/AIMD-97-128, September 9, 1997). Financial Audit: Examination of IRS' Fiscal Year 1996 Administrative Financial Statements (GAO/AIMD-97-89, August 29, 1997). Small Business Administration: Better Planning and Controls Needed for Information Systems (GAO/AIMD-97-94, June 27, 1997). Social Security Administration: Internet Access to Personal Earnings and Benefits Information (GAO/T-AIMD/HEHS-97-123, May 6, 1997). Budget Process: Comments on S.261--Biennial Budgeting and Appropriations Act (GAO/T-AIMD-97-84, April 23, 1997). IRS Systems Security and Funding: Employee Browsing Not Being Addressed Effectively and Budget Requests for New Systems Development Not Justified (GAO/T-AIMD-97-82, April 15, 1997). IRS Systems Security: Tax Processing Operations and Data Still at Risk Due to Serious Weaknesses (GAO/T-AIMD-97-76, April 10, 1997). IRS Systems Security: Tax Processing Operations and Data Still at Risk Due to Serious Weaknesses (GAO/AIMD-97-49, April 8, 1997). High Risk Series: Information Management and Technology (GAO/HR-97-9, February 1997). Information Security: Opportunities for Improved OMB Oversight of Agency Practices (GAO/AIMD-96-110, September 24, 1996). Financial Audit: Examination of IRS' Fiscal Year 1995 Financial Statements (GAO/AIMD-96-101, July 11, 1996). Tax Systems Modernization: Actions Underway But IRS Has Not Yet Corrected Management and Technical Weaknesses (GAO/AIMD-96-106, June 7, 1996). Information Security: Computer Hacker Information Available on the Internet (GAO/T-AIMD-96-108, June 5, 1996). Information Security: Computer Attacks at Department of Defense Pose Increasing Risks (GAO/AIMD-96-84, May 22, 1996). Information Security: Computer Attacks at Department of Defense Pose Increasing Risks (GAO/T-AIMD-96-92, May 22, 1996). Security Weaknesses at IRS' Cyberfile Data Center (GAO/AIMD-96-85R, May 9, 1996). Tax Systems Modernization: Management and Technical Weaknesses Must Be Overcome To Achieve Success (GAO/T-AIMD-96-75, March 26, 1996). AGENCY REPORTS ISSUED SINCE SEPTEMBER 1996 THAT IDENTIFY INFORMATION SECURITY WEAKNESSES ========================================================== Appendix II Department of Health and Human Services Accountability Report: Fiscal Year 1997 (April 1998). Report on the Financial Statement Audit of the Health Care Financing Administration for Fiscal Year 1997 (A-17-97-00097, April 24, 1998). Report on the Department of Health and Human Services Consolidated Financial Statements for Fiscal Year 1997 (A-17-98-00001, April 1, 1998). Department of the Treasury's Inspector General Report: Report on the U.S. Customs Service's Fiscal Years 1997 and 1996 Financial Statements (OIG-98-050, March 5, 1998). Audit of the Extent to Which USAID's Financial Management System Meets Requirements Identified in the Federal Financial Management Improvement Act of 1996 (OIG-A-000-98-003-P, March 2, 1998). Report on USAID's Financial Statements, Internal Controls, and Compliance for Fiscal Years 1997 and 1996 (OIG-0-000-98-001-F, March 2, 1998). EPA's Fiscal Year 1997 and 1996 Financial Statements Audit Report (E1AML7-20-7008-8100058, March 2, 1998). NASA Data Center General Controls, Johnson Space Center (IG-98-005, January 29, 1998). Federal Managers' Financial Integrity Act Report, Fiscal Year 1997 (USAID, December 31, 1997). EPA 1997 Integrity Act Report to the President and Congress (EPA-205-R-98-002, December 19, 1997). Social Security Accountability Report for Fiscal Year 1997, (SSA Pub. No. 31-231, November 1997). General and Application Controls Over the Mechanization of Contract Administration Services System (DODIG, Report Number 98-007, October 9, 1997). Audit of USAID's Compliance with Federal Computer Security Requirements (OIG-A-000-97-008-P, September 30, 1997). Audit of the Status of USAID's New Management System (NMS) (OIG-A-000-97-010-P, September 30, 1997). Audit of the Internal Controls for the Operational New Management System (OIG-A-000-97-009-P, September 30, 1997). NASA Data Center General Controls, Marshall Space Flight Center (IG-97-039, September 30, 1997). Evaluation of the Social Security Administration's Back-up and Recovery Testing of Its Automated Systems (SSA/OIG-A-13-97-12014, September 24, 1997). U.S. Department of Justice Annual Financial Statement for Fiscal Year 1996 (DOJ/OIG-97-24B, September 1997). Report on the Financial Statement Audit of the Department of Health and Human Services for Fiscal Year 1996 (A-17-96-0001, August 29, 1997). NASA Data Center Facility, Langley Research Center (IG-97-035, August 28, 1997). U.S. Department of Education Fiscal Years 1996 and 1995 Financial Statements and Accompanying Notes (Price Waterhouse, LLP, July 31, 1997). Physical Security at Ames Research Center's NAS Facility (IG-97-030, July 18, 1997). Audit of USAID's Efforts to Resolve the Year 2000 Problem (OIG-A-000-97-005-P, July 11, 1997). Department of the Treasury's Inspector General Report: Audit of the Bureau of Alcohol, Tobacco and Firearms Fiscal Years 1996 and 1995 Financial Statements (OIG-97-094, July 9, 1997). The Royalty Management Program's Automated Information Systems, Minerals Management Service (DOI/OIG-97-I-1042, July 1997). Review of Physical Security at the Social Security Administration's National Computer Center (SSA/OIG-A-13-96-11046, June 26, 1997). Audit of OPM's Benefit Programs Fiscal Year 1996 Financial Statements - Management Letter (Transmitted to OPM's OIG on June 20, 1997). Review of the Back-up and Recovery Procedures at the National Computer Center (SSA/OIG-A-13-96-11052, June 19, 1997). Audit of OPM's Benefit Programs Fiscal Year 1996 Financial Statements (Transmitted to the Director, OPM, on June 17, 1997). General Services Administration, Fiscal Year 1996 Management Letter Comments and Suggestions for Consideration (OIG-A62709, June 10, 1997). Audit of Security Controls at the Hines Benefits Delivery Center, Department of Veterans Affairs, Office of Inspector General (Report Number 7D2-G07-062, May 13, 1997). Audit of SBA's FY 1996 Financial Statements - Management Letter (SBA/OIG-7-6-H-006-015, April 29, 1997). Audit of the U.S. Department of Housing and Urban Development's Fiscal Year 1996 Financial Statements (Case Number 97-FO-177-0003, April 10, 1997). Report on the Department of Transportation Fiscal Year 1996 Consolidated Financial Statement (Report Number AD-OT-7-004, April 10, 1997). Federal Emergency Management Agency Management Letter for the Year Ended September 30, 1996 (April 4, 1997). General Controls Over Automated Information Systems, Operations Service Center, Bureau of Indian Affairs (DOI/OIG-97-I-771, April 1997). Department of the Treasury's Inspector General Report: Report on the U.S. Customs Service's Fiscal Years 1996 and 1995 Financial Statements (OIG-97-054, March 31, 1997). NSF's Fiscal Year 1996 Management Letter Report (OIG-97-2110, March 31, 1997). Review of CA-TOP SECRET Access Control Software (SSA/OIG-A-13-95-00606, March 18, 1997). Department of Commerce's Consolidating Financial Statements for Fiscal Year 1996 (OIG-FSD-9355-7-0001, March 1, 1997). Department of Commerce Economic Development Administration Financial Statements for Fiscal Year 1996 (OIG-FSC-8837-7-0001, March 1, 1997). Department of Commerce International Trade Administration Financial Statements for Fiscal Year 1996 (OIG-FSC-8838-7-0001, March 1, 1997). Department of Commerce National Oceanic and Atmospheric Administration Financial Statements for Fiscal Year 1996 (OIG-FSC-8841-7-0001, March 1, 1997). Mainframe Computer Policies and Procedures, Administrative Service Center, Bureau of Reclamation (DOI/OIG-97-I-683, March 1997). U.S. Environmental Protection Agency FY 1996 Audited Financial Statements (March 1997). Audit of SBA's FY 1996 Financial Statements (SBA/OIG-7-6-H-006-010, February 28, 1997). Auditor's Reports on NSF's Fiscal Year 1996 Financial Statements, (Transmitted to the Chairman, NSF, on February 28, 1997). U.S. Department of Labor Consolidated Financial Statement Audit for Fiscal Years 1995 and 1996 (DOL/OIG-12-97-005-13-001, February 28, 1997). Reports on USAID's Financial Statements, Internal Controls, and Compliance for Fiscal Year 1996 (OIG-0-000-97-001-C, February 24, 1997). Department of Veterans Affairs Annual Accountability Report for Fiscal Year 1996 (February 14, 1997). U.S. Department of Energy Consolidated Financial Statements for Fiscal Year 1996 (February 1997). Management Letter to the Administrator of NASA (January 31, 1997). Secretary's Annual Statement and Report, Federal Managers' Financial Integrity Act, U.S. Department of the Treasury 1996 (December 30, 1996). Report on Applying Agreed-Upon Procedures to the Internal Controls over the Federal Financial System, Fiscal Year Ended September 30, 1996 (NRC/OIG, November 25, 1996). General Control Environment of the Federal Financial System at the Reston General Purpose Computer Center, U. S. Geological Survey (DOI/OIG-97-I-98, October 1996). Interim Report on the Status of USAID's New Management System (OIG-A-000-96-001-S, September 27, 1996). Department of Health and Human Services Accountability Report: Fiscal Year 1996. Department of State Consolidated Financial Statements for Fiscal Year 1996. Financial Statements Fiscal Year 1996, Office of Personnel Management. National Aeronautics and Space Administration Fiscal Year 1996 Accountability Report. (See figure in printed edition.)Appendix III COMMENTS FROM THE OFFICE OF MANAGEMENT AND BUDGET ========================================================== Appendix II (See figure in printed edition.) MAJOR CONTRIBUTORS TO THIS REPORT ========================================================== Appendix IV ACCOUNTING AND INFORMATION MANAGEMENT DIVISION, WASHINGTON, D.C. -------------------------------------------------------- Appendix IV:1 Jean H. Boltz, Assistant Director, (202) 512-5247 Ronald W. Beers, Assistant Director Darrell L. Heim, Assistant Director Carol A. Langelier, Assistant Director Crawford L. Thompson, Assistant Director Gregory C. Wilshusen, Assistant Director Gary R. Austin, Senior Information Systems Analyst Kirk J. Daubenspeck, Senior Information Systems Analyst Ernest A. Dring, Senior Evaluator Michael W. Gilmore, Senior Information Systems Analyst William F. Wadsworth, Senior Information Systems Analyst ATLANTA FIELD OFFICE -------------------------------------------------------- Appendix IV:2 Sharon S. Kittrell, Senior EDP Auditor DALLAS FIELD OFFICE -------------------------------------------------------- Appendix IV:3 David W. Irvin, Assistant Director Debra M. Conner, Senior EDP Auditor Shannon Q. Cross, Senior Evaluator William H. Thompson, Senior Evaluator Charles M. Vrabel, Senior EDP Auditor *** End of document. ***