Security initiatives start to converge

Many in the federal IT community see greater emphasis on operational assurance

A recent harsh report from the Government Accountability Office on federal information technology security is a snapshot in time that many public- and private-sector experts say does not reflect the current path of federal IT security. They say the results of several initiatives will soon make IT security an integral part of daily operations.

One of those initiatives is the Office of Management and Budget’s release of baseline security configurations for Microsoft’s Windows operating systems. Experts also pointed to standardization being realized through OMB’s Security Line of Business initiative and new guidance from the National Institute of Standards and Technology for measuring how well agencies have implemented security controls. With those initiatives converging, experts said, agencies will soon have the tools to clear up a number of weaknesses that GAO’s auditors found.

Some experts said the security initiatives, including Homeland Security Presidential Directive 12, will operationalize many of the requirements of the Federal Information Security Management Act. Karen Evans, OMB’s administrator for IT and e-government, said each of the initiatives build on one another.

“All these things agencies should be working on, and if they really are doing them in the way we intended, which means having a good risk-management-based approach in managing information in an agency, then your security should be improving,” Evans said.

OMB has been trying to move agencies beyond a paperwork approach to FISMA compliance for some time, and Evans said those initiatives are part of that effort.
NIST will provide guidance for measuring how well agencies’ security controls are working. “We will give agencies tools to deploy the right controls and measure how they are working,” said Ron Ross, senior computer scientist at NIST. “A good deployment of these controls within the risk-management framework can go a long way to stopping” cyberattacks.

It is that hardening of defenses that GAO said is falling short.

“Weaknesses exist predominantly in access controls, including authentication and identification, authorization, cryptography, audit and monitoring, boundary protection, and physical security,” the report states. “Weaknesses also exist in configuration management, segregation of duties and continuity of operations.”

In its report, GAO said most agency systems lack basic controls and are vulnerable to internal and external threats. 

“If you look solely at FISMA reporting, it would appear there has been a lot of progress and, in some ways, there has,” said Jeffrey Knott, assistant director of information security issues at GAO. “But you have to look at the effectiveness
of those activities that were used in getting those outcomes in FISMA, and I wonder how effective they are. I think the outcomes are not as intended in many cases.”

One agency chief information officer, who requested anonymity, said GAO’s findings are not surprising.

“This is a big challenge for agencies, but we are making headway,” the CIO said. “I think agencies are much more attuned to these issues than ever before because of FISMA, losing laptops and hackers. The GAO report is somewhat like a dog-bites-man story.”

Alan Paller, director at the SANS Institute, said the GAO report proves that FISMA needs to be changed.

“This is the first time Congress has authoritative support for moving away from paperwork exercises to more attack-based metrics,” Paller said. “Metrics without a tool to measure [security] is silly.”

Paller points to the secure desktop configuration for Windows as the kind of initiative agencies need to take.

“Now there is a way to figure out whether you have a secure configuration and whether it is working and whether someone has changed it,” Paller said. “Operational means a person doesn’t have to ask questions, but the system provides the data. It has to be self-monitoring, and that is what [was] missing.”

Mark Day, a former chief information security officer at the Environmental Protection Agency and now chief technology officer at McDonald Bradley, said the onus should be on inspectors general to measure agencies’ compliance with federal information security requirements and guidelines. That, he said, would make FISMA more complete.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group