EPA buys monitoring software

In an uncommon move to secure its distributed networks agencywide the Environmental Protection Agency has purchased a software package to monitor and manage information security policy at more than 100 sites.

The EPA plans to install Axent Technologies Inc.'s OmniGuard/Enterprise Security Manager (ESM) on all of its more than 700 Unix NetWare and VMS servers by the end of fiscal 1997.

ESM which the Army and the Food and Drug Administration also use allows a few high-level personnel to monitor conformance of an agency's entire network to established security policies.

The EPA's expanding role as an information provider via the Internet spurred the move to monitor compliance with security policies said Robert Lewis the EPA's chief of enterprise technology security services. The agency provides sensitive environmental information to academic and research communities via the Internet. This data transmission must comply with the Privacy Act to ensure the protection of research and classified business information.

While several Defense Department agencies have moved to manage security enterprisewide most civilian agencies have taken only small steps to "plug the holes in the dike " such as installing firewalls or intruder-detection devices said John Negron Axent's federal sales manager.

"These folks [at the EPA] stepped up a level and said `We're responsible for ensuring that all the information across the whole agency is protected ' " Negron said. "It really qualifies the federal market. There are some pockets within the government that are looking at the problem of security at an enterprise level."

The EPA will monitor security policy from Research Triangle Park N.C. From one workstation security administrators will be able to make changes to remote systems and control the level of security on those platforms even if they use different operating systems.

Because the security features bundled within operating systems vary significantly it is impossible to establish a single all-encompassing security policy to span all of an agency's distributed networks. Still it is vital to identify areas within the agency that have not moved to comply with published security directives Lewis said.

"Having the policy in place is one thing but being able to validate whether the policy has been implemented is a question that has to be answered " Lewis said. "It would not be very cost-effective for my staff to validate that all of the 700-plus servers [comply with] the security directives. Those that haven't implemented those security directives obviously make us vulnerable."

ESM covers three security categories: user accounts and authorizations network and server settings and file systems and directories. ESM checks if users have been granted privileges that are outside the scope of security policy monitors the use of passwords to ensure they are changed frequently and cannot be easily guessed and searches for viruses.

It also scans networks for trap doors which give original designers of a program a way to circumvent cumbersome security measures to monitor a system and logic bombs which are timed to damage files or a program when a specific task is performed. Additionally ESM scans for Internet vulnerabilities modifications to key files or programs and other threats.

When fully installed ESM will generate a single report on the compliance of all systems.


  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.