IG infosec reports cite agency shortcomings

Guidance on the Release of Security Act Reports

Agencies have submitted the first set of reports on their information security practices, and Office of Management and Budget officials are holding tight to the reviews prepared by chief information officers. But those released by inspectors general provide a glimpse into the security problems facing agencies.

Each agency had to submit two assessments of its information security policies under the Government Information Security Reform Act signed last October as part of the fiscal 2001 Defense Authorization Act. GISRA not only requires agencies to better manage their security, it also requires them to document their progress through a self-assessment and an independent review by the IGs.

OMB allowed IGs to choose whether or not to release their reports to the public. Several—including those from the Agriculture, Transportation and Energy departments—have made their reports available on their Web sites.

Those reports reveal many common problems, including weak controls that allow unauthorized employees to access sensitive systems. But the IGs also found evidence that agencies are starting to adopt practices advocated by central resources such as the CIO Council.

Although the reports may raise the awareness of agency executives, they may not prove entirely helpful to the people working on security, said William Hadesty, the USDA's associate CIO for cybersecurity.

The USDA has established a departmentwide security program and has enacted many of the measures required by law at the department level. But few of them have filtered down to the agency level, especially with regard to incident response and performance measures, according to the USDA's IG office.

The USDA has begun instituting many of the security practices required by GISRA, Hadesty said at the E-Gov Information Assurance Conference last month. But the GISRA guidelines issued by OMB earlier this year will not help the department address its weaknesses, he said.

GISRA does not spell out the ramifications for agencies whose assessments reveal poor security, but it does require agencies to provide a follow-up report with re.mediation plans and milestones for fixing weaknesses. Hadesty said he does not expect those plans to help the USDA either because they will be based on the GISRA format.

Instead, he is awaiting the results of a General Accounting Office review of GISRA and the OMB guidance on developing the reports. Rep. Stephen Horn (R-Calif.), chairman of the House Government Reform Committee's Government Efficiency, Financial Management and Intergovernmental Relations Subcommittee, requested the review in March.


GISRA conclusions

Information security reports recently prepared by agency inspectors

general revealed these weaknesses:

* No standard for minimum security training requirements at the Agriculture


* Poor internal access controls at the Energy Department, where at least

nine employees were able to access the network without passwords.

* Inconsistent enforcement of external access controls; the Transportation

Department IG was able to access almost 270 systems from the Internet.

* Fewer than half of DOE's offices consistently reported to the department's

incident response center.


  • Workforce
    White House rainbow light shutterstock ID : 1130423963 By zhephotography

    White House rolls out DEIA strategy

    On Tuesday, the Biden administration issued agencies a roadmap to guide their efforts to develop strategic plans for diversity, equity, inclusion and accessibility (DEIA), as required under a as required under a June executive order.

  • Defense
    software (whiteMocca/Shutterstock.com)

    Why DOD is so bad at buying software

    The Defense Department wants to acquire emerging technology faster and more efficiently. But will its latest attempts to streamline its processes be enough?

Stay Connected