TIGTA: IRS disregarded security gaps in CADE

The Internal Revenue Service implemented two of its most important modernized information technology business systems despite knowing the systems had security vulnerabilities that put the security and privacy of taxpayer information at risk, the Treasury Inspector General for Tax Administration (TIGTA) said in a report.

The IRS did so despite having policies and procedures that require security and privacy safeguards be designed and built into systems early in their life cycle before they are deployed, said Russell George, TIGTA’s inspector general, in a report released Oct. 16. IRS offices did not carry out their responsibilities for ensuring that security weaknesses were corrected before deployment, he said.

“IRS processes for ensuring that security controls are implemented before systems are deployed failed because key organizations did not consider the known security vulnerabilities to be significant,” George said.

The two modernization systems are the Customer Account Data Engine (CADE), the foundation for managing all taxpayer accounts that will replace existing tax processing systems, and the Account Management Services (AMS) system. That system would provide faster and improved access by employees to taxpayer account data for customer service, the report said.

Security weaknesses in controls over sensitive data protection, system access, monitoring of system access, and disaster recovery continue to exist even though key phases of the CADE and the AMS have already been put in place, George said.

“In the case of the CADE and AMS. the IRS was aware of, and even self-identified, these weaknesses. This is very troublesome,” he said.

As a result, the IRS is jeopardizing the confidentiality, integrity, and availability of an increasing volume of tax information for millions of taxpayers as these systems are put into operation, he said.

TIGTA recommended previously that IRS officials consider all security vulnerabilities which affect the overall security of these systems before implementation. TIGTA also recommended in this report -- and the IRS agreed -- to:



  • Place equal emphasis on security and functionality before approving system milestones.



  • Emphasize preventing and resolving security vulnerabilities before proceeding to the next system life cycle stage.



  • Improve accuracy and completeness of risk information in security assessment reports.

About the Author

Mary Mosquera is a reporter for Federal Computer Week.

Featured

  • Management
    people standing on keyboard (Who is Danny/Shutterstock.com)

    OPM-GSA merger plan detailed in legislative proposal

    The White House is proposing legislation for a dramatic overhaul of human resources inside government and wants $50 million to execute the plan.

  • Cloud
    cloud applications (chanpipat/Shutterstock.com)

    GSA plans civilian DEOS counterpart

    GSA is developing a cloud email and enterprise services contract inspired by the single-source vehicle the Department of Defense devised for back-office software.

  • Defense
    software (whiteMocca/Shutterstock.com)

    DOD looks to unify software spending for 2020

    Defense Department acquisition head, Ellen Lord, hopes to simplify software buying and improve business systems following the release of the Defense Innovation Board's final software acquisition study.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.