IRS strengthens IT security, auditors say

he Internal Revenue Service significantly improved its security evaluations of major computer systems during fiscal 2008 that are required under the Federal Information Security Management Act, according to a recent report from the Treasury Inspector General for Tax Administration (TIGTA).

The Cybersecurity office of the IRS’ Modernization and Information Technology Services organization took steps to conduct certification and accreditation more efficiently, the TIGTA report released Oct. 23 stated.

“Therefore, this year we evaluate this process as good,” said Michel Phillips, TIGTA’s deputy inspector general for audit, adding that the IRS continues to place a high priority on efforts to improve its security program.

However. the service needs to strengthen the process to make sure that the level of annual security controls and contingency plan testing is adequate, the report said.

The most significant area of concern is implementation of configuration management standards. The IRS has a security configuration policy, but needs to do more to make sure that information systems apply common security configurations established by the National Institute of Standards and Technology, the report said.

The Office of Management and Budget also directed auditors to evaluate agency progress in implementing the Federal Desktop Core Configuration standard, according to the report. The IRS has adopted the FDCC standard configurations in its workstation security policies and compliance assessment tools, TIGTA said.

“The IRS continues to test FCC standard configurations and, therefore, has only partially implemented the FDCC,” Phillips said, adding that IRS has documented those deviations. IRS, however, is still validating the settings it has implemented, TIGTA said.

The IRS also improved preparation of its Privacy Impact Assessments, which explain how personal information that the government collects will be handled and protected, and took steps to implement OMB's requirements to safeguard and respond to a breach of personally identifiable information, the report said.


However, the IRS still has weaknesses that affect its ability to protect personal information in access controls, audit trails and system configuration settings, TIGTA said.

About the Author

Mary Mosquera is a reporter for Federal Computer Week.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.