GAO cites information security weaknesses

Recommends Office of Management and Budget revise FISMA guidance

Despite indications that agencies have improved their compliance with parts of the Federal Information Security Management Act, many major agencies still consider their information security controls a significant deficiency or material weakness, according to the Government Accountability Office.

Gregory Wilshusen, director of information-security issues for GAO, told the House Oversight and Government Reform Government Committee's Management, Organization and Procurement Subcommittee today many agencies had not fully or effectively implemented key elements of an agencywide information-security program, as required by FISMA. Meanwhile, GAO recommended that the Office of Management and Budget improve its guidance for FISMA reporting.

GAO’s findings come as lawmakers consider reforming the FISMA law that critics say relies too much on paper compliance reports and doesn’t fully address information-technology vulnerabilities. Sen. Thomas Carper (D-Del.) on April 28 introduced legislation designed to improve FISMA .

“Six years after FISMA was enacted, we continue to report that poor information security is a widespread problem with potentially devastating consequences,” Wilshusen said in prepared remarks based on a draft GAO report. That draft analyzed reports on government information security from agencies, inspectors general, OMB, Congress and the GAO.

GAO found that out of 24 major agencies:

  • Thirteen said controls over financial systems and information were a “significant deficiency” and seven said it was a “material weakness” in performance and accountability reports for fiscal 2008.
  • Twenty-two of the agencies’ IGs identified information security as a “major management challenge” for their agency.
  • Twenty-three had weaknesses in access controls reported and 23 had weaknesses in their agencywide information security programs.

Wilshusen said OMB’s annual instructions for FISMA reporting weren’t always clear and didn’t cover key security activities. In addition, he said, OMB didn’t include key information about findings and significant deficiencies identified by IGs in its report to Congress on agencies’ FISMA compliance.

Vivek Kundra, the federal chief information officer and the top IT official in OMB, said the administration wanted to make security compliance more automatic and ongoing. FISMA “has raised the level of awareness in the agencies and in the country at large, but we’re not where we need to be,” he said.

Kundra said the administration’s initial review of government information security showed the performance data currently collected under FISMA doesn’t reflect the security posture of agencies and the current collection process is cumbersome and takes time away from meaningful analysis. He also said there is too much focus on compliance and not enough on outcomes.

“While the current reporting metrics have made sense, or may have made sense when FISMA was enacted, they’re largely compliance based; they are trailing — rather than leading — indicators,” Kundra said. “We need metrics give us insight into agencies’ security postures and possible vulnerabilities on an ongoing basis.”

Agencies need to adopt a “risk-based approach” to IT security, Kundra said, including for cloud computing which President Barack Obama endorsed in his fiscal 2010 budget request.

About the Author

Ben Bain is a reporter for Federal Computer Week.

Featured

  • Budget
    Stock photo ID: 134176955 By Richard Cavalleri

    House passes stopgap spending bill

    The current appropriations bills are set to expire on Oct. 1; the bill now goes to the Senate where it is expected to pass.

  • Defense
    concept image of radio communication (DARPA)

    What to look for in DOD's coming spectrum strategy

    Interoperability, integration and JADC2 are likely to figure into an updated electromagnetic spectrum strategy expected soon from the Department of Defense.

Stay Connected