DHS needs to plug some cybersecurity holes, audit finds

National Cyber Security Division needs more info sharing, risk assessments

The Homeland Security Department is should improve its cybersecurity programs for some major control systems, according to a new report from DHS Inspector General Richard Skinner.

The control systems, which operate primarily in power plants, factories and utilities, are a vital part of the nation’s critical infrastructure. In recent years control systems increasingly have become networked and linked with other information technology systems including the Internet. As a result, the control systems are vulnerable to cyber threats,  the IG said.

DHS’ National Cyber Security Division (NCSD) has been coordinating public and private efforts for cybersecurity in control systems. It also conducts training. Although that division has made progress, there are still gaps in control system cybersecurity, according to the IG's report published Sept. 1.

Skinner said the division needs to do more to encourage information sharing between the public and private sectors on needs, threats and vulnerabilities that affect control systems; conduct more vulnerability assessments performed on control systems; deploy better performance measures; and initiate an expanded program for education, training and awareness.

“While progress has been made, the [NCSD] still faces difficult challenges in effectively reducing the cybersecurity risks to the nation’s critical infrastructure,” Skinner wrote. “Improvements are needed in NCSD’s effort to protect and secure control systems that are essential to the nation’s security and economy."

For example, more information sharing is needed, the report said. Some regulatory agencies expressed concern with the national cyber division’s leadership role and were dissatisfied with the amount of information that was being shared. The agencies complained that they were not informed of the results of cyber control system vulnerability assessments, the IG said.

Skinner first made eight recommendations for improvement, and DHS officials agreed with seven of them. Skinner withdrew his recommendation to conduct specialized training for each sector. DHS managers said that would not be effective because control system applications affect multiple sectors.

Approximately 80 percent of the nation’s critical infrastructures are privately owned and operated. Control systems are used in all or nearly all 18 critical infrastructure sectors, including agriculture, banking, chemicals, defense, energy, manufacturing and transportation, the IG said.

Debate continues on whether DHS has enough authority to effectively coordinate cybersecurity efforts for critical private infrastructure facilities.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

Featured

  • Defense
    The U.S. Army Corps of Engineers and the National Geospatial-Intelligence Agency (NGA) reveal concept renderings for the Next NGA West (N2W) campus from the design-build team McCarthy HITT winning proposal. The entirety of the campus is anticipated to be operational in 2025.

    How NGA is tackling interoperability challenges

    Mark Munsell, the National Geospatial-Intelligence Agency’s CTO, talks about talent shortages and how the agency is working to get more unclassified data.

  • Veterans Affairs
    Veterans Affairs CIO Jim Gfrerer speaks at an Oct. 10 FCW event (Photo credit: Troy K. Schneider)

    VA's pivot to agile

    With 10 months on the job, Veterans Affairs CIO Jim Gfrerer is pushing his organization toward a culture of constant delivery.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.