DHS Web sites vulnerable to hackers, IG says
Protocols are in place, but patch management is spotty
- By Alice Lipowicz
- Oct 09, 2009
The Homeland Security Department’s most popular Web sites appear to be vulnerable to hackers and could put department data at risk of loss or unauthorized use, according to a new report from DHS Inspector General Richard Skinner.
An audit of cybersecurity for DHS’ nine most frequently visited Web sites found that although general security protocols were followed, there were still a number of vulnerabilities and gaps in security, including inconsistent management of security patching and security assessments.
“These vulnerabilities could put DHS data at risk,” Skinner wrote in the report issued Oct. 8. “In addition, DHS can make improvements in managing its system inventory and providing technical oversight and guidance in order to evaluate the security threats to its public-facing Web sites.”
The nine sites — including sites for DHS agencies that include U.S. Customs and Border Protection, the Coast Guard, and the Transportation Security Administration — had recommended security settings and controls in addition to strong password and access controls, but had weaknesses in other areas, Skinner wrote.
Several components scored better on security. TSA and the Coast Guard perform regular vulnerability assessments on their sites.
And the Web sites for the Federal Emergency Management Agency, the department's National Protection and Programs Directorate and the Coast Guard “contained no vulnerabilities listed as critical or high, and all security patches were applied. These components’ security practices, through periodic assessments, patch and update policies, and documented procedures, set an example of an effective defense in depth approach to good information technology security,” the report states.
Overall, DHS has more than 125 Web sites accessible by the public, which provide communication and service to the public. However, their accessibility can make them a target for terrorist attack and hackers, Skinner wrote.
The Web sites reviewed also included DHS Headquarters, Federal Law Enforcement Training Center, Immigration and Customs Enforcement, and Citizenship and Immigration Services.
Skinner made six recommendations for improvements, and DHS officials agreed with the advice and implemented the changes, the report states.
Cybersecurity has been a concern in the department before. In May, hackers attacked DHS’ online platform for sharing sensitive but unclassified information.
Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.