DHS Web sites vulnerable to hackers, IG says

Protocols are in place, but patch management is spotty

The Homeland Security Department’s most popular Web sites appear to be vulnerable to hackers and could put department data at risk of loss or unauthorized use, according to a new report from DHS Inspector General Richard Skinner.

An audit of cybersecurity for DHS’ nine most frequently visited Web sites found that although general security protocols were followed, there were still a number of vulnerabilities and gaps in security, including inconsistent management of security patching and security assessments.

“These vulnerabilities could put DHS data at risk,” Skinner wrote in the report issued Oct. 8. “In addition, DHS can make improvements in managing its system inventory and providing technical oversight and guidance in order to evaluate the security threats to its public-facing Web sites.”

The nine sites — including sites for DHS agencies that include U.S. Customs and Border Protection, the Coast Guard, and the Transportation Security Administration — had recommended security settings and controls in addition to strong password and access controls, but had weaknesses in other areas, Skinner wrote.

Several components scored better on security. TSA and the Coast Guard perform regular vulnerability assessments on their sites.

And the Web sites for the Federal Emergency Management Agency, the department's National Protection and Programs Directorate and the Coast Guard “contained no vulnerabilities listed as critical or high, and all security patches were applied. These components’ security practices, through periodic assessments, patch and update policies, and documented procedures, set an example of an effective defense in depth approach to good information technology security,” the report states.

Overall, DHS has more than 125 Web sites accessible by the public, which provide communication and service to the public. However, their accessibility can make them a target for terrorist attack and hackers, Skinner wrote.

The Web sites reviewed also included DHS Headquarters, Federal Law Enforcement Training Center, Immigration and Customs Enforcement, and Citizenship and Immigration Services.

Skinner made six recommendations for improvements, and DHS officials agreed with the advice and implemented the changes, the report states.

Cybersecurity has been a concern in the department before. In May, hackers attacked DHS’ online platform for sharing sensitive but unclassified information.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.