State defends security system against GAO

The State Department says its continuous monitoring and risk assessment program for its global unclassified network has reduced security risks to Windows-based hosts and clients by 89 percent over a recent 12-month period. But the Government Accountability Office has issued a critical report, acknowledging that State has been “at the forefront” of continuous monitoring, but the system is neither inclusive nor reliable enough to ensure security in a network that supports 260 embassies and hundreds of other offices around the world.

Department officials acknowledge that the system is imperfect, but said GAO is overreaching in some of its recommendations for improvement.

Related coverage:

FISMA's future may lie in State Department security model

Cloud security fears outweigh savings, but perhaps not for long

Achieving total security is “impossible and impracticable,” State’s CFO James Millette wrote in response to the GAO report. The proper goal is adequate security, and that's what the department’s continuous monitoring and scoring program is intended to provide, he said.

“The department employs a layered approach to security risk management by employing multiple levels of protection,” Millette wrote. “This protection is accomplished by implementing a matrix of technical, operational, and management security controls designed to thwart network threats, detect and mitigate vulnerabilities, and strengthen business operations.”

State, like many departments, received dismal grades in the early years of assessing its performance under the 2002 Federal Information Security and Management Act (FISMA), getting four Fs and one D- in the first five years. The monitoring and scoring program is an effort to increase real-time awareness and prioritize security efforts, and to push responsibility for problem resolution from headquarters officials to administrators in the field.

The department in 2008 began a program of automated scanning of systems and grading results, which CISO John Streufert said reduced vulnerabilities by nearly 90 percent from July 2008 to July 2009 and cut the cost of FISMA certification and accreditation of systems by more than 60 percent.

State’s current iPost system is a custom application intended to provide continuous monitoring capabilities over selected elements of State’s global IT environment. “Continuous” in this context means often enough to enable to risk-based security decisions.

The system gathers data from Microsoft Active Directory and System Management Server as well as a host of diagnostic scanning tools. It then formats and correlates the data and produces a dashboard showing current status by site and operational unit, assigning letter grades to each. Scans for vulnerabilities, configuration, passwords and patching status are done every 24 to 72 hours, rather than every three years, and grades are assigned daily.

GAO recognized the value of the effort, but said that use of iPost is not consistent or complete. It addresses only Windows hosts and not other assets on the network, does not include all security controls for information systems, and its risk prioritization is not documented.

“Establishing a process for defining and prioritizing risk through a scoring mechanism is not simple and solutions to these issues have not yet been developed at State,” the GAO report concludes.

The report said remaining challenges for iPost include:

  • Overcoming limitations and technical issues with data collection tools.
  • Identifying and notifying individuals with responsibility for site-level security.
  • Implementing configuration management for iPost.
  • Adopting a strategy for continuous monitoring of controls.
  • Managing stakeholder expectations for continuous monitoring activities.

The department agreed with GAO's recommendations that procedures be implemented to consistently notify senior managers at sites with low security grades and that it develop a documented continuous monitoring strategy.

It resisted a recommendation for further documentation of data accuracy and iPost configuration management, saying this would contribute to a climate of “paper compliance” rather than dealing with real security issues.

The department rejected three GAO recommendations for additional documentation of iPost data, controls and occupational roles, saying this would run counter to “the purpose of replacing the compliance-based security regime with a continuous monitoring regime,” that addresses advanced, persistent and dynamic threats.


About the Author

William Jackson is a Maryland-based freelance writer.


  • FCW Perspectives
    remote workers (elenabsl/

    Post-pandemic IT leadership

    The rush to maximum telework did more than showcase the importance of IT -- it also forced them to rethink their own operations.

  • Management
    shutterstock image By enzozo; photo ID: 319763930

    Where does the TMF Board go from here?

    With a $1 billion cash infusion, relaxed repayment guidelines and a surge in proposals from federal agencies, questions have been raised about whether the board overseeing the Technology Modernization Fund has been scaled to cope with its newfound popularity.

Stay Connected