VA performance dashboard failed to protect personal data, OIG says


The Veterans Affairs Department wrongly allowed more than 20 employees and contractors access to veterans’ sensitive personal and financial information in a recent information technology dashboard project, according to a new report from the Office of Inspector General.

The security violation occurred in the VA’s Systems to Drive Performance Dashboard while it was in development last year, Belinda Finn, assistant inspector general for audits and evaluations, wrote in the Feb. 13 report.

“We determined that more than 20 system users had inappropriate access to sensitive (dashboard) information,” Finn wrote.

The VA dashboard was being created to track cost accounting data. The agile development project was being managed by the VA’s assistant secretary for management, and the dashboard development group consisted of members of the management office, Office of Information & Technology and the contractor.

In March 2011, the development team populated the dashboard with veterans’ personally-identifiable information, including birth date, age, sex, race, ethnicity, county of residence, zip code, and financial information.

For the next 35 days, “more than 20 system users had inappropriate access to the sensitive data hosted in the Systems to Drive Performance development environment,” Finn wrote.

The report did not indicate how many veterans’ personal data was vulnerable, or what actions had been taken to inform them, if any.

In mid-April, access was terminated for most dashboard users, she added.

In addition to allowing the inappropriate access, the VA did not handle the user access requests consistently, and did not report the unauthorized access as a security violation as required, Finn added.

The problems were attributed to lack of awareness, failure to implement existing policies and poor oversight, Finn wrote.

“Project managers were not fully aware of VA’s security requirements for system development and had not formalized user account management procedures,” the report said. “Inadequate Information Security Officer oversight contributed to weaknesses in user account management and failure to report excessive user privileges as security violations. As a result, VA lacked assurance of adequate control and protection of sensitive STDP data.”

Finn said the improper access qualified as a security “event” but there was no evidence of a breach.

“While we did not discover indications of actual information security breaches and recognize the system is not publicly accessible via the Internet, project management should have reported excessive user permissions as a security event in accordance with VA information security policy,” she wrote.

Finn recommended that the Assistant Secretary for Information and Technology, and the Assistant Secretary for Management ensure that all project managers receive training on protecting sensitive information, along with two other recommendations.

VA officials agreed with the findings and recommendations.



About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group