Commerce bureaus flunk cyber test
- By Sean Lyngaas
- Apr 28, 2014
The Department of Commerce is unprepared for a cyberattack to the point that only one of five bureaus or operations centers tested with an external threat responded adequately, according to an inspector general’s report released last week.
Over the course of eight months of fieldwork last year, the IG used automated software to direct a steady flow of suspicious traffic at the department’s public-facing websites. Of the five bureaus or operations centers tested, only one analyzed and moved to block the cyber threat, while three did nothing at all in response, the report said.
The close communication between department bureaus and their Internet and security services providers that is needed to stave off cyber-threats is sorely lacking at Commerce, according to the report, which was released April 24. The bureaus surveyed have hardly communicated on security issues with their providers since initiating Managed Trusted Internet Protocol Services (MTIPS), the report said.
The report covered four Commerce Department bureaus: the Bureau of Economic Analysis, the Bureau of Industry and Security, the International Trade Administration, and the U.S. Patent and Trademark Office. It also surveyed a Security Operations Center in the CIO’s office. How specific bureaus fared was not disclosed for security reasons.
In an April 7 written response to a draft of the report, outgoing Commerce CIO Simon Szykman said the department agreed with the report’s findings and pledged “corrective action plans from individual bureaus.” The department plans to meet with its MTIPS provider to address the concerns raised in the report, he added.
The IG report recommends that Commerce bureaus brush up on the National Institute of Standards and Technology’s Computer Security Incident Handling Guide, which encourages agencies to have a formal plan for internal communications during a cyber-incident. The report also advised department bureaus that do not have an around-the-clock security operations center to consider filling those lapses in coverage with the help of an MTIPS provider.
Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Follow him on Twitter: @snlyngaas