Cybersecurity

Senators question Thrift Savings Plan's security

Are federal retirement accounts safe from hackers?

Probably not, and the board in charge is failing to address security concerns or even let auditors test the extent of the vulnerabilities, a bipartisan pair of senators said.

In a letter to Federal Retirement Thrift Investment Board Chairman Michael Kennedy, Sens. Ron Johnson (R-Wis.) and Tom Carper (D-Del.) expressed concerns about the security of the Thrift Savings Plan, the retirement vehicle for millions of federal employees and military service members.

In 2011, a data breach exposed the Social Security numbers of 123,000 TSP account holders to malicious actors, and the senators allege that not much has changed since then.

"According to federal auditors, the board has failed to fix security flaws identified for years," wrote Johnson and Carper, chairman and ranking member, respectively, of the Homeland Security and Governmental Affairs Committee.

The letter also notes that the board is apparently not allowing auditors to conduct penetration tests that would help reveal the extent of security risks.

"Independent assessment is an essential part of any organization's cyber risk management program," the senators wrote. "We urge you to allow the auditors to conduct the necessary penetration testing so that you may know where any potential vulnerabilities might exist before those who wish to steal our information do."

The senators asked Kennedy to address five questions:

  1. Has the agency undergone any assessments, audits or independent reviews of its cybersecurity posture, including assessments required under the Federal Information Security Management Act?
  2. What are the plans to work with auditors at the Labor Department to ensure that the board is building an effective and robust security program?
  3. Why didn't the board comply with the reporting requirements under FISMA?
  4. How does the board plan to work with the Office of Management and Budget to come into compliance with FISMA?
  5. How does the board work with the Department of Homeland Security to take advantage of its resources, including the Continuous Diagnostics and Mitigation program, the protections of the Einstein program, and services at the U.S. Computer Emergency Readiness Team? What other programs and services has the board used to assess and improve its information security, such as those offered by other federal agencies or private-sector firms, if any?

The board was not able to immediately confirm whether the May 7 letter had been received or answered.

About the Author

Zach Noble is a staff writer covering digital citizen services, workforce issues and a range of civilian federal agencies.

Before joining FCW in 2015, Noble served as assistant editor at the viral news site TheBlaze, where he wrote a mix of business, political and breaking news stories and managed weekend news coverage. He has also written for online and print publications including The Washington Free Beacon, The Santa Barbara News-Press, The Federalist and Washington Technology.

Noble is a graduate of Saint Vincent College, where he studied English, economics and mathematics.

Click here for previous articles by Noble, or connect with him on Twitter: @thezachnoble.


Featured

  • People
    Dr. Ronny Jackson briefs the press on President Trump

    Uncertainty at VA after nominee withdraws

    With White House physician Adm. Ronny Jackson's withdrawal, VA watchers are wondering what's next for the agency and its planned $16 billion health IT modernization project.

  • Cybersecurity

    DHS floats 'collective defense' model for cybersecurity

    Homeland Security Secretary Kirstjen Nielsen wants her department to have a more direct role in defending the private sector and critical infrastructure entities from cyberthreats.

  • Defense
    Defense Secretary James Mattis testifies at an April 12 hearing of the House Armed Services Committee.

    Mattis: Cloud deal not tailored for Amazon

    On Capitol Hill, Defense Secretary Jim Mattis sought to quell "rumors" that the Pentagon's planned single-award cloud acquisition was designed with Amazon Web Services in mind.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.