Years after breach, OPM still shows infosec weakness

Shutterstock image (by Sergey Nivens): Security concept, lock on a digital screen. 

The Office of Personnel Management needs to do more to secure its systems, despite its extensive efforts in the wake of the 2015 hack that affected some 21.5 million people. That's the message of a new Government Accountability Office report that pointed to hurdles still facing the agency.

After the 2015 hack, the U.S. Computer Emergency Readiness Team made 19 recommendations on strengthening security related to passwords, permissions, encryption and patches.

Since then, GAO reported, OPM has successfully implemented 11 of the recommendations, but failed to update its plan of action and milestones required by the Office of Management and Budget, making it difficult for cybersecurity efforts at OPM to begin to establish accountability. 

The report also criticized the lag time before OPM began to address the recommendations. "OPM has limited assurance that the actions taken have effectively mitigated vulnerabilities that can expose its systems to cybersecurity incidents," the report stated.

The report indicated that OPM made progress implementing information security policies and practices associated with selected governmentwide initiatives and requirements. However, GAO noted that many tasks were not finalized, nor did OPM "fully implement all of the requirements."

One example was a failure to encrypt data stored on one system, and another was failure to encrypt data in transit on a different system.

In reply his comments, OPM CIO Dave DeVries pushed back on some of this criticism, saying that GAO "does not fully acknowledge OPM's 'defense in depth' strategy and compensating controls.

Earlier in July, an IG report took OPM to task, critiquing its IT authorization process, warning of a "material weakness."

The news comes as the Trump administration faces the prospect of naming a permanent director for the personnel agency. Nominee George Nesterczuk, withdrew his nomination on July 31, without having received a confirmation hearing.

About the Author

Ben Berliner is an editorial fellow at FCW. He is a 2017 graduate of Kenyon College, and has interned at the Center for Responsive Politics and at Sunlight Foundation.

He can be contacted at bberliner@fcw.com.

Click here for previous articles by Berliner.


  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.