Cybersecurity

Audit chides FDIC for sloppy breach protocols

Shutterstock image (by deepadesigns): Safety concept, closed padlock on a digital background. 

An Inspector General's audit found that the Federal Deposit Insurance Corporation's protocols for responding to a data breach aren't being followed, even as the agency has faced dozens of security incidents in the past two years.

The audit stemmed from a series of data breaches at the FDIC over nearly two years, from January 2015 to December 2016. Overall the agency has confirmed or suspects that it was compromised 54 times within that time period. The Office of Inspector General selected 18 of those breaches to evaluate for the audit.

In the wake of those failures, the FDIC has taken steps to better comply with the Federal Information Security Management Act by instituting a breach response plan that designates clear ownership within the agency for breach management and notification protocols.

However, auditors found that the organization often failed to implement key components of this plan for the majority of the security incidents reviewed. For example, while they were supposed to notify individuals or businesses who had their sensitive information compromised within 10 business days of completing analysis of an incident, FDIC officials waited an average 288 days (or more than nine months) after a breach was discovered before notifying affected individuals.

While the plan did delineate who would be responsible for such procedures, those positions were either unfilled for long periods of time or staffed by employees who were not properly trained, leading to long delays in the process. That potentially left the sensitive and personally identifiable information of hundreds of thousands of people and organizations further exposed and unaware of their jeopardy. Auditors also found instances of sloppy or incomplete paperwork related to risk analysis that may have led to inconsistencies in the FDIC's response to each incident.

The breach notification plan established a data breach management team, composed of "a cross-divisional group of FDIC stakeholders responsible for addressing significant data breaches and security incidents" that would be activated in the event of a breach. However, the group lacked a charter and its governance structure was poorly defined, leading to instances where the team was not activated within the necessary timeframe.

The FDIC has a history of high-profile and embarrassing cybersecurity failures dating back to at least 2010, when officials suspect hackers associated with the Chinese military infiltrated the agency's network. However, many of the breaches can be traced back to former employees who took sensitive data with them when they left the job.

In May 2016, FDIC CIO Lawrence Gross was taken to task by lawmakers after the agency failed to classify five previously known breaches that each exposed more than 10,000 records as "major incidents," something that would have required them to notify Congress.

The inspector general's office recommended seven corrective actions, including better funding and resource allocation, better and more thorough documentation practices when justifying the impact of an incident, a charter to guide its data breach management team and the establishment of metrics to assess employee and agency performance in the event of a breach.

The FDIC agreed with all of the recommendations and told auditors it expects to complete corrective actions by Sept. 30, 2018.

About the Author

Derek B. Johnson is a senior staff writer at FCW, covering governmentwide IT policy, cybersecurity and a range of other federal technology issues.

Prior to joining FCW, Johnson was a freelance technology journalist. His work has appeared in The Washington Post, GoodCall News, Foreign Policy Journal, Washington Technology, Elevation DC, Connection Newspapers and The Maryland Gazette.

Johnson has a Bachelor's degree in journalism from Hofstra University and a Master's degree in public policy from George Mason University. He can be contacted at djohnson@fcw.com, or follow him on Twitter @derekdoestech.

Click here for previous articles by Johnson.


Featured

  • Defense
    The Pentagon (Photo by Ivan Cholakov / Shutterstock)

    DOD CIO hits pause on JEDI cloud acquisition

    Dana Deasy set cloud as his office's top priority. But when it comes to the JEDI request for proposal, he's directed staff to "pause" to compile a comprehensive review.

  • Cybersecurity
    By Gorodenkoff shutterstock ID 761940757

    Waging cyber war without a rulebook

    As the U.S. looks to go on the offense in the cyber domain, critical questions remain unanswered around who will take the lead and how clearly to draw the rules of engagement.

  • Government Innovation Awards
    Government Innovation Awards - https://governmentinnovationawards.com

    Deadline extended for Rising Star nominations

    You now have until July 18 to help us identify the early-career innovators and change agents in government IT.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.