08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

800-37 18 states that the organization is required to update the plans <strong>of</strong> action and<br />

milestones on an ongoing basis.<br />

The deficiencies within the POA&M process occurred because the <strong>Department</strong> had not<br />

developed criteria to prioritize the importance <strong>of</strong> security weaknesses from both an enterprise<br />

and bureau basis. Currently, the <strong>Department</strong> permits each bureau to prioritize risks within its<br />

respective environment and to budget accordingly without consideration <strong>of</strong> the risk and exposure<br />

to the <strong>Department</strong> as a whole. If the <strong>Department</strong> does not appropriately prioritize corrective<br />

actions on an enterprise basis, the most important actions (highest security risks) may not receive<br />

the required resources for remediation, thereby exposing the <strong>Department</strong>’s sensitive data,<br />

systems, and hardware to unauthorized access and activities.<br />

Currently, IRM/IA issues a quarterly POA&M Grading Memorandum process; however,<br />

this memorandum is distributed to the bureaus’ or <strong>of</strong>fices’ ISSOs and not to senior management.<br />

Without the proper review and maintenance <strong>of</strong> POA&Ms, IT management may not be aware <strong>of</strong><br />

the status <strong>of</strong> remediation. Furthermore, the inadequacy <strong>of</strong> the POA&M process adversely effects<br />

the capital planning process.<br />

Recommendation 7. We recommend that the Chief <strong>Information</strong> Officer:<br />

� Implement a Plans <strong>of</strong> Action and Milestones (POA&M) tracking process<br />

for all ClassNet security weaknesses as required by Committee on National<br />

<strong>Security</strong> Systems Policy Number 22, <strong>Information</strong> Assurance Risk<br />

Management Policy for National <strong>Security</strong> Systems.<br />

� Distribute the quarterly POA&M Grade Memorandums to the bureaus’ and<br />

<strong>of</strong>fices’ senior management (executive director) as required by M-04-25,<br />

FY 2004 Reporting Instructions for the Federal <strong>Information</strong> <strong>Security</strong><br />

Management Act.<br />

� Ensure that the POA&M completion dates and the required resources for<br />

OpenNet corrective actions are updated as required by OMB Memorandum<br />

M-04-25.<br />

Management Response: The <strong>Department</strong> stated that it “concludes that the problems<br />

identified are not material (or are now being addressed) for the following reasons:<br />

� The <strong>Department</strong> has a compliant process for tracking POA&M items on<br />

ClassNet.<br />

� The <strong>Department</strong> has started distributing quarterly grades (effective Q1-<br />

FY2012) to executive <strong>of</strong>ficers, as recommended.<br />

� Quarterly updates to POA&M data are not warranted, unless there has been a<br />

change <strong>of</strong> status. The grading covered under the prior bullet addresses this issue.”<br />

The <strong>Department</strong> also stated that the iPost system “performs many <strong>of</strong> the functions <strong>of</strong> a<br />

POA&M system at a level <strong>of</strong> timeliness and detail that the traditional POA&M approach<br />

cannot achieve. Given the MIT Lincoln Labs findings on the trade-<strong>of</strong>f between<br />

18 NIST SP 800-37.<br />

16<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!