08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIED<br />

For four 46 <strong>of</strong> 10 appropriated IT security investments reviewed, the <strong>Department</strong> did not<br />

provide documentation showing obligations and expenditures. Approximately $164 million was<br />

appropriated for the IT security investments; however, because <strong>of</strong> the lack <strong>of</strong> documentation for<br />

the project expenditures, there is an increased risk associated with the potential inability to<br />

achieve overall security program objectives within defined cost, schedule, and technical<br />

constraints. The CIO did not comply with provisions <strong>of</strong> the Clinger-Cohen Act <strong>of</strong> 1996, which<br />

require assumption <strong>of</strong> responsibility and accountability for IT investments. Inadequate<br />

monitoring shows a lack <strong>of</strong> accountability once funds are approved.<br />

We identified the following control weaknesses related to the CPIC process:<br />

� The <strong>Department</strong> did not provide OMB with required information related to<br />

IT security investments that have a significant dependency for the IT<br />

Infrastructure major investment. In a sample <strong>of</strong> 10 non-major investments<br />

that made up the IT Infrastructure major investment, we found none <strong>of</strong> the<br />

10 investments were identified by the unique project identifier (UPI) in<br />

OMB Circular A-11 47 Exhibit 300, 48 even though OMB requires an agency<br />

to report IT security initiatives and investments not directly tied to a major<br />

investment on a separate line identified as “non-major.” By not including<br />

IT security investments that have a significant dependency on the IT<br />

infrastructure major investment in the exhibit 300, OMB does not have an<br />

accurate amount spent on IT security.<br />

� IT security costs from the <strong>Department</strong>’s Plans <strong>of</strong> Actions and Milestones<br />

(POA&Ms) are not captured in the capital planning process. Specifically,<br />

the <strong>Department</strong>’s implementation <strong>of</strong> the POA&M process did not reflect the<br />

unique project identifiers (UPI) 49 for each corrective action plan as required<br />

by OMB. 50 According to OMB, security costs identified in POA&Ms are<br />

required to be captured within each investment’s Exhibit 300 and<br />

summarized to Exhibit 53. 51<br />

IRM had not developed procedures to reflect guidelines contained in the FY 2010<br />

OMB Circular A-11, which states that non-major investments that are directly tied to<br />

major investments can be collapsed into a major investment. The <strong>Department</strong> was not<br />

aware <strong>of</strong> the OMB 52 requirement that each POA&M must have a unique project<br />

46<br />

The four systems are <strong>Department</strong> Bandwidth Management, Foreign Affairs Network, IT Infrastructure–IRM, and<br />

Enterprise Network Management.<br />

47<br />

OMB Circular A-11, Preparation, Submission, and Execution <strong>of</strong> the Budget.<br />

48<br />

Exhibit 300, Capital Asset Plan and Business Case Summary, is the document OMB uses to assess investments<br />

and ultimately make funding decisions. The exhibit also provides OMB with a robust assessment <strong>of</strong> the investment<br />

and is the vehicle for IT investments to justify lifecycle and annual funding requests to OMB.<br />

49<br />

UPIs consist <strong>of</strong> the identifier depicting agency code, bureau code, mission area (where appropriate), part <strong>of</strong> the<br />

exhibit where investment will be reported (Exhibit 300), type <strong>of</strong> investment, agency four-digit identifier, and twodigit<br />

investment category code.<br />

50<br />

OMB Memorandum M-02-01, Guidance for Preparing and Submitting <strong>Security</strong> Plans <strong>of</strong> Action and Milestones.<br />

51<br />

Exhibit 53, Agency IT Investment Portfolio, provides an overview <strong>of</strong> the agency’s entire IT portfolio by listing<br />

every IT investment, lifecycle, and budget-year cost information.<br />

52<br />

OMB Memorandum M-02-01, Guidance for Preparing and Submitting <strong>Security</strong> Plans <strong>of</strong> Action and Milestones.<br />

32<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!