08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIED<br />

information system. However, the continuous monitoring approach does not provide a complete<br />

state <strong>of</strong> information system security controls. The current implementation tests a limited number<br />

<strong>of</strong> the security controls repeatedly, but it does not provide a methodology to test all <strong>of</strong> the<br />

security controls over the life <strong>of</strong> the security authorization, as required by NIST. Although the<br />

current process does provide a timely response to a small subset <strong>of</strong> the security controls, it lacks<br />

a strategy to explain how other controls are tested and allows the majority <strong>of</strong> security controls to<br />

be untested. Since many <strong>of</strong> these controls require a manual assessment to determine the degree<br />

<strong>of</strong> effectiveness over the course <strong>of</strong> the security authorization, the inability <strong>of</strong> the <strong>Department</strong> to<br />

document the continuous monitoring strategy and a lack <strong>of</strong> plan <strong>of</strong> action and milestones to enact<br />

corrective actions place the <strong>Department</strong>’s vital information and information systems at<br />

significant risk.<br />

35<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!