08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIED<br />

Awareness course within the required timeframe as required by the <strong>Information</strong><br />

Assurance Training Plan.<br />

Recommendation 7. We recommend that the Chief <strong>Information</strong> Officer:<br />

� Implement a Plans <strong>of</strong> Action and Milestones (POA&M) tracking process<br />

for all ClassNet security weaknesses as required by Committee on National<br />

<strong>Security</strong> Systems Policy Number 22, <strong>Information</strong> Assurance Risk<br />

Management Policy for National <strong>Security</strong> Systems.<br />

� Distribute the quarterly POA&M Grade Memorandums to the bureaus’ and<br />

<strong>of</strong>fices’ senior management (executive director) as required by M-04-25,<br />

FY 2004 Reporting Instructions for the Federal <strong>Information</strong> <strong>Security</strong><br />

Management Act.<br />

� Ensure that the POA&M completion dates and the required resources for<br />

OpenNet corrective actions are updated as required by OMB Memorandum<br />

M-04-25.<br />

Recommendation 8. We recommend that the Chief <strong>Information</strong> Officer (CIO) develop and<br />

implement <strong>Department</strong> <strong>of</strong> <strong>State</strong> processes and procedures to resolve weaknesses in user accounts<br />

to ensure that unnecessary network user accounts are promptly removed by the bureaus and<br />

posts. Further, the CIO should develop and implement procedures to ensure that bureaus and<br />

organizational unit administrators annually review and recertify access privileges <strong>of</strong> users so that<br />

the number <strong>of</strong> guest, test, and temporary accounts are managed effectively as required by the<br />

Foreign Affairs Manual 12 FAM 622 and 12 FAM 629.<br />

Recommendation 9. We recommend that the Chief <strong>Information</strong> Officer (CIO) ensure<br />

compliance with the account management process to make certain that user and administrator<br />

accounts are created, modified, and deleted in a manner consistent with <strong>Department</strong> <strong>of</strong> <strong>State</strong><br />

policy. Further, the CIO needs to compare the terminated user listings provided by bureau and<br />

post personnel <strong>of</strong>ficers with information contained in the active directory on a quarterly basis to<br />

ensure that accounts for separated employees are removed timely, as required by NIST SP 800-<br />

53, Revision 3, August 2009, Recommended <strong>Security</strong> Controls for Federal <strong>Information</strong> Systems<br />

and Organizations, and the Foreign Affairs Manual (12 FAM 621.3).<br />

Recommendation 10. We recommend that the <strong>Information</strong> <strong>Security</strong> Steering Committee<br />

develop, document, and implement an enterprise-wide continuous monitoring strategy that<br />

addresses framing risk, assessing risk, responding to risk, and monitoring risk, as required by<br />

NIST SP 800-39, “Managing <strong>Information</strong> <strong>Security</strong> Risk.”<br />

Recommendation 11. We recommend that the Chief <strong>Information</strong> Officer in accordance with the<br />

requirements in NIST SP 800-39, Managing <strong>Information</strong> <strong>Security</strong> Risk:<br />

� Implement a continuous monitoring strategy at the enterprise-wide level.<br />

� Obtain and use scanning s<strong>of</strong>tware to enable effective scans <strong>of</strong> non-<br />

Windows operating systems, databases, firewalls, routers, and switches.<br />

37<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!