08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

Appendix B. Followup <strong>of</strong> Recommendations From the FY 2010 FISMA<br />

Report<br />

The evaluation team reviewed actions implemented by management to mitigate the<br />

findings identified in the FY 2010 FISMA report. The current status <strong>of</strong> each <strong>of</strong> the<br />

recommendations is as follows:<br />

Recommendation 1. We recommend that the Chief <strong>Information</strong> Officer verify the Federal<br />

<strong>Information</strong> <strong>Security</strong> Management Act systems inventory list to the <strong>Information</strong> Technology<br />

Asset Baseline to ensure that all information technology systems are accurately accounted for.<br />

2011 Status: Closed. We reviewed the population <strong>of</strong> the FY 2010 fourth quarter FISMA<br />

inventory list and the population <strong>of</strong> the FY 2011 third quarter FISMA inventory list. We verified<br />

all changes between the two populations within ITAB. The list was accurate and complete.<br />

Recommendation 2. We recommend that the Chief <strong>Information</strong> <strong>Security</strong> Officer ensure that<br />

systems operated by a contractor, including systems rated low cost and low impact, the security<br />

authorization process, including completion <strong>of</strong> a risk assessment and implementation <strong>of</strong><br />

necessary security controls, and that security authorization packages are completed on a timely<br />

basis.<br />

2011 Status: This recommendation is partially closed. The systems rated low cost and low<br />

impact that are operated by contractors are websites hosted on foreign Internet Service<br />

Providers (ISPs). The <strong>Department</strong> cannot enforce FISMA/NIST requirements for websites hosted<br />

on foreign ISPs, as FISMA and NIST are US law/standards. The evaluation found that security<br />

authorization packages were not completed accurately and on a timely basis. It has become<br />

Recommendation 3 (Finding A) in the FY 2011 report.<br />

Recommendation 3. We recommend that the Chief <strong>Information</strong> Officer develop a process to<br />

periodically update the resources recorded in the plans <strong>of</strong> action and milestones (POA&M) and<br />

that it update, in the POA&Ms, those completion dates for corrective actions that have expired.<br />

2011 Status: This is open and a repeat recommendation from the FY 2010 report. It has become<br />

Recommendation 7 (Finding D) in the FY 2011 report<br />

Recommendation 4. We recommend that the Chief <strong>Information</strong> Officer, the Foreign Service<br />

Institute, and the Bureau <strong>of</strong> Diplomatic <strong>Security</strong> implement methods to enforce the security<br />

awareness policy to suspend a user’s access if the user has not taken the Cyber <strong>Security</strong><br />

Awareness course within the required timeframe.<br />

2011 Status: This is open and a repeat recommendation from the FY 2010 report. It has<br />

become Recommendation 6 (Finding C) in the FY 2011report.<br />

44<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!