08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

UNCLASSIFIED<br />

Recommendation 5. We recommend that the Chief <strong>Information</strong> Officer, the Foreign Service<br />

Institute, and the Bureau <strong>of</strong> Diplomatic <strong>Security</strong> complete the <strong>Department</strong> <strong>of</strong> <strong>State</strong>'s<br />

corrective action plan (which involves Active Directory, security awareness completion data,<br />

and iPost) to enforce the security awareness policy to suspend a user’s access if the Cyber<br />

<strong>Security</strong> Awareness course is not taken within the required timeframe.<br />

2011 Status: This is open and a repeat recommendation from the FY 2010 report. It has<br />

become Recommendation 6 (Finding C) in the FY 2011report.<br />

Recommendation 6. We recommend that the Chief <strong>Information</strong> Officer and the Bureau <strong>of</strong><br />

Diplomatic <strong>Security</strong> define and identify personnel who have significant security<br />

responsibilities and ensure that they receive the appropriate training. Also, the Student<br />

Training Management System should be modified to capture other training systems, such as<br />

those paid for by the <strong>Department</strong> <strong>of</strong> <strong>State</strong>, to meet continuing pr<strong>of</strong>essional education<br />

requirements.<br />

2011 Status: Closed. In the evaluation we were able to identify the titles <strong>of</strong> personnel who<br />

have significant security responsibilities in the IA Training Plan.<br />

Recommendation 7. We recommend that the Chief <strong>Information</strong> Officer complete the end-toend<br />

configuration management initiative, including implementation <strong>of</strong> the standard operating<br />

environment.<br />

2011 Status: This is open and a repeat recommendation from the FY 2010 report. It has<br />

become Recommendation 4 (Finding B) in the FY 2011 report.<br />

Recommendation 8. We recommend that the Chief <strong>Information</strong> Officer:<br />

Install an NIST approved encryption algorithm that controls access to support controls access<br />

to OpenNet Everywhere (ONE), reconfigure the ONE session timeout setting to 20 minutes,<br />

retain remote access authorization forms to show supervisory approval, and document the<br />

necessary risk assessment to determine the electronic authentication level for ONE.<br />

2011 Status: Closed. The evaluation assessed Global OpenNet (GO), the replacement for<br />

ONE, and found the security controls were implemented in accordance with OMB and NIST.<br />

Based on the electronic process from the implementation <strong>of</strong> GO, we have determined that the<br />

electronic authorization forms requires supervisory and executive director approval before<br />

the remote access user receives a FOB key.<br />

Recommendation 9. We recommend that the Chief <strong>Information</strong> Officer enhance the Active<br />

Directory account management automated tools to flag accounts that have not been used<br />

within the past 60 days and ensure that all accounts are configured with passwords that expire<br />

every 60 days.<br />

2011 Status: This is open and a repeat recommendation from the FY 2010 report. It has<br />

become Recommendation 8 (Finding E) in the FY 2011 report.<br />

Recommendation 10. We recommend that the Chief <strong>Information</strong> Officer ensure that<br />

45<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!