08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

UNCLASSIFIED<br />

3<br />

justification. The vast majority had a valid business justification. As such, the OIG draft report<br />

overstates the extent <strong>of</strong> the problem by 380% on one network, and by 1,100% on another.<br />

5) Conclusions: The <strong>Department</strong> disagrees with the OIG on whether continuous monitoring, as<br />

currently conducted, produces lower risk than a traditional C&A program, and on the relative<br />

importance <strong>of</strong> completeness and compliance vs. timeliness and risk-based prioritization. Having<br />

carefully considered these factors, the <strong>Department</strong> is convinced its continuous monitoring<br />

program, which is 300 times more timely than traditional three-year reauthorizations, produces<br />

significantly lower security risk 8 on its networks.<br />

6) Management Responses to Recommendations: The remainder <strong>of</strong> this response provides<br />

specific management responses to each <strong>of</strong> the draft OIG recommendations in the context <strong>of</strong> the<br />

overall comments provided above.<br />

Recommendation 1: {Section A} We recommend that the <strong>Information</strong> <strong>Security</strong> Steering<br />

Committee (ISSC) meet on a monthly basis to fulfill its purpose and responsibilities as required<br />

in IS SC charter.<br />

<strong>Department</strong> Response to Recommendation 1:<br />

The <strong>Department</strong> does not agree that the lack <strong>of</strong> meetings poses any material risk to the<br />

security <strong>of</strong> the <strong>Department</strong>. Moreover, there is no requirement that this voluntarily<br />

created internal group meet with recurring frequency. The <strong>Department</strong> exercised its valid<br />

authoritl to conclude there was no need to meet and believes there is no basis for OIG to<br />

substitute its own judgment. The ISSC chairpersons will survey the ISSC membership on<br />

reasons to meet, and conduct meetings accordingly.<br />

Recommendation 2: {Section A} We recommend that the <strong>Information</strong> <strong>Security</strong> Steering<br />

Committee improve its risk management strategy at the organizational level for assessing,<br />

responding to, and monitoring information security risk as required in the Foreign Affairs<br />

Manual and the National Institute <strong>of</strong> Standards and Technology Special Publication 800-39.<br />

<strong>Department</strong> Response to Recommendation 2:<br />

The <strong>Department</strong> agrees that some increased level <strong>of</strong> documentation in this area could be<br />

beneficial. The <strong>Department</strong> notes that under the OMB instructions guidance, it is the<br />

<strong>Department</strong>'s judgment that shall decide how much documentation is needed to reduce<br />

risk. 10 The <strong>Department</strong>'s Designated Authorizing Authority (DAA) will determine the<br />

level <strong>of</strong> documentation adequate to manage risk.<br />

8 Neither produce zero risk, and achieving zero risk is not foreseeable.<br />

9 0MB M-1l-33<br />

lOOp. cit.<br />

64<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!