08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

UNCLASSIFIED<br />

10<br />

• Develop a master table <strong>of</strong> contents for the OpenN et security documentation across<br />

sub-systems so that the OIG can find the COOP plans and updates in ON<br />

subsections.<br />

• Develop criteria to determine when COOP plans have been adequately addressed<br />

in these documents.<br />

• Verify that significant changes to COOP plans are in compliance with the<br />

applicable criteria.<br />

Recommendation 13: {Section H} We recommend that the Bureau <strong>of</strong> Administration, Office<br />

<strong>of</strong> Emergency Management, in coordination with the Chief<strong>Information</strong> Officer, align the<br />

Business Impact Analysis <strong>of</strong> the Primary Mission Essential Functions with the Bureau <strong>of</strong><br />

<strong>Information</strong> Resource Management's Maximum Tolerable Downtime for the network in<br />

accordance with NIST SP 800-34, Revision 1, "Contingency Planning Guide for Federal<br />

<strong>Information</strong> Systems."<br />

<strong>Department</strong> Response to Recommendation 13:<br />

The <strong>Department</strong> considers the documents already aligned and will:<br />

• Develop criteria to determine when the BIA and <strong>State</strong> GSS downtime are<br />

adequately coordinated.<br />

• Verify that these criteria are met.<br />

Recommendation 14: {Section I} As required by National Institute <strong>of</strong> Standards and<br />

Technology (NIST) Special Publications (SP) 800-34, Revision 1, Contingency Planning Guide<br />

for Federal <strong>Information</strong> Systems, and SP 800-53, Revision 3, Recommended <strong>Security</strong> Controls<br />

for Federal <strong>Information</strong> Systems and Organizations, we recommend that the Bureau <strong>of</strong><br />

<strong>Information</strong> Resource Management, Office <strong>of</strong><strong>Information</strong> Assurance, in coordination with the<br />

bureaus and system owners, take the following actions:<br />

• Document and maintain alternate site locations and procedures for accessing an alternate<br />

site.<br />

• Develop and maintain contingency plans for all major applications and general support<br />

systems.<br />

• Maintain and update recovery and restoration procedures for all applications and general<br />

support systems.<br />

<strong>Department</strong> Response to Recommendation 14:<br />

The <strong>Department</strong> will document compliance and/or non-compliance to the OIG findings<br />

and take the necessary corrective action.<br />

Recommendation 15: {Section I} As required by National Institute <strong>of</strong> Standards and<br />

Technology (NIST) Special Publications (SP) 800-34, Revision I, Contingency Planning Guide<br />

for Federal <strong>Information</strong> Systems and SP 800-53, Revision 3, Recommended <strong>Security</strong> Controls for<br />

Federal <strong>Information</strong> Systems and Organizations, we recommend that the Chief <strong>Information</strong><br />

Officer:<br />

71<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!