08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

Executive Summary<br />

In accordance with the Federal <strong>Information</strong> <strong>Security</strong> Management Act <strong>of</strong> 2002 (FISMA), 1<br />

the Office <strong>of</strong> Inspector General (OIG) contracted with Williams, Adley & Company, LLP<br />

(referred to as “we” in this report), to perform an independent evaluation <strong>of</strong> the <strong>Department</strong> <strong>of</strong><br />

<strong>State</strong> (<strong>Department</strong>) information security program’s compliance with Federal laws, regulations,<br />

and standards established by FISMA, the Office <strong>of</strong> Management and Budget (OMB), and the<br />

National Institute <strong>of</strong> Standards and Technology (NIST). Additionally, the results are designed to<br />

assist OIG in providing responses to OMB Memorandum M-11-33, FY 2011 Reporting<br />

Instructions for the Federal <strong>Information</strong> <strong>Security</strong> Management Act and Agency Privacy<br />

Management, dated September 14, 2011.<br />

Overall, we found that the <strong>Department</strong> had implemented an information security program,<br />

but we identified weaknesses that significantly impact the information security program<br />

controls. If these control weaknesses are exploited, the <strong>Department</strong> could be exposed to<br />

additional security breaches. Collectively, these control weaknesses represent a significant<br />

deficiency, as defined by the Office <strong>of</strong> Management and Budget M-11-33, to enterprise-wide<br />

security including the <strong>Department</strong>’s financial systems. The weakened security controls could<br />

adversely affect the confidentiality, integrity, and availability <strong>of</strong> information and information<br />

systems. A further compounding factor is that the <strong>Department</strong> had not taken corrective action to<br />

remediate all <strong>of</strong> the control weaknesses identified in the FY2010 FISMA report. To improve the<br />

information security program and to bring the program into compliance with FISMA, OMB, and<br />

NIST requirements, the <strong>Department</strong> needs to address the following control weaknesses:<br />

A. Risk Management <strong>Program</strong><br />

The <strong>Department</strong>’s risk management program for information security needs<br />

improvement at both the organization and the system levels. At the organizational<br />

level, the <strong>Department</strong> had not implemented an effective risk management strategy, and<br />

the <strong>Information</strong> <strong>Security</strong> Steering Committee (ISSC) did not meet during the fiscal<br />

year. At the system level, we noted several deficiencies in the <strong>Department</strong>’s<br />

documentation in the security assessment and authorization packages. More<br />

importantly, the security authorization process was not properly managed for nine <strong>of</strong><br />

30 <strong>of</strong> the <strong>Department</strong>’s information systems, including extensions for security<br />

authorizations (formerly authority to operate [ATO]) on the <strong>Department</strong>’s primary<br />

general support systems (GSS) for classified and unclassified systems. These<br />

deficiencies weaken the <strong>Department</strong>’s risk management framework and its ability to<br />

assess, respond to, and monitor information security risk.<br />

B. <strong>Security</strong> Configuration Management<br />

Although the Chief <strong>Information</strong> Officer (CIO) is taking actions to address the prior<br />

year’s weaknesses with the configuration management controls, the configuration<br />

management process continues to experience deficiencies in installing critical security<br />

1 Public Law No. 107-347, title III.<br />

1<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!