08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

UNCLASSIFIED<br />

12<br />

The <strong>Department</strong> will verify that all <strong>Department</strong> <strong>of</strong> <strong>State</strong> computers at other Federal<br />

agencies are clearly documented. (We found no defects with regard to the process for<br />

contractor sites.)<br />

Recommendation 18: {Section J} We recommend that the Bureau <strong>of</strong> Diplomatic <strong>Security</strong>, in<br />

coordination with the Bureau <strong>of</strong> Administration, establish procedures to identify the total number<br />

<strong>of</strong> contractors who have access to <strong>Department</strong> <strong>of</strong> <strong>State</strong> systems as required by the Office <strong>of</strong><br />

Management and Budget Memorandum M-11-33, FY 2011Reporting Instructionsfor the<br />

Federal <strong>Information</strong> <strong>Security</strong> Management Act and Agency Privacy Management.<br />

<strong>Department</strong> Response to Recommendation 18:<br />

The <strong>Department</strong> does not agree with this recommendation because a) knowing the exact<br />

total number <strong>of</strong> contractors (a continuously changing number) does not have an impact<br />

upon the security <strong>of</strong> the <strong>Department</strong>, and b) it is not required by M-1l-33.<br />

Recommendation 19: {Section K} We recommend that the Chief <strong>Information</strong> Officer, as<br />

required by Office <strong>of</strong> Management and Budget (OM B) Memorandum M-11-33, FY 2011<br />

Reporting Instructions for the Federal <strong>Information</strong> <strong>Security</strong> Management Act and Agency<br />

Privacy Management and OMB Circular No. A-II, Preparation, Submission, and Execution <strong>of</strong><br />

the Budget:<br />

• Ensure that the Bureau <strong>of</strong> <strong>Information</strong> Resource Management/ Business Management and<br />

Planning track all obligations and expenditures for information technology security<br />

investments.<br />

• Provide a summary <strong>of</strong> non-maj or investments that make up the information technologyinfrastructure<br />

and other major investments.<br />

• Include the Unique Project Identifier in the <strong>Department</strong> <strong>of</strong> <strong>State</strong>'s Plans <strong>of</strong> Action and<br />

Milestones database.<br />

<strong>Department</strong> Response to Recommendation 19:<br />

The <strong>Department</strong> agrees with the recommendation, but not the authorities cited and will:<br />

• Track and include a summary report for all obligations and expenditures for all IT<br />

projects with a) a material level <strong>of</strong>funding, or b) significant security risk.<br />

• Include UP Is in the <strong>Department</strong>'s POA&M for each system.<br />

73<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!