Tuesday, August 21, 2012

GAO Finds Weakness In EPA Information Security Controls

Aug 20: The U.S. Government Accountability Office (GAO) released a report entitled, Information Security: Environmental Protection Agency Needs to Resolve Weaknesses (GAO-12-696, Jul 19, 2012). The report was requested by a bipartisan group of Chairman and Ranking members from the House Committee on Energy and Commerce and its Subcommittees.
 
    In background information, GAO indicates that U.S. EPA is responsible for protecting human health and the environment by implementing and enforcing the laws and regulations intended to improve the quality of the nation's air, water, and lands. The Agency's policies and programs affect virtually all segments of the economy, society, and government. In addition, it relies extensively on networked computer systems to collect a wealth of environmental data and to disseminate much of this information while also protecting other forms of sensitive or confidential information.
 
    Because of the importance of the security of EPA's information systems, GAO was asked to determine whether the Agency has effectively implemented appropriate information security controls to protect the confidentiality, integrity, and availability of the information and systems that support its mission. To do this, GAO tested security controls over EPA's key networks and systems; reviewed policies, plans, and reports; and interviewed officials at EPA headquarters and two field offices.
 
    GAO found that although EPA has taken steps to safeguard the information and systems that support its mission, security control weaknesses pervaded its systems and networks, thereby jeopardizing the Agency's ability to sufficiently protect the confidentiality, integrity, and availability of its information and systems. The Agency did not fully implement access controls, which are designed to prevent, limit, and detect unauthorized access to computing resources, programs, information, and facilities.
 
    Specifically, the agency did not always: (1) enforce strong policies for identifying and authenticating users by, for example, requiring the use of complex (i.e., not easily guessed) passwords; (2) limit users' access to systems to what was required for them to perform their official duties; (3) ensure that sensitive information, such as passwords for system administration, was encrypted so as not to be easily readable by unauthorized individuals; (4) keep logs of network activity or monitor key parts of its networks for possible security incidents; and (5) control physical access to its systems and information, such as controlling visitor access to computing equipment.
 
    In addition to weaknesses in access controls, EPA had mixed results in implementing other security controls. For example, EPA conducted appropriate background investigations for employees and contractors to ensure sufficient clearance requirements had been met before permitting access to information and information systems. However,
  • EPA had not always securely configured network devices and updated operating system and database software with patches to protect against known vulnerabilities.
  • EPA had not always ensured equipment used for sanitization and disposal of media was tested to verify correct performance.

    GAO indicated that an underlying reason for the control weaknesses is that EPA has not fully implemented a comprehensive information security program. Although EPA has established a framework for its security program, the Agency has not yet fully implemented all elements of its program. Specifically, it did not always finalize policies and procedures to guide staff in effectively implementing controls; ensure that all personnel were given relevant security training to understand their roles and responsibilities; update system security plans to reflect current agency security control requirements; assess management, operational, and technical controls for agency systems at least annually and based on risk; and implement a corrective action process to track and manage all weaknesses when remedial actions were necessary. Sustained management oversight and monitoring are necessary for EPA to implement these key information security practices and controls. Until EPA fully implements a comprehensive security program, it will have limited assurance that its information and information systems are adequately protected against unauthorized access, use, disclosure, modification, disruption, or loss.

    GAO made 12 recommendations to the Administrator of EPA to fully implement elements of EPA's comprehensive information security program. In commenting on a draft of this report, EPA's Assistant Administrator generally agreed with GAO's recommendations. Two of GAO's recommendations were revised to incorporate EPA's comments. In a separate report with limited distribution, GAO also made 94 recommendations to EPA to enhance access and other information security controls over its systems.

    Energy and Commerce  Committee Chairman Fred Upton (R-MI) commented on the report saying, "Our oversight has shed much-needed light on the vulnerability of confidential information at federal agencies. This report raises serious questions about EPA's dedication to ensuring robust information protection and underscores the urgency for the agency to address security weaknesses. We will continue our oversight with a review of EPA's implementation of GAO's recommendations in the coming months."

    Access the complete 45-page GAO report (click here). Access the release from the House Energy and Commerce  Committee (click here). [#All]

GET THE REST OF TODAY'S NEWS (click here)
32 Years of Environmental Reporting for serious Environmental Professionals