[ISN] Federal Government Has A Ways To Go To Secure Systems

From: InfoSec News (isnat_private)
Date: Wed Jun 25 2003 - 00:40:04 PDT

  • Next message: InfoSec News: "Re: [ISN] Student arrested for allegedly hacking university computers to derail election"

    http://www.informationweek.com/story/showArticle.jhtml?articleID=10800126
    
    By Eric Chabrow 
    June 24, 2003
    
    Since January, the State Department has wiped out more than 155,000
    viruses on its IT systems. Between Oct. 1 and May 31, the first eight
    months of fiscal year 2003, the department recorded more than 700
    attempts to hack its IT systems.
    
    Those are just two examples of the vulnerabilities the government's
    thousands of IT systems face. At a hearing before a House panel
    Tuesday, government IT experts testified that progress in securing
    systems is being made, but at a slower pace than many had hoped.
    
    "While some progress is clearly being made at federal agencies, going
    from an F to a D or D to a C isn't saying much," Rep. Adam Putnam,
    R-Fla., chairman of the House Subcommittee on Technology, Information
    Policy, Intergovernmental Relations, and the Census, said in opening
    remarks at an oversight hearing on cybersecurity. Putnam said
    Congress, the Bush administration, and agencies must work together to
    provide a relative degree of comfort that IT systems are secure. "We
    are a long way from that point today."
    
    Putnam's lament was backed up by a report from the General Accounting
    Office, the investigative arm of Congress, that showed significant
    challenges remain in implementing information security requirements.  
    For instance, eight of 24 agencies reported that they hadn't assessed
    security risks for half of their IT systems.
    
    Robert Dacey, GAO director of information security issues, said
    various agencies inspectors general have noted that even when agencies
    develop plans to correct security problems, their usefulness is
    limited because they don't identify all weaknesses, provide realistic
    completion estimates, or prioritize actions. Nine of 14 agency
    inspectors general surveyed by GAO said their organizations'
    corrective action plans failed to identify significant cybersecurity
    weaknesses. "Overall, agencies aren't effectively implementing and
    managing their information security programs," he testified.
    
    Treasury Department CIO Drew Ladner conceded that it's slow going. A
    review required by the Government Information Security Reform Act
    revealed 14 major weaknesses. "Central to the IT security material
    weaknesses is that the department hasn't yet achieved the goal of full
    certification and accreditation of mission-critical systems and major
    applications," Ladner said. "In addition, specialized IT security
    training and incorporation of security into the capital investment
    planning process needs improvement."
    
    What's Treasury doing to correct the situation? First, Ladner said,
    it's implementing an aggressive oversight and compliance program in
    which each bureau evaluates security policy and guidance, computer
    incident handling and response, security training, managing plan of
    actions and milestones, integrating security into capital planning,
    and getting systems certified and accredited.
    
    Funding isn't a problem. The State Department, for instance, spends
    more than $1 in $5 of its IT budget on IT security. Acting State
    Department CIO Bruce Morrison testified that the flagship of its new
    cybersecurity efforts is a program to certify and accredit all of its
    150 IT systems by September 2004, adding that one-third of the systems
    should be accredited by Sept. 30.
    
    Legislation requiring government organizations to get their IT
    security in order has resulted in top agency officials buying into the
    plan. That's seen as progress by some officials. "The most positive
    impact has resulted from the laws' requirements to view the agency's
    IT security posture as a whole, rather than as separate parts," said
    National Aeronautics and Space Administration inspector general Robert
    Cobb. "The legislation and related Office of Management and Budget
    guidance have provided NASA with a framework for more effectively
    managing IT security. As a result, NASA senior management is
    increasing the attention given to IT security."
    
    But Cobb cautioned that NASA must change its decentralized culture--in
    which power is often found within agency centers--by attacking IT
    security centrally through its OneNASA concept. If implemented
    correctly, he said, centralization and a revised architecture will
    improve the agency's information-security posture. "However, as long
    as NASA governance structure is such that center CIOs and security
    officials report to center directors--who are program
    officials--rather than to the NASA CIO and the agency's assistant
    administrator for security management and safeguards, a fully
    integrated approach to information security will be impossible at
    NASA."
    
    OMB E-government and IT administrator Mark Forman, the federal
    government's top IT officer, reminded the committee that agencies must
    develop security plans and get their systems certified and accredited
    if they want to receive money to fund IT programs. In the coming
    fiscal year, Forman said, nearly 500 government IT systems have been
    deemed at risk either solely or in part due to IT security weaknesses
    because they haven't been properly certified or accredited. By fiscal
    year 2004, which begins Oct. 1, the administration plans for 80% of
    the federal government's major IT investments to integrate security
    into the life cycle of the investment. That's a big challenge, Forman
    said. "Failure to appropriately incorporate security in new and
    existing IT investments automatically requires the business case to be
    scored as 'at-risk,'" he said. "As a result, that system isn't
    approved for the fiscal year in which the funds were requested until
    the security weaknesses are addressed."
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Wed Jun 25 2003 - 02:56:20 PDT