This is the accessible text file for GAO report number GAO-07-751T entitled 'Information Security: Persistent Weaknesses Highlight Need for Further Improvement' which was released on April 19, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Testimony: Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives: For Release on Delivery: Expected at time 1:00 p.m. EDT Thursday, April 19, 2007: Information Security: Persistent Weaknesses Highlight Need for Further Improvement: Statement of: Gregory C. Wilshusen, Director: Information Security Issues: David A. Powner, Director: Information Technology Management Issues: GAO-07-751T: GAO Highlights: Highlights of GAO-07-751T, a testimony before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, Committee on Homeland Security, House of Representatives Why GAO Did This Study: For many years, GAO has reported that weaknesses in information security are a widespread problem with potentially devastating consequences—such as intrusions by malicious users, compromised networks, and the theft of personally identifiable information. In reports to Congress since 1997, GAO has identified information security as a governmentwide high-risk issue. Concerned by reports of significant vulnerabilities in federal computer systems, Congress passed the Federal Information Security Management Act of 2002 (FISMA), which permanently authorized and strengthened the information security program, evaluation, and reporting requirements for federal agencies. FISMA also defines responsibilities for ensuring centralized compilation and analysis of incidents that threaten information security and providing timely technical assistance in handling security incidents. In this testimony, GAO discusses the continued weaknesses in information security controls at 24 major federal agencies, the reporting and analysis of security incidents, and efforts by the Department of Homeland Security (DHS) to develop a cyber threat analysis and warning capability. GAO based its testimony on its previous work in this area as well as agency and congressional reports. What GAO Found: In their fiscal year 2006 financial statement audit reports, 21 of 24 agencies indicated that they had significant weaknesses in information security controls. As shown by reports by GAO and agency inspectors general (IG), the weaknesses persist in major categories of controls—including, for example, access controls, which ensure that only authorized individuals can read, alter, or delete data, and configuration management controls, which provide assurance that only authorized software programs are implemented. An underlying cause for these weaknesses is that agencies have not yet fully implemented agencywide information security programs, which provide the framework for ensuring that risks are understood and that effective controls are selected and properly implemented. Until agencies effectively and fully implement agencywide information security programs, federal data and systems will not be adequately safeguarded to prevent unauthorized use, disclosure, and modification. Organizations can reduce the risks associated with intrusions and misuse if they take steps to detect and respond to incidents before significant damage occurs, analyze the causes and effects of incidents, and apply the lessons learned. As part of this process, federal policy requires agencies to report incidents to the federal information security incident center—US-CERT (Computer Emergency Readiness Team). According to US-CERT, federal agencies reported a record number of incidents in fiscal year 2006. As the figure shows, since 2005, the number of incidents reported increased in every category except one. However, inconsistencies exist in reporting at various levels. If agencies do not properly capture and analyze security incidents, they risk losing valuable information needed to prevent future exploits and understand the nature and cost of security threats. Strategic analysis and warning is an essential element of assisting agencies in addressing information security incidents. GAO has recommended that DHS develop such a capability for addressing cyber attacks. DHS has established various initiatives to enhance its analytical capabilities through US-CERT and GAO believes with continued progress in addressing strategic analysis and warnings, US-CERT can further agencies’ efforts to reduce risks associated with incidents. Figure: [See PDF for Image] Source: GAO analysis of OMB data. [End of figure] [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-751T]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Gregory C. Wilshusen at (202) 512-6244 or firstname.lastname@example.org. [End of section] Mr. Chairman and Members of the Subcommittee: Thank you for the opportunity to join in today's hearing to discuss information security over federal systems. Information security is a critical consideration for any organization that depends on information systems and computer networks to carry out its mission or business. It is especially important for government agencies, where the public's trust is essential. The need for a vigilant approach to information security is demonstrated by the dramatic increase in reports of security incidents, the wide availability of hacking tools, and steady advances in the sophistication and effectiveness of attack technology. Proper safeguards are essential to protect systems from attackers attempting to gain access and obtain sensitive information, commit fraud, disrupt operations, or launch attacks against other systems. For many years, we have reported that poor information security is a widespread problem with potentially devastating consequences. In reports to Congress since 1997, we have identified information security as a governmentwide high-risk issue.[Footnote 1] Concerned by reports of significant weaknesses in federal computer systems, Congress passed the Federal Information Security Management Act (FISMA) of 2002,[Footnote 2] which permanently authorized and strengthened the information security program, evaluation, and annual reporting requirements for federal agencies. In our testimony today, we will summarize (1) the continued weaknesses in information security controls at federal agencies, (2) federal agencies' reporting of information security incidents, and (3) efforts by the Department of Homeland Security (DHS) to develop a cyber threat warning and analysis capability. In preparing for this testimony, we relied on our previous reports on information security at federal agencies and the challenges faced by DHS in fulfilling its cybersecurity responsibilities. We also analyzed agencies' Inspector General (IG) reports pertaining to information security; congressional reports; the 24 major federal agencies' FISMA reports for fiscal years 2004, 2005, and 2006; the performance and accountability reports for those agencies; and the Office of Management and Budget's FISMA guidance and mandated annual reports to Congress. The work on which this testimony is based was performed in accordance with generally accepted government auditing standards. Results in Brief: Significant information security weaknesses continue to place federal agencies at risk. In their fiscal year 2006 financial statement audit reports, 21 of 24 major agencies cited information security control weaknesses. An underlying cause for these weaknesses is that agencies have not fully implemented agencywide information security programs. These weaknesses persist even as many agencies report increased implementation of information security program activities. However, until agencies effectively and fully implement agencywide information security programs, federal data and systems will not be sufficiently safeguarded to prevent unauthorized use, disclosure, and modification. In 2006, agencies reported a record number of information security incidents to US-CERT (Computer Emergency Readiness Team)--the DHS unit responsible for collecting such information. At the same time, although agencies have noted improvements in incident reporting procedures, inconsistencies exist across agencies. For example, one agency reported no incidents to US-CERT, although it reported more than 800 incidents internally and to law enforcement authorities. IGs have also reported weaknesses in agencies' incident reporting procedures. In addition to its activities with US-CERT, DHS has taken steps towards addressing prior recommendations for developing a strategic analysis and warning capability for cyber attacks. Specifically, DHS has established various initiatives to enhance its analytical capabilities, including intelligence sharing through US-CERT and situational awareness tools at selected federal agencies. We believe that with continued progress in addressing strategic analysis and warnings, US- CERT can further agencies' efforts to reduce risks associated with incidents. However, DHS has not yet fully implemented our original recommendations, particularly in implementing such a capability beyond the federal environment. Background: Virtually all federal operations are supported by automated systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions and account for their resources without these information assets. Hence, the degree of risk caused by security weaknesses is high. For example, resources (such as federal payments and collections) could be lost or stolen, data could be modified or destroyed, and computer resources could be used for unauthorized purposes or to launch attacks on other computer systems. Sensitive information, such as taxpayer data, Social Security records, medical records, and proprietary business information could be inappropriately disclosed, browsed, or copied for improper or criminal purposes. Critical operations could be disrupted, such as those supporting national defense and emergency services. Finally, agencies' missions could be undermined by embarrassing incidents, resulting in diminished confidence in their ability to conduct operations and fulfill their fiduciary responsibilities. Recognizing the importance of securing federal systems and data, Congress passed FISMA, which set forth a comprehensive framework for ensuring the effectiveness of security controls over information resources that support federal operations and assets. FISMA also defined several public sector responsibilities that have been assumed by US-CERT, a partnership between DHS and the public and private sectors that was established in 2003 to coordinate defense against and responses to cyber attacks across the nation.[Footnote 3] US-CERT's responsibilities include compiling and analyzing information about incidents that threaten information security and providing timely technical assistance regarding security incidents. Significant Weaknesses Continue to Place Federal Agencies at Risk: * Significant weaknesses continue to threaten the confidentiality, integrity and availability of federal information and information systems. In their fiscal year 2006 financial statement audit reports, 21 of 24 major agencies indicated that deficient information security controls were either a reportable condition[Footnote 4] or material weakness (see fig. 1).[Footnote 5] Figure 1: Agencies Reporting of Information Security Controls in Fiscal Year 2006 Financial Statement Audits: [See PDF for image] Source: GAO analysis. [End of figure] These persistent weaknesses appear in the five major categories of information system controls: (1) access controls, which ensure that only authorized individuals can read, alter, or delete data; (2) configuration management controls, which provide assurance that only authorized software programs are implemented; (3) segregation of duties, which reduces the risk that one individual can independently perform inappropriate actions without detection; (4) continuity of operations planning, which provides for the prevention of significant disruptions of computer-dependent operations; and (5) an agencywide information security program, which provides the framework for ensuring that risks are understood and that effective controls are selected and properly implemented. Figure 2 shows how many of the agencies had weaknesses in these five areas. Figure 2: Information Security Weaknesses at the 24 Major Agencies for Fiscal Year 2006: [See PDF for image] Source: GAO analysis. [End of figure] Access Controls Were Not Adequate: A basic management control objective for any organization is to protect data supporting its critical operations from unauthorized access, which could lead to improper modification, disclosure, or deletion of the data. Access controls, which are intended to prevent, limit, and detect unauthorized access to computing resources, programs, information, and facilities, can be both electronic and physical. Electronic access controls include use of passwords, access privileges, encryption, and audit logs. Physical security controls are important for protecting computer facilities and resources from espionage, sabotage, damage, and theft. Our analysis of IG, agency, and our own reports uncovered that agencies did not have adequate access controls in place to ensure that only authorized individuals could access or manipulate data. Of the 24 major agencies, 18 had access control weaknesses. Such weaknesses included not replacing well-known vendor-supplied passwords, permitting excessive access privileges that users did not need to perform their jobs, not encrypting sensitive information, and not creating or maintaining adequate audit logs. Agencies also lacked effective physical security controls. For instance, many of the data losses that occurred at federal agencies over the past few years were a result of physical thefts or improper safeguarding of systems, including laptops and other portable devices. Shortcomings Existed in Other Controls: In addition to access controls, other important controls should be in place to protect the confidentiality, integrity, and availability of information. These controls include policies, procedures, and techniques addressing configuration management to ensure that software patches are installed; appropriately segregating incompatible duties; and establishing service continuity planning. Weaknesses in these areas increase the risk of unauthorized use, disclosure, modification, or loss of information. Federal agencies demonstrated weaknesses in these control areas. For example, several agencies did not always consistently install critical software patches in a timely manner, segregate duties such as security and system administration, or adequately update and test contingency plans. Agencywide Security Programs Were Not Fully Implemented: An underlying cause for the information security weaknesses identified at federal agencies is that they have not yet fully implemented agencywide information security programs. An agencywide security program provides a framework and continuing cycle of activity for managing risk, developing security policies, assigning responsibilities, promoting awareness, monitoring the adequacy of the entity's computer-related controls through security tests and evaluations, and implementing remedial actions as appropriate. Without a well-designed program, security controls may be inadequate; responsibilities may be unclear, misunderstood, and improperly implemented; and controls may be inconsistently applied. Such conditions may lead to insufficient protection of sensitive or critical resources. In their annual FISMA reports for fiscal year 2006, agencies reported increased compliance in several security program elements required by the law or federal policy. For example, agencies reported increases in the percentages of systems with assigned risk levels, employees receiving security awareness training, systems that have been certified and accredited[Footnote 6] and systems whose security controls were tested and evaluated. However, our reports and those of agency IGs indicate that at least 18 of the 24 major agencies had not fully implemented agencywide programs. For example, agencies often did not effectively ensure that all employees and contractors, including those with significant information security responsibilities, received sufficient training. Also, 10 IGs rated the quality of their agencies' certification and accreditation process as "poor" or "failing" and continued to identify specific weaknesses with the process, such as incomplete risk assessments and security plans. We have also identified shortcomings in agencies' efforts in testing and evaluating the effectiveness of their information security controls. In 2006, we reported that agencies had not adequately designed and effectively implemented policies for performing such tests and evaluations.[Footnote 7] Policies often did not include elements important for performing effective testing. In addition, at agencies where we examined the effectiveness of security controls, we found that they did not identify many of the vulnerabilities we identified on their systems. Further, for case studies of 30 systems at six agencies, weaknesses included insufficient testing documentation, inadequately defined assessment methods, inadequate security testing, and lack of remedial actions included in testing plans. Finally, for 16 of 24 major agencies, IGs were not able to provide assurance that their agencies almost always incorporated weaknesses for all systems into their remediation plans. Our reviews have also reported that weaknesses were not always resolved as reported, and agencies' remedial action plans did not identify resources necessary to correct weaknesses and were not always updated. As a result, agencies do not have reasonable assurance that controls are implemented correctly, operating as intended, or producing the desired outcome with respect to meeting the security requirements of the agency. Furthermore, agencies may not be fully aware of the security control weaknesses in their systems, thereby leaving their information and systems vulnerable to attack or compromise. Until agencies effectively and fully implement agencywide information security programs, federal data and systems will not be adequately safeguarded to prevent unauthorized use, disclosure, and modification. Incident Reporting Varies Across Agencies: Although strong controls may not block all intrusions and misuse, organizations can reduce the associated risks if they take steps to detect and respond to them before significant damage occurs. Accounting for and analyzing security problems and incidents are also effective ways for an organization to improve its understanding of security threats and potential costs of security incidents, as well as pinpointing vulnerabilities that need to be addressed so that they are not exploited again. When incidents occur, agencies are to notify the federal information security incident center--US-CERT. According to the US-CERT annual report for fiscal year 2006, federal agencies reported a record number of incidents, with a notable increase in incidents reported in the second half of the year. As figure 3 shows, since 2005, the number of incidents reported to US-CERT increased in every category except for malicious code. Further, a 2006 report by the House Committee on Government Reform illustrated that agencies have a wide range of incidents involving loss or theft and privacy breaches.[Footnote 8] The report further indicates that the loss of personally identifiable information occurs governmentwide and is not limited to the well-publicized incident at the Department of Veterans Affairs (which involved information on about 26.5 million veterans and active duty military personnel). Figure 3. Incidents Reported to US-CERT in FY05 and FY06: [See PDF for image] Source: GAO analysis of OMB data. [End of figure] Although agencies have noted many improvements in incident reporting procedures, there are still inconsistencies in reporting at various levels. For example, one agency reported no incidents to US-CERT, although it reported more than 800 incidents internally and to law enforcement authorities. Several IGs also noted specific weaknesses in incident procedures such as components not reporting incidents reliably, information being omitted from incident reports, and reporting time requirements not being met. Without properly accounting for and analyzing security problems and incidents, agencies risk losing valuable information needed to prevent future exploits and understand the nature and cost of threats directed at them. DHS Is Acting to Implement GAO Recommendations on Strategic Analysis and Warning, But More Actions Needed: Strategic analysis and warning is an essential element of assisting agencies in addressing information security incidents. We have previously reported that developing and enhancing a national cyber analysis and warning capability is a key DHS cybersecurity responsibility.[Footnote 9] Over the last several years, we have made recommendations to DHS--as the nation's focal point for cyber critical infrastructure protection--to develop a strategic analysis and warning capability for addressing cyber attacks.[Footnote 10] Accordingly, we recommended that responsible executive branch officials and agencies establish a capability for strategic analysis of computer-based threats, including developing a methodology, acquiring expertise, and obtaining infrastructure data. DHS has taken steps towards addressing our recommendations. As we reported in 2005,DHS established various initiatives to enhance its analytical capabilities, including intelligence-sharing through US- CERT and situational awareness tools through the US-CERT Einstein program at selected federal agencies. The Einstein Program provides an automated process for collecting, correlating, analyzing, and sharing computer security information across the federal civilian government. Einstein is currently deployed to nine federal agencies; US-CERT plans to deploy Einstein to an additional 10 to 15 agencies in fiscal year 2008, with a goal of deploying it to all cabinet level and critical independent federal agencies. According to DHS officials, Einstein has greatly reduced the time for the federal government to gather and share critical data on computer security risks (from 5 to 7 days to 4 to 5 hours). Further, the officials stated that Einstein has the potential to reduce data collection and information sharing to under 2 hours, allowing for vast improvements in governmental cyber response and recovery times. If properly implemented and expanded as planned, DHS's efforts in this program could strengthen its cyber threat analysis and warning capability. However, DHS has not yet fully implemented our original recommendations, particularly in implementing such a capability beyond the federal environment. In summary, although agencies report increased compliance with security program activities required by FISMA and federal policy, serious weaknesses persist at federal agencies, and reported incidents are rising. The weaknesses exist, in part, because agencies have not fully implemented their information security programs. Until such programs are fully implemented, agencies will be at increased risk of exposure to cyber attacks. As agencies report record numbers of incidents, inconsistencies in reporting persist. With continued progress in addressing strategic analysis and warnings, DHS's US-CERT can help agencies mitigate the risk associated with incidents. Mr. Chairman, this concludes our statement. We would be happy to answer any questions at this time. Contacts and Acknowledgements: If you have any questions regarding this report, please contact Gregory C. Wilshusen at (202) 512-6244 or email@example.com, or David A. Powner at (202) 512-9286 or firstname.lastname@example.org. Other key contributors to this report include Scott Borre, Barbara Collier, Larry Crosland, Mike Gilmore, Min Hyun, Jeffrey Knott, Jayne Wilson, and Eric Winter. FOOTNOTES  GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.: January 2007).  FISMA was enacted as title III, E-Government Act of 2002, Pub. L. 107-347, 116 Stat. 2946 (Dec. 17, 2002).  FISMA charged the Director of OMB with ensuring the operation of a federal information security center. The required functions are performed by US-CERT, which was established to aggregate and disseminate cybersecurity information to improve warning and response to incidents, increase coordination of response information, reduce vulnerabilities, and enhance prevention and protection.  Reportable conditions are significant deficiencies in the design or operation of internal control that could adversely affect the entity's ability to record, process, summarize, and report financial data consistent with the assertions of management in the financial statements.  A material weakness is a reportable condition that precludes the entity's internal control from providing reasonable assurance that misstatements, losses, or noncompliance material in relation to the financial statements or to stewardship information would be prevented or detected on a timely basis.  OMB requires that agency management officials formally authorize their information systems to process information and accept the risk associated with their operation. This management authorization (accreditation) is to be supported by a formal technical evaluation (certification) of the management, operational, and technical controls established in an information system's security plan.  GAO, Information Security: Agencies Need to Develop and Implement Policies for Periodic Testing, GAO-07-65 (Washington, D.C.: Oct. 20, 2006).  Committee on Government Reform, U.S. House of Representatives, Staff Report: Agency Breaches Since January 1, 2003 (Washington, D.C.: Oct. 13, 2006).  GAO, Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibilities, GAO-05-434 (Washington, D.C.: May 26, 2005).  GAO, Critical Infrastructure Protection: DHS Leadership Needed to Enhance Cybersecurity, GAO-06-1087T (Washington, D.C.: Sept. 13, 2006).