This is the accessible text file for GAO report number GAO-06-527T 
entitled 'Information Security: Federal Agencies Show Mixed Progress in 
Implementing Statutory Requirements' which was released on March 17, 
2006. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

United States Government Accountability Office: 

GAO: 

Testimony: 

Before the House Committee on Government Reform: 

For Release on Delivery: 

Expected at 10:00 a.m. EST Thursday, March 16, 2006: 

Information Security: 

Federal Agencies Show Mixed Progress in Implementing Statutory 
Requirements: 

Statement of Gregory C. Wilshusen, Director, Information Security 
Issues: 

GAO-06-527T: 

GAO Highlights: 

Highlights of GAO-06-527T, a testimony to the House Committee on 
Government Reform: 

Why GAO Did This Study: 

For many years, GAO has reported that ineffective information security 
is a widespread problem that has potentially devastating consequences. 
In its reports to Congress since 1997, GAO has identified information 
security as a governmentwide high-risk issue—most recently in January 
2005. 

Concerned with accounts of attacks on commercial systems via the 
Internet and reports of significant weaknesses in federal computer 
systems that make them vulnerable to attack, Congress passed the 
Federal Information Security Management Act of 2002 (FISMA), which 
permanently authorized and strengthened the federal information 
security program, evaluation, and reporting requirements established 
for federal agencies. 

This testimony discusses: 

* The federal government’s progress and challenges in implementing 
FISMA, as reported by the Office of Management and Budget (OMB), the 
agencies, and the Inspectors General (IGs). 

* Actions needed to improve FISMA reporting and address underlying 
information security weaknesses. 

What GAO Found: 

In its fiscal year 2005 report to Congress, OMB discusses progress in 
implementing key information security requirements, but at the same 
time cites challenging weaknesses that remain. The report notes several 
governmentwide findings, such as the varying effectiveness of agencies’ 
security remediation processes and the inconsistent quality of 
agencies’ certification and accreditation (the process of authorizing 
operation of a system, including the development and implementation of 
risk assessments and security controls). Nevertheless, fiscal year 2005 
data reported by 24 major agencies, compared with data reported for the 
previous 2 fiscal years (see fig.), show that these agencies have made 
steady progress in certifying and accrediting systems, although they 
reported mixed progress in meeting other key statutory information 
security requirements. For example, agencies reported that only 61 
percent of their systems had tested contingency plans, thereby reducing 
assurance that agencies will be able to recover from the disruption of 
those systems with untested plans. 

Federal entities can act to improve the usefulness of the annual FISMA 
reporting process and to mitigate underlying information security 
weaknesses. OMB has taken several actions to improve FISMA 
reporting—such as requiring agencies to provide performance information 
based on the relative importance or risk of the systems—and can further 
enhance the reliability and quality of reported information. Agencies 
also can take actions to fully implement their FISMA-mandated programs 
and address the weaknesses in their information security controls. Such 
actions include completing and maintaining accurate inventories of 
major systems, prioritizing information security efforts based on 
system risk levels, and strengthening controls that are to prevent, 
limit, and detect access to the agencies’ information and information 
systems. 

Reported Data for Selected Performance Measures for 24 Major Agencies 

[See PDF for image] 

[End of figure] 

www.gao.gov/cgi-bin/getrpt?GAO-06-527T. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Gregory C. Wilshusen at 
(202) 512-6244 or wilshuseng@gao.gov. 

[End of section] 

Mr. Chairman and Members of the Committee: 

I am pleased to be here today to discuss the state of federal 
information security and the efforts by federal agencies to implement 
requirements of the Federal Information Security Management Act of 2002 
(FISMA).[Footnote 1] For many years, we have reported that poor 
information security is a widespread problem that has potentially 
devastating consequences.[Footnote 2] Since 1997, we have identified 
information security as a governmentwide high-risk issue in reports to 
Congress.[Footnote 3] Concerned with accounts of attacks on commercial 
systems via the Internet and reports of significant weaknesses in 
federal computer systems that made them vulnerable to attack, Congress 
passed FISMA, which permanently authorized and strengthened the federal 
information security program, evaluation, and reporting requirements 
established for federal agencies. 

In my testimony today, I will summarize our analysis of the reported 
status of the federal government's implementation of FISMA. I will note 
areas where the agencies have made progress in implementing the 
requirements of the Act and those areas where weaknesses remain. I will 
also touch on additional actions that federal entities can take to help 
fully implement the mandated information security programs and to 
improve the effectiveness of information security controls. 

In conducting this work, we reviewed and summarized OMB's fiscal year 
2005 report to Congress on FISMA implementation, dated March 1, 2006. 
We also analyzed and summarized the fiscal year 2005 FISMA reports from 
24 major federal agencies[Footnote 4] and their inspectors general 
(IGs). In addition, we reviewed standards and guidance issued by OMB 
and the National Institute of Standards and Technology (NIST) pursuant 
to their responsibilities under the Act. We did not validate the 
accuracy of the data reported by the agencies or OMB, but we did 
analyze the IGs' fiscal year 2005 FISMA reports to identify any issues 
related to the accuracy of agency-reported information. Finally, we 
examined and summarized key findings of related GAO products. We 
performed our work from October 2005 to March 2006 in accordance with 
generally accepted government auditing standards. 

Results in Brief: 

In its fiscal year 2005 report to Congress, OMB noted that the federal 
government has made progress in meeting key performance measures for 
information security; however, uneven implementation of security 
efforts has left weaknesses in several areas. OMB identified weaknesses 
with the extent of agencies' oversight of contractor systems, testing 
of security controls, and reporting of security incidents, as well as 
the quality of agencies' plans of action and milestones and 
certification and accreditation processes. The report presented a plan 
of action that OMB is pursuing with federal agencies to improve their 
management of information security. 

The fiscal year 2005 reports submitted by the agencies present a mixed 
picture of FISMA implementation in the federal government. In their 
fiscal year 2005 reports, 24 major federal agencies generally reported 
an increasing number of systems meeting key information security 
performance measures, such as percentage of systems certified and 
accredited and percentage of contingency plans tested. Nevertheless, 
progress was uneven. For example, the percentage of agency systems 
reviewed declined from 96 percent in 2004 to 84 percent in 2005, and 
the percentage of employees and contractors receiving security 
awareness training also declined, from 88 percent in 2004 to 81 percent 
in 2005. 

Federal entities can act to improve the usefulness of the annual FISMA 
reporting process and to mitigate underlying information security 
weaknesses. OMB has taken several actions to improve FISMA reporting -
-such as requiring agencies to indicate the relative importance or risk 
level of their systems --and can further enhance the reliability and 
quality of reported information. Agencies can also take actions to 
fully implement their FISMA-mandated programs and address the 
weaknesses in their information security controls. Such actions include 
completing and maintaining accurate inventories of major systems, 
prioritizing information security efforts based on system risk levels, 
and strengthening controls that are designed to prevent, limit, and 
detect access to the agencies' information and information systems. 

Background: 

Increasing computer interconnectivity--most notably growth in the use 
of the Internet--has revolutionized the way that our government, our 
nation, and much of the world communicate and conduct business. While 
this interconnectivity offers us huge benefits, without proper 
safeguards it also poses significant risks to the government's computer 
systems and, more importantly, to the critical operations and 
infrastructures they support. We reported in 2005 that while federal 
agencies showed improvement in addressing information security, they 
also continued to have significant control weaknesses in federal 
computer systems that put federal operations and assets at risk of 
inadvertent or deliberate misuse, financial information at risk of 
unauthorized modification or destruction, sensitive information at risk 
of inappropriate disclosure, and critical operations at the risk of 
disruption.[Footnote 5] 

The significance of these weaknesses led us to conclude in the audit of 
the federal government's fiscal year 2005 financial statements[Footnote 
6] that information security was a material weakness.[Footnote 7] Our 
audits also identified instances of similar types of weaknesses in non- 
financial systems. 

To fully understand the significance of the weaknesses we identified, 
it is necessary to link them to the risks they present to federal 
operations and assets. Virtually all federal operations are supported 
by automated systems and electronic data, and agencies would find it 
difficult, if not impossible, to carry out their missions and account 
for their resources without these information assets. Hence, the degree 
of risk caused by security weaknesses is high. The weaknesses we 
identified place a broad array of federal operations and assets at 
risk. For example, 

* Resources, such as federal payments and collections, could be lost or 
stolen. 

* Computer resources could be used for unauthorized purposes or to 
launch attacks on other computer systems. 

* Sensitive information, such as taxpayer data, social security 
records, medical records, and proprietary business information could be 
inappropriately disclosed, browsed, or copied for purposes of 
industrial espionage or other types of crime. 

* Critical operations, such as those supporting national defense and 
emergency services, could be disrupted. 

* Data could be modified or destroyed for purposes of fraud, identity 
theft, or disruption. 

* Agency missions could be undermined by embarrassing incidents that 
result in diminished confidence in federal organizations' abilities to 
conduct operations and fulfill their fiduciary responsibilities. 

Congress and the administration have established specific information 
security requirements, in both law and policy, to help protect the 
information and information systems that support these critical 
operations and assets. 

FISMA Authorized and Strengthened Information Security Requirements: 

Enacted into law on December 17, 2002, as title III of the E-Government 
Act of 2002, FISMA authorized and strengthened information security 
program, evaluation, and reporting requirements. The Act assigns 
specific responsibilities to agency heads, chief information officers, 
and IGs. It also assigns responsibilities to OMB, which include 
developing and overseeing the implementation of policies, principles, 
standards, and guidelines on information security and reviewing at 
least annually, and approving or disapproving, agency information 
security programs. 

Overall, FISMA requires each agency (including agencies with national 
security systems) to develop, document, and implement an agencywide 
information security program. This program should provide security for 
the information and information systems that support the operations and 
assets of the agency, including those provided or managed by another 
agency, contractor, or other source. Specifically, this program is to 
include: 

* periodic assessments of the risk and magnitude of harm that could 
result from the unauthorized access, use, disclosure, disruption, 
modification, or destruction of information or information systems; 

* risk-based policies and procedures that cost-effectively reduce 
information security risks to an acceptable level and ensure that 
information security is addressed throughout the life cycle of each 
information system, including minimally acceptable system configuration 
requirements; 

* subordinate plans for providing adequate information security for 
networks, facilities, and systems or groups of information systems; 

* security awareness training for agency personnel, including 
contractors and other users of information systems that support the 
operations and assets of the agency; 

* periodic evaluation of the effectiveness of information security 
policies, procedures, and practices, performed with a frequency 
depending on risk, but no less than annually, and that includes testing 
of management, operational, and technical controls for every system 
identified in the agency's required inventory of major information 
systems; 

* a process for planning, implementing, evaluating, and documenting 
remedial action to address any deficiencies in the information security 
policies, procedures, and practices of the agency; 

* procedures for detecting, reporting, and responding to security 
incidents; and: 

* plans and procedures to ensure continuity of operations for 
information systems that support the operations and assets of the 
agency. 

FISMA also established a requirement that each agency develop, 
maintain, and annually update an inventory of major information systems 
(including major national security systems) that are operated by the 
agency or under its control. This inventory is to include an 
identification of the interfaces between each system and all other 
systems or networks, including those not operated by or under the 
control of the agency. 

Each agency is also required to have an annual independent evaluation 
of its information security program and practices, including control 
testing and compliance assessment. Evaluations of non-national security 
systems are to be performed by the agency IG or by an independent 
external auditor, while evaluations related to national security 
systems are to be performed only by an entity designated by the agency 
head. The agencies are to report annually to OMB, selected 
congressional committees, and the Comptroller General on the adequacy 
of information security policies, procedures, practices, and compliance 
with FISMA requirements. In addition, agency heads are required to make 
annual reports of the results of their independent evaluations to OMB. 
OMB must submit a report to Congress no later than March 1 of each year 
on agency compliance, including a summary of the findings of agencies' 
independent evaluations. 

Other major provisions direct that the National Institute of Standards 
and Technology (NIST) develop, for systems other than national security 
systems: (1) standards to be used by all agencies to categorize all 
their information and information systems based on the objectives of 
providing appropriate levels of information security according to a 
range of risk levels; (2) guidelines recommending the types of 
information and information systems to be included in each category; 
and (3) minimum information security requirements for information and 
information systems in each category. NIST must also develop a 
definition of and guidelines concerning detection and handling of 
information security incidents and guidelines. 

OMB Reporting Instructions and Guidance Emphasize Performance Measures: 

OMB provides instructions to the agencies and their IGs on the annual 
FISMA reporting requirements. OMB's fiscal year 2005 reporting 
instructions, similar to the 2004 instructions, have a strong focus on 
performance measures. OMB has developed performance measures in the 
following areas: 

* certification and accreditation,[Footnote 8] 

* testing of security controls, 

* agency systems and contractor systems reviewed annually, 

* testing of contingency plans, 

* incident reporting, 

* annual security awareness training for employees and contractors, 

* annual specialized training for employees with significant security 
responsibilities, and: 

* minimally acceptable configuration requirements. 

Further, OMB has provided instructions for continued agency reporting 
on the status of remediation efforts through plans of action and 
milestones. Required for all programs and systems where an IT security 
weakness has been found, these plans list the weaknesses and show 
estimated resource needs or other challenges to resolving them, key 
milestones and completion dates, and the status of corrective actions. 
The plans are to be submitted twice a year to OMB. In addition, 
agencies are to submit quarterly updates that indicate the number of 
weaknesses for which corrective action has been completed as originally 
scheduled, or has been delayed, as well as the number of new weaknesses 
discovered since the last update. 

The annual IGs' reports requested by OMB are to be based on the results 
of their independent evaluations, including work performed throughout 
the reporting period (such as work performed as part of the annual 
financial audits of the agencies). While OMB asked the IGs to respond 
to some of the same questions as the agencies, it also asked them to 
assess whether their agency had developed, implemented, and was 
managing an agencywide plan of actions and milestones. Further, OMB 
asked the IGs to assess the quality of the certification and 
accreditation process at their agencies, as well as the status of their 
agency's inventory of major information systems. OMB did not request 
that the IGs validate agency responses to the performance measures. 
Instead, as part of their independent evaluations of a subset of agency 
systems, IGs were asked to assess the reliability of the data for those 
systems that they evaluated. 

OMB's Report to Congress Noted Improvements and Weaknesses: 

In its March 2006 report to Congress on fiscal year 2005 FISMA 
implementation,[Footnote 9] OMB emphasized that the federal government 
has made progress in meeting key performance measures for IT security; 
however, uneven implementation of security efforts leaves weaknesses in 
several areas. OMB determined through its assessment of FISMA reports 
that advances have occurred at a governmentwide level in the following 
areas of IT security: 

* Systems certification and accreditation. Agencies recorded a 19 
percent increase in the total number of IT systems and reported that 
the percentage of certified and accredited systems rose from 77 percent 
in fiscal year 2004 to 85 percent in 2005. Moreover, OMB noted that 88 
percent of systems assessed as high-risk have been certified and 
accredited. 

* Assessed quality of the certification and accreditation process. 
OMB's analysis of reports from the IGs revealed an increase in agencies 
with a certification process rated as "satisfactory" or higher, from 15 
in 2004 to 17 in 2005. 

* Plans of action and milestone process. OMB noted that out of 25 
agencies that it reviewed in detail,[Footnote 10] 19 IGs report that 
their agencies have effective remediation processes, compared to 18 in 
2004. 

In addition to these areas of improvement, OMB detected areas with 
continuing weaknesses: 

* Contractor systems oversight. IGs for 6 of 24 agencies (one agency IG 
did not respond) rated agency oversight of contractor systems in the 
"rarely" range, while 3 others rated this oversight in the next lowest 
range, "sometimes." 

* Security controls testing. Agencies tested the security controls on a 
lower percentage of systems, dropping from 76 percent in fiscal year 
2004 to 72 percent in 2005. OMB noted a better rate of testing for high-
risk systems, with a governmentwide total of 83 percent. 

* Incident reporting. OMB stated that some agencies continue to report 
security incidents to the Department of Homeland Security only 
sporadically and that others report notably low levels of incidents. 

* Agencywide plans of action and milestones. While IGs for 19 agencies 
reported effective POA&M processes, 6 others reported ineffective 
processes. 

* Certification and accreditation process. OMB commented that while no 
IG rated the certification and accreditation process for its agency as 
failing, eight rated the process as "poor." 

The OMB report also discusses a plan of action to improve performance, 
assist agencies in their information security activities, and promote 
compliance with statutory and policy requirements. OMB has set a goal 
for agencies to have 90 percent of their systems certified and 
accredited and their certification and accreditation process rated as 
"satisfactory" or better by their IGs. 

Agency 2005 FISMA Reports Show Mixed Results: 

In their FISMA-mandated reports for fiscal year 2005, the 24 major 
agencies reported both improvements and weaknesses in major performance 
indicators. The following key measures showed increased performance 
and/or continuing challenges: 

* percentage of systems certified and accredited; 

* percentage of agencies with an agencywide minimally acceptable 
configuration requirements policy; 

* percentage of agency systems reviewed annually; 

* percentage of contractor systems reviewed annually; 

* percentage of employees and contractors receiving annual security 
awareness training; 

* percentage of employees with significant security responsibilities 
receiving specialized security training annually; and: 

* percentage of contingency plans tested. 

Figure 1 illustrates that the major agencies have made steady progress 
in fiscal year 2005 certifying and accrediting their systems, although 
they have made mixed progress in meeting other key performance measures 
compared with the previous two fiscal years. Summaries of the results 
for specific measures follow. 

Figure 1: Reported Data for Selected Performance Measures for 24 Major 
Agencies: 

[See PDF for image] 

[End of figure] 

Certification and Accreditation: 

Included in OMB's policy for federal information security is a 
requirement that agency management officials formally authorize their 
information systems to process information and, thereby accept the risk 
associated with their operation. This management authorization 
(accreditation) is to be supported by a formal technical evaluation 
(certification) of the management, operational, and technical controls 
established in an information system's security plan. For FISMA 
reporting, OMB requires agencies to report the number of systems 
authorized for processing after completing certification and 
accreditation. 

Data reported for this measure showed continued overall increases for 
most agencies over the last three years. For example, 15 agencies 
reported an increase in the percentage of their systems that had 
completed certification and accreditation. Overall, 85 percent of 
agencies' systems governmentwide were reported as certified and 
accredited in 2005, compared to 77 percent in 2004 and 62 percent in 
2003. In addition, 20 agencies reported that 90 percent or more of 
their systems had successfully completed the process, as illustrated in 
figure 2. 

Figure 2: Percentage of Agencies Reporting the Percentage of Their 
Systems that are Certified and Accredited for Processing in Fiscal Year 
2005: 

[See PDF for image] 

[End of figure] 

Agencies appeared to appropriately focus their certification and 
accreditation efforts on high-risk systems. Agencies certified and 
accredited a higher percentage of their high-risk systems (88 percent) 
than their moderate-risk systems. 

Configuration Management: 

FISMA requires each agency to have policies and procedures that ensure 
compliance with minimally acceptable system configuration requirements, 
as determined by the agency. In fiscal year 2004, for the first time, 
agencies reported on the degree to which they had security 
configurations for specific operating systems and software 
applications. Our analysis of the 2005 agency FISMA reports found that 
all 24 major agencies reported that they had agencywide policies 
containing system configurations, an increase from the 20 agencies who 
reported having them in 2004. However, implementation of these 
requirements at the system level continues to be uneven. Specifically, 
14 agencies reported having system configuration policies, but they did 
not always implement them on their systems. 

Annual Review of Agency Systems: 

FISMA requires that agency information security programs include 
periodic testing and evaluation of the effectiveness of information 
security policies, procedures, and practices to be performed with a 
frequency that depends on risk, but no less than annually. This effort 
is to include testing of management, operational, and technical 
controls of every information system identified in the FISMA-required 
inventory of major systems. Periodically evaluating the effectiveness 
of security policies and controls and acting to address any identified 
weaknesses are fundamental activities that allow an organization to 
manage its information security risks cost-effectively, rather than 
reacting to individual problems ad hoc only after a violation has been 
detected or an audit finding has been reported. In order to measure the 
performance of security programs, OMB requires that agencies report the 
number and percentage of systems that they have reviewed during the 
year. 

Agencies reported a decrease in the percentage of their systems that 
underwent an annual review in 2005, after reporting major gains in this 
performance measure in 2004. In the 2005 reports, agencies stated that 
84 percent of their systems had been reviewed in the last year, as 
compared to 96 percent in 2004. While 23 agencies reported that they 
had reviewed 90 percent or more of their systems in 2004, 19 agencies 
reported this achievement in 2005, as shown in figure 3. 

Figure 3: Percentage of Agencies Reporting the Percentage of Their 
Systems that have been Reviewed in Fiscal Year 2005: 

[See PDF for image] 

[End of figure] 

Annual Review of Contractor Systems: 

Under FISMA, agency heads are responsible for providing information 
security protections for information collected or maintained by or on 
behalf of the agency and information systems used or operated by an 
agency or by a contractor. As OMB emphasized in its fiscal year 2005 
FISMA reporting guidance, agency IT security programs apply to all 
organizations that possess or use federal information or that operate, 
use, or have access to federal information systems on behalf of a 
federal agency. Such other organizations may include contractors, 
grantees, state and local governments, and industry partners. According 
to longstanding OMB policy concerning sharing government information 
and interconnecting systems, federal security requirements continue to 
apply, and the agency is responsible for ensuring appropriate security 
controls. 

The key performance measure of annual review of contractor systems by 
agencies decreased from 83 percent in 2004 to 74 percent in 2005, 
reducing the rate of reviews performed to below 2003 levels. However, 
the number of agencies that reported reviewing over 90 percent of their 
contractor systems has increased from 10 in 2004 to 17 in 2005. A 
breakdown of the percentages for fiscal year 2005 is provided in figure 
4. 

Figure 4: Percentage of Agencies Reporting the Percentage of Their 
Contractor Systems that have been Reviewed in Fiscal Year 2005: 

[See PDF for image] 

[End of figure] 

Although agencies reported that 74 percent of their contractor systems 
were reviewed in 2005, they only reviewed 51 percent of the contractor 
systems assessed as high-risk, as opposed to 89 percent of moderate- 
risk systems and 84 percent of low-risk systems. Without adequate 
contractor review, agencies cannot be assured that federal information 
held and processed by contractors is secure. 

Security Awareness Training: 

FISMA requires agencies to provide security awareness training. This 
training should inform personnel, including contractors and other users 
of information systems supporting the operations and assets of an 
agency, of information security risks associated with their activities 
and of the agency's responsibilities in complying with policies and 
procedures designed to reduce these risks. Our studies of best 
practices at leading organizations[Footnote 11] have shown that such 
organizations took steps to ensure that personnel involved in various 
aspects of information security programs had the skills and knowledge 
they needed. 

In their FISMA submissions for fiscal year 2005, agencies reported that 
they provided security awareness training to the majority of their 
employees and contractors. However, while 19 agencies reported that 
they had trained more than 90 percent of their employees and 
contractors in basic security awareness (see fig. 5), the overall 
percentage of employees trained among the 24 major federal agencies 
reviewed dropped from 88 percent in 2004 to 81 percent in 2005, a level 
almost equal to that reported in 2003. 

Figure 5: Percentage of Agencies Reporting the Level of Their Employees 
and Contractors that have Received IT Security Awareness Training in 
Fiscal Year 2005: 

[See PDF for image] 

[End of figure] 

Specialized Security Training: 

Under FISMA, agencies are required to provide training in information 
security to personnel with significant security responsibilities. As 
previously noted, our study of best practices at leading organizations 
has shown that such organizations recognized that staff expertise 
needed to be updated frequently to keep security employees current on 
changes in threats, vulnerabilities, software, technologies, security 
techniques, and security monitoring tools. OMB directs agencies to 
report on the percentage of their employees with significant security 
responsibilities who have received specialized training. 

Agencies reported varying levels of compliance in providing specialized 
training to employees with significant security responsibilities. Of 
the 24 agencies that we reviewed, 12 reported that they had provided 
specialized security training for 90 percent or more of these 
employees. (see fig. 6). 

Figure 6: Percentage of Agencies Reporting the Level of Their Employees 
with Significant Security Responsibilities that have Received 
Specialized Security Training in Fiscal Year 2005: 

[See PDF for image] 

[End of figure] 

Although there was a gain of one point in the percentage of employees 
who received specialized security training for fiscal year 2005 (82 
percent) over 2004 (81 percent), both of these years show a decrease 
from the level reported in 2003 (85 percent). Given the rapidly 
changing threats in information security, agencies need to keep their 
IT security employees up to date on changes in technology. Otherwise, 
agencies may face increased risk of security breaches. 

Testing of Contingency Plans: 

Contingency plans provide specific instructions for restoring critical 
systems, including such elements as arrangements for alternative 
processing facilities in case the usual facilities are significantly 
damaged or cannot be accessed due to unexpected events such as a 
temporary power failure, the accidental loss of files, or a major 
disaster. It is important that these plans be clearly documented, 
communicated to potentially affected staff, and updated to reflect 
current operations. The testing of contingency plans is essential to 
determining whether the plans will function as intended in an 
emergency, and the frequency of plan testing will vary depending on the 
criticality of the entity's operations. The most useful tests involve 
simulating a disaster to test overall service continuity. Such a test 
includes testing whether the alternative data processing site will 
function as intended and whether critical computer data and programs to 
be recovered from off-site storage will be accessible and current. In 
executing the plan, managers are able to identify weaknesses and make 
changes accordingly. Moreover, such tests assess how well employees 
have been trained to carry out their roles and responsibilities during 
a disaster. To show the status of implementing this requirement, OMB 
specifies that agencies report the number of systems with tested 
contingency plans. 

Overall, agencies continued to report that they have not tested a 
significant number of their contingency plans with only 61 percent of 
systems with tested plans. Although this number continues to show small 
increases each year since 2003, figure 7 illustrates that 5 agencies 
reported less than 50 percent of their systems had tested contingency 
plans. 

Figure 7: Percentage of Agencies Reporting the Level of Their Systems 
that have Tested Contingency Plans in Fiscal Year 2005: 

[See PDF for image] 

[End of figure] 

In addition, agencies do not appear to be appropriately prioritizing 
testing of contingency plans by system risk level, with high-risk 
systems having the lowest rate of systems with tested plans of the 
three risk levels. Without testing, agencies can have limited assurance 
that they will be able to recover mission critical applications, 
business processes, and information in the event of an unexpected 
interruption. 

Inventory of Major Systems: 

FISMA requires that agencies develop, maintain, and annually update an 
inventory of major information systems operated by the agency, or under 
its control. The total number of agency systems is a key element in 
OMB's performance measures, in that agency progress is indicated by the 
percentage of total systems that meet specific information security 
requirements. For the 2005 reports, OMB required agencies to report the 
number of major systems and asked the IGs about the status and accuracy 
of their agencies' inventories. 

In 2005, agencies reported 10,261 systems, composed of 9,175 agency 
systems and 1,094 contractor systems. However, only 13 IGs reported 
that their agencies' inventories were substantially complete. A 
complete inventory of major information systems is a key element of 
managing the agency's IT resources, including the security of those 
resources. Without reliable information on agencies' inventories, the 
agencies, the administration, and Congress cannot be fully assured of 
agencies' progress in implementing FISMA. 

Risk Assessments: 

FISMA mandates that agencies assess the risk and magnitude of harm that 
could result from the unauthorized access, use, disclosure disruption, 
modification, or destruction of their information and information 
systems. The Federal Information Processing Standard (FIPS) 199, 
Standards for Security Categorization of Federal Information and 
Information Systems, and related NIST guidance provide a common 
framework for categorizing systems according to risk. The framework 
establishes three levels of potential impact on organizational 
operation, assets, or individuals should a breach of security occur-- 
high (severe or catastrophic), moderate (serious), and low (limited)-- 
and is used to determine the impact for each of the FISMA-specified 
security objectives of confidentiality, integrity, and availability. 
Once determined, security categories are to be used in conjunction with 
vulnerability and threat information in assessing the risk to an 
organization. OMB's fiscal year 2005 reporting instructions included 
the new requirement that agencies report their systems and certain 
performance measures using FIPS 199 risk levels. If agencies did not 
categorize systems, or used a method other than FIPS 199 to determine 
risk level, they were required to explain why in their FISMA reports. 

For the first time, in the 2005 reporting, agencies reported the risk 
levels for their agency and contractor systems, as illustrated in table 
1. 

Figure 8: Systems Reported by Risk Level in Fiscal year 2005: 

[See PDF for image] 

Source: GAO analysis. 

[End of table] 

Agencies reported that 9 percent of their systems were not categorized 
by risk level. The majority of systems without risk levels assigned 
were found at 4 agencies. One agency did not categorize 77 percent of 
its systems. Without assigned risk levels, agencies cannot make risk- 
based decisions on the security needs of their information and 
information systems. 

Actions are Needed to Improve FISMA Reporting and Underlying 
Information Security Weaknesses: 

There are actions that OMB and the agencies can take to improve FISMA 
reporting and compliance and to address underlying weaknesses in 
information security controls. In our July 2005 report,[Footnote 12] we 
evaluated the adequacy and effectiveness of agencies' information 
security policies and practices and the federal government's 
implementation of FISMA requirements. We recommended that the Director 
of OMB take actions in revising future FISMA reporting instructions to 
increase the usefulness of the agencies' annual reports to oversight 
bodies by: 

* requiring agencies to report FISMA data by risk category; 

* reviewing guidance to ensure the clarity of instructions; 

* requesting the IGs report on the quality of additional agency 
processes, such as the annual system reviews. 

These recommendations were designed to strengthen reporting under FISMA 
by encouraging more complete information on the implementation of 
agencies' information security programs. 

Consistent with our recommendation, OMB required agencies to report 
certain performance measures by system risk level for the first time in 
fiscal year 2005. As a result, we were able to identify potential areas 
of concern in the agencies' implementation of FISMA. For example, 
agencies do not appear to be prioritizing certain information security 
control activities, such as annual review of contractor systems or 
testing of contingency plans, based on system risk levels. For both of 
these activities, federal implementation of the control is lower for 
high-risk systems than it is for moderate or low-risk systems. 

OMB has also taken steps to increase the clarity of instructions in 
their annual guidance. It has removed several questions from prior 
years that could have been subject to differing interpretations by the 
IGs and the agencies. Those questions related to agency inventories and 
to plans of actions and milestones. In addition, OMB clarified 
reporting instructions for minimally acceptable configuration 
requirements. The resulting reports are more consistent and, therefore, 
easier to analyze and compare. 

However, opportunities still exist to enhance reporting on the quality 
of the agencies' information security-related processes. The 
qualitative assessments of the certification and accreditation process 
and the plans of actions and milestones have greatly enhanced 
Congress', OMB's, and our understanding of the implementation of these 
requirements at the agencies. Additional information on the quality of 
agencies' processes for annually reviewing or testing systems, for 
example, could improve understanding of these processes by examining 
whether federal guidance is applied correctly, or whether weaknesses 
discovered during the review or test are tracked for remediation. 
Extending qualitative assessments to additional agency processes could 
improve the information available on agency implementation of 
information security requirements. 

Federal Agencies Need to Take Actions to Increase FISMA Compliance and 
Address Already Identified Information Security Weaknesses: 

Agencies need to take action to implement the information security 
management program mandated by FISMA and use that program to address 
their outstanding information security weaknesses. An agencywide 
security program provides a framework and continuing cycle of 
activities for managing risk, developing security policies, assigning 
responsibilities, and monitoring the adequacy of the entity's computer- 
related controls. Without a well-designed program, security controls 
may be inadequate; responsibilities may be unclear, misunderstood, or 
improperly implemented; and controls may be inconsistently applied. 
Such conditions may lead to insufficient protection of sensitive or 
critical resources and disproportionately high expenditures for 
controls over low-risk resources. 

As we have previously reported,[Footnote 13] none of the 24 major 
agencies has fully implemented agencywide information security programs 
as required by FISMA. Agencies often did not adequately assess risks, 
develop sufficient risk-based policies or procedures for information 
security, ensure that existing policies and procedures were implemented 
effectively, or monitor operations to ensure compliance and determine 
the effectiveness of existing controls. Moreover, as demonstrated by 
the 2005 FISMA reports, many agencies still do not have complete and 
accurate inventories of their major systems. Until agencies effectively 
and fully implement agencywide information security programs, federal 
data and systems will not be adequately safeguarded against 
unauthorized use, disclosure, and modification. 

Agencies need to take action to implement and strengthen their 
information security management programs. Such actions should include 
completing and maintaining an accurate, complete inventory of major 
systems, and prioritizing information security efforts based on system 
risk levels. Strong incident procedures are necessary to detect, 
report, and respond to security incidents effectively. Agencies also 
should implement strong remediation processes that include processes 
for planning, implementing, evaluating, and documenting remedial 
actions to address any identified information security weaknesses. 
Finally, agencies need to implement risk-based policies and procedures 
that efficiently and effectively reduce information security risks to 
an acceptable level. 

Even as federal agencies are working to implement information security 
management programs, they continue to have significant control 
weaknesses in their computer systems that threaten the integrity, 
reliability, and availability of federal information and systems. In 
addition, these weaknesses place financial information at risk of 
unauthorized modification or destruction, sensitive information at risk 
of inappropriate disclosure, and critical operations at risk of 
disruption. 

The weaknesses appear in both access controls and other information 
security controls defined in our audit methodology for performing 
information security evaluations and audits.[Footnote 14] These areas 
are (1) access controls, which ensure that only authorized individuals 
can read, alter, or delete data; (2) software change controls, which 
provide assurance that only authorized software programs are 
implemented; (3) segregation of duties, which reduces the risk that one 
individual can independently perform inappropriate actions without 
detection; (4) continuity of operations planning, which provides for 
the prevention of significant disruptions of computer-dependent 
operations, and (5) an agencywide security program, which provides the 
framework for ensuring that risks are understood and that effective 
controls are selected and properly implemented. 

In the 24 major agencies' fiscal year 2005 reporting regarding their 
financial systems, 6 reported information security as a material 
weakness and 14 reported it as a reportable condition.[Footnote 15] Our 
audits also identified similar weaknesses in nonfinancial systems. In 
our prior reports, we have made specific recommendations to the 
agencies to mitigate identified information security weaknesses. The 
IGs have also made specific recommendations as part of their 
information security review work. 

Agencies Should Address Weaknesses in Access Controls: 

Agencies would benefit from addressing common weaknesses in access 
controls. As we have previously reported, the majority of the 24 major 
agencies had access control weaknesses.[Footnote 16] A basic management 
control objective for any organization is to protect data supporting 
its critical operations from unauthorized access, which could lead to 
improper modification, disclosure, or deletion of the data. Based on 
our previous work performing information security audits, agencies can 
take steps to enhance the four basic areas of access controls: 

* User identification and authentication. To enable a computer system 
to identify and differentiate users so that activities on the system 
can be linked to specific individuals, agencies assign unique user 
accounts to specific users, a process called identification. 
Authentication is the method or methods by which a system establishes 
the validity of a user's claimed identity. Agencies need to implement 
strong user identification and authentication controls. 

* User access rights and file permissions. The concept of "least 
privileged" is a basic underlying principle for security computer 
systems and data. It means that users are only granted those access 
rights and file permissions that they need to do their work. Agencies 
would benefit from establishing the concept of least privilege as the 
basis for all user rights and permissions. 

* Network services and devices. Sensitive programs and information are 
stored on networks, which are collections of interconnected computer 
systems and devices that allow users to share resources. Organizations 
secure their networks, in part, by installing and configuring networks 
devices that permit authorized requests and limit services that are 
available.[Footnote 17] Agencies need to put in place strong controls 
that ensure only authorized access to their networks. 

* Audit and monitoring of security-related events. To establish 
individual accountability, monitor compliance with security policies, 
and investigate security violations, it is crucial that agencies 
implement system or security software that provides an audit trail that 
they can use to determine the source of a transaction, or to monitor 
the activities of users on the agencies' systems. To detect and prevent 
unauthorized activity, agencies should have strong monitoring and 
auditing capabilities. 

Agencies Need to Act to Implement Other Information Security Controls: 

In addition to electronic access controls, other important controls 
should be in place to ensure the security and reliability of an 
agency's data. 

* Software change controls. Counteracting identified weaknesses in 
software change controls would help agencies ensure that software was 
updated correctly and that changes to computer systems were properly 
approved. Software change controls ensure that only authorized and 
fully tested software is placed in operation. These controls --which 
also limit and monitor access to powerful programs and sensitive files 
associated with computer operations --are important in providing 
reasonable assurance that access controls are not compromised and that 
the system will not be impaired. These policies, procedures, and 
techniques help to ensure that all programs and program modifications 
are properly authorized, tested, and approved. Failure to implement 
these controls increases the risk that unauthorized programs or changes 
could be --inadvertently or deliberately --placed into operation. 

* Segregation of duties. Agencies have opportunities to implement 
effective segregation of duties to address the weaknesses identified in 
this area. Segregation of duties refers to the policies, procedures, 
and organizational structure that help to ensure that one individual 
cannot independently control all key aspects of a process or computer- 
related operation and thereby conduct unauthorized actions or gain 
unauthorized access to assets or records. Proper segregation of duties 
is achieved by dividing responsibilities among two or more individuals 
or organizational groups. For example, agencies need to segregate 
duties to ensure that individuals cannot add fictitious users to a 
system, assign them elevated access privileges, and perform 
unauthorized activities without detection. Without adequate segregation 
of duties, there is an increased risk that erroneous or fraudulent 
transactions can be processed, improper program changes implemented, 
and computer resources damaged or destroyed. 

* Continuity of operations. The majority of agencies could benefit from 
having adequate continuity of operations planning. An organization must 
take steps to ensure that it is adequately prepared to cope with the 
loss of operational capabilities due to earthquake, fire, accident, 
sabotage, or any other disruption. An essential element in preparing 
for such catastrophes is an up-to-date, detailed, and fully tested 
continuity of operations plan. To ensure that the plan is complete and 
fully understood by all key staff, it should be tested, including 
surprise tests, and test plans and results documented to provide a 
basis for improvement. Among the aspects of continuity planning that 
agencies need to address should be: (1) ensuring that plans contain 
adequate contact information for emergency communications; (2) 
documenting the location of all vital records for the agencies and 
methods of updating those records in an emergency; (3) conducting 
tests, training, or exercises frequently enough to have assurance that 
the plan would work in an emergency. Losing the capability to process, 
retrieve, and protect information that is maintained electronically can 
significantly affect an agency's ability to accomplish its mission. 

* Physical security. Physical security controls are important for 
protecting computer facilities and resources from espionage, sabotage, 
damage, and theft. These controls restrict physical access to computer 
resources, usually by limiting access to the buildings and rooms in 
which the resources are housed. With inadequate physical security, 
there is increased risk that unauthorized individuals could gain access 
to sensitive computing resources and data and inadvertently or 
deliberately misuse or destroy them. 

In summary, through the continued emphasis of information security by 
Congress, the administration, agency management, and the accountability 
community, the federal government has seen improvements in its 
information security. However, despite the advances shown by increases 
in key performance measures, progress remains mixed. If information 
security is to continue to improve, agency management must remain 
committed to the implementation of FISMA and the information security 
management program it mandates. Only through the development of strong 
IT security management can the agencies address the persistent, long- 
standing weaknesses they face in information security controls. 

Mr. Chairman, this concludes my statement. I would be happy to answer 
any questions that you or members of the Committee may have at this 
time. Should you have any questions about this testimony, please 
contact me at (202) 512-6244. I can also be reached by e-mail at 
wilshuseng@gao.gov. Individuals making key contributions to this 
testimony include Suzanne Lightman, Assistant Director, Larry Crosland, 
Joanne Fiorino, and Mary Marshall. 

FOOTNOTES 

[1] Federal Information Security Management Act of 2002, Title III, E- 
Government Act of 2002, Pub. L. No. 107-347, Dec. 17, 2002 

[2] GAO, Information Security: Opportunities for Improved OMB Oversight 
of Agency Practices, GAO/AIMD-96-110 (Washington, D.C.: Sept. 24, 1996) 

[3] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.: 
Jan., 2005). 

[4] These 24 departments and agencies are the Departments of 
Agriculture, Commerce, Defense, Education, Energy, Health and Human 
Services, Homeland Security, Housing and Urban Development, Interior, 
Justice, Labor, State, Transportation, Treasury, and, Veterans Affairs, 
the Environmental Protection Agency, General Services Administration, 
Office of Personnel Management, National Aeronautics and Space 
Administration, National Science Foundation, Nuclear Regulatory 
Commission, Small Business Administration, Social Security 
Administration, and U.S. Agency for International Development. 

[5] GAO, Information Security: Weaknesses Persist at Federal Agencies 
Despite Progress Made in Implementing Related Statutory Requirements, 
GAO-05-552 (Washington, D.C.: July 15, 2005). 

[6] GAO, Fiscal Year 2005 U.S. Government Financial Statements: 
Sustained Improvement and Financial Management is Crucial to Addressing 
our Nation's Financial Conditions and Long-term Fiscal Imbalance, GAO- 
06-406T (Washington, D.C.: March 1, 2006). 

[7] A material weakness is a condition that precludes the entity's 
internal control from providing reasonable assurance that 
misstatements, losses, or noncompliance material in relation to the 
financial statements or to stewardship information would be prevented 
or detected on a timely basis. 

[8] Agency management officials are required to formally authorize 
their information systems to process information and, thereby accept 
the risk associated with their operation. This management authorization 
(accreditation) is to be supported by a formal technical evaluation 
(certification) of the management, operational, and technical controls 
established in an information system's security plan. 

[9] Office of Management and Budget, FY2005 Report to Congress on the 
Implementation of the Federal Information Security Management Act of 
2002 (Washington, D.C.: March, 2006). 

[10] OMB includes the Smithsonian Institution in its list of major 
agencies. Our analysis in this testimony does not include the 
Smithsonian Institution. 

[11] GAO, Executive Guide: Information Security Management: Learning 
From Leading Organizations, GAO/AIMD-98-68 (May, 1998). 

[12] GAO-05-552 

[13] GAO-05-552 

[14] GAO, Federal Information System Controls Audit Manual, GAO/AIMD- 
12.19.6 (Washington, D.C.: January 1999). This methodology is used for 
our information security controls evaluations and audits, as well as by 
the IGs for the information security control work done as part of 
financial audits at the agencies. 

[15] Reportable conditions are significant deficiencies in the design 
or operation of internal control that could adversely affect the 
entity's ability to record, process, summarize, and report financial 
data consistent with the assertions of management in the financial 
statements. 

[16] GAO-05-552 

[17] Devices used to secure networks include (1) firewalls that prevent 
unauthorized access to the network; (2) routers that filter and forward 
data; (3) switches that forward information through segments of a 
network; and, (4) servers that host applications and data.