This is the accessible text file for GAO report number GAO-05-712 
entitled 'Information Security: Progress Made, but Federal Aviation 
Administration Needs to Improve Controls over Air Traffic Control 
Systems' which was released on September 26, 2005. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to Congressional Requesters: 

August 2005: 

Information Security: 

Progress Made, but Federal Aviation Administration Needs to Improve 
Controls over Air Traffic Control Systems: 

[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-712]: 

GAO Highlights: 

Highlights of GAO-05-712, a report to congressional requesters: 

Why GAO Did This Study: 

The Federal Aviation Administration (FAA) performs critical functions 
that contribute to ensuring safe, orderly, and efficient air travel in 
the national airspace system. To that end, it operates and relies 
extensively on an array of interconnected automated information systems 
and networks that comprise the nation’s air traffic control systems. 
These systems provide information to air traffic controllers and 
aircraft flight crews to help ensure the safe and expeditious movement 
of aircraft. Interruptions of service by these systems could have a 
significant adverse impact on air traffic nationwide. 

Effective information security controls are essential for ensuring that 
the nation’s air traffic control systems are adequately protected from 
inadvertent or deliberate misuse, disruption, or destruction.
Accordingly, GAO was asked to evaluate the extent to which FAA has 
implemented information security controls for these systems. 

What GAO Found: 

FAA has made progress in implementing information security for its air 
traffic control information systems; however, GAO identified 
significant security weaknesses that threaten the integrity, 
confidentiality, and availability of FAA’s systems—including weaknesses 
in controls that are designed to prevent, limit, and detect access to 
these systems. The agency has not adequately managed its networks, 
software updates, user accounts and passwords, and user privileges, nor 
has it consistently logged security-relevant events. Other information 
security controls—including physical security, background 
investigations, segregation of duties, and system changes—also 
exhibited weaknesses, increasing the risk that unauthorized users could 
breach FAA’s air traffic control systems, potentially disrupting 
aviation operations. While acknowledging these weaknesses, agency 
officials stated that the possibilities for unauthorized access were 
limited, given that the systems are in part custom built and that they 
run on older equipment that employs special-purpose operating systems, 
proprietary communication interfaces, and custom-built software. 
Nevertheless, the proprietary features of these systems cannot fully 
protect them from attacks by disgruntled current or former employees 
who are familiar with these features, nor will they keep out more 
sophisticated hackers. 

A key reason for the information security weaknesses that GAO 
identified in FAA’s air traffic control systems is that the agency had 
not yet fully implemented its information security program to help 
ensure that effective controls were established and maintained. 
Although the agency has initiatives under way to improve its 
information security, further efforts are needed. Weaknesses that need 
to be addressed include outdated security plans, inadequate security 
awareness training, inadequate system testing and evaluation programs, 
limited security incident-detection capabilities, and shortcomings in 
providing service continuity for disruptions in operations. Until FAA 
has resolved these issues, the information security weaknesses that GAO 
has identified will likely persist. 

Air Traffic Control System Command Center: 

[See PDF for image] 

[End of figure]

What GAO Recommends: 

GAO is recommending several actions intended to improve FAA’s 
information security program. In providing oral comments on a draft of 
this report, FAA’s Chief Information Officer agreed to consider GAO’s 
recommendations. 

www.gao.gov/cgi-bin/getrpt?GAO-05-712. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Gregory C. Wilshusen at 
(202) 512-6244 or wilshuseng@gao.gov. 

[End of section] 

Contents: 

Letter: 

Results in Brief: 

Background: 

Objective, Scope, and Methodology: 

Although Progress Has Been Made, Air Traffic Control Systems Remain 
Vulnerable: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix: 

Appendix I: GAO Contact and Staff Acknowledgments: 

Figures: 

Figure 1: Thousands of Aircraft Operating in the National Airspace 
System: 

Figure 2: Air Traffic Control Tower: 

Figure 3: Air Traffic Control System Command Center: 

Figure 4: Summary of Air Traffic Control over the United States and 
Oceans: 

Figure 5: Percentage of Staffed Facilities That Have Been Accredited: 

Letter August 26, 2005: 

The Honorable Tom Davis Chairman: 
Committee on Government Reform: 
House of Representatives: 

The Honorable Adam H. Putnam: 
House of Representatives: 

The Federal Aviation Administration (FAA) performs critical functions 
that contribute to ensuring safe, orderly, and efficient air travel in 
the national airspace system. It relies on automated systems and 
networks to provide information to air traffic controllers and aircraft 
flight crews to work toward ensuring safe and expeditious movement of 
aircraft. Interruptions in FAA's ability to fulfill its missions could 
have a significant adverse impact on air traffic nationwide. 

At your request, we evaluated the extent to which FAA has implemented 
information security controls for its air traffic control systems. 
Effective information security controls are essential for ensuring that 
information technology resources are adequately protected from 
inadvertent or deliberate misuse, fraudulent use, or destruction. 

This report summarizes the results of our review of information 
security controls in the agency's air traffic control systems. We are 
also issuing a separate report for limited distribution that contains 
sensitive security information. It describes in more detail the 
information security weaknesses that we identified and our specific 
recommendations for correcting them. 

Our review was performed from March 2004 through June 2005 in 
accordance with generally accepted government auditing standards. 

Results in Brief: 

FAA has made progress in implementing information security for its air 
traffic control systems by establishing an agencywide information 
security program and addressing many of its previously identified 
security weaknesses; however, it still has significant weaknesses that 
threaten the integrity, confidentiality, and availability of its 
systems--including weaknesses in controls that are designed to prevent, 
limit, and detect access to those systems. For example, for the systems 
we reviewed, the agency was not adequately managing its networks, 
system patches, user accounts and passwords, or user privileges, and it 
was not always logging and auditing security-relevant events. In 
addition, FAA faces risks to its air traffic control systems due to 
weaknesses in physical security, background investigations, segregation 
of duties, and application change controls. As a result, it is at 
increased risk of unauthorized system access, possibly disrupting 
aviation operations. While acknowledging these weaknesses, agency 
officials stated that because portions of their systems are custom 
built and use older equipment with special-purpose operating systems, 
proprietary communication interfaces, and custom-built software, the 
possibilities for unauthorized access are limited. Nevertheless, the 
proprietary features of these systems do not protect them from attack 
by disgruntled current or former employees, who understand these 
features, or from more sophisticated hackers. 

A key reason for the information security weaknesses that we identified 
in FAA's air traffic control systems was that the agency had not yet 
fully implemented an information security program to ensure that 
effective controls were established and maintained. FAA has various 
initiatives under way to improve information security; however, key 
elements of a security program have not yet been fully implemented. For 
example, some of the agency's security plans were outdated; security 
awareness training requirements were not being fully met; system 
testing and evaluation programs were inadequate; security incident 
detection capabilities were limited; and shortcomings existed in 
providing service continuity for disruptions in operations. In response 
to weaknesses that we had identified, FAA officials told us they 
recognized that more work was needed to continue to improve their 
information security program and that they had already corrected many 
of their electronic access control weaknesses. 

We are making recommendations to the Secretary of Transportation to 
direct the FAA administrator to fully implement an information security 
program. In a separate report, with limited distribution because it 
contains sensitive security information, we are making recommendations 
to correct the specific weaknesses we identified during our review. 

In providing oral comments on a draft of this report, the FAA's Chief 
Information Officer (CIO) agreed to consider our recommendations and 
provided other specific comments, which we have incorporated, as 
appropriate, in the report. 

Background: 

FAA is an agency of the Department of Transportation (DOT); one of its 
central missions is to ensure safe, orderly, and efficient air travel 
in the national airspace system. FAA's quarterly administrator's fact 
book for March 2005 reports that, in 2004, air traffic in the national 
airspace system exceeded 46 million flights and 647 million people. 
According to the agency's 2004 annual performance report for its air 
traffic organization, Year One--Taking Flight, at any one time as many 
as 7,000 aircraft--both civilian and military--could be aloft over the 
United States (see fig. 1). More than 36,000 employees support the 
operations that help move aircraft through the national airspace 
system. 

Figure 1: Thousands of Aircraft Operating in the National Airspace 
System: 

[See PDF for image] 

[End of figure] 

The agency's ability to fulfill its mission depends on the adequacy and 
reliability of its air traffic control systems, a vast network of 
computer hardware, software, and communications equipment. These 
systems reside at, or are associated with, several types of facilities: 
air traffic control towers, Terminal Radar Approach Control facilities, 
Air Route Traffic Control Centers (or en route centers), and the Air 
Traffic Control System Command Center. According to FAA,

* Four hundred eighty-eight air traffic control towers (see fig. 2) 
manage and control the airspace within about 5 miles of an airport. 
They control departures and landings as well as ground operations on 
airport taxiways and runways. 

Figure 2: Air Traffic Control Tower: 

[See PDF for image] 

[End of figure] 

* One hundred seventy Terminal Radar Approach Control facilities 
provide air traffic control services for airspace that is located 
within approximately 40 miles of an airport and generally up to 10,000 
feet above the airport, where en route centers' control begins. 
Terminal controllers establish and maintain the sequence and separation 
of aircraft. 

* Twenty-one en route centers control planes over the United States--in 
transit and during approaches to some airports. Each center handles a 
different region of airspace. En route centers operate the computer 
suite that processes radar surveillance and flight planning data, 
reformats it for presentation purposes, and sends it to display 
equipment that is used by controllers to track aircraft. The centers 
control the switching of voice communications between aircraft and the 
center as well as between the center and other air traffic control 
facilities. Two en route centers also control air traffic over the 
oceans. 

* The Air Traffic Control System Command Center (see fig. 3) manages 
the flow of air traffic within the United States. This facility 
regulates air traffic when weather, equipment, runway closures, or 
other conditions place stress on the national airspace system. In these 
instances, traffic management specialists at the command center take 
action to modify traffic demands in order to keep traffic within system 
capacity. 

Figure 3: Air Traffic Control System Command Center: 

[See PDF for image] 

[End of figure] 

As aircraft move across the national airspace system, controllers 
manage their movements during each phase of flight. See figure 4 for a 
visual summary of air traffic control over the United States and its 
oceans. 

Figure 4: Summary of Air Traffic Control over the United States and 
Oceans: 

[See PDF for image] 

[End of figure] 

The air traffic control systems are very complex and highly automated. 
These systems process a wide range of information, including radar, 
weather, flight plans, surveillance, navigation/landing guidance, 
traffic management, air-to-ground communication, voice, network 
management, and other information--such as airspace restrictions--that 
is required to support the agency's mission. 

To support its operational management functions, the agency relies on 
several interconnected systems to process and track flights around the 
world. In order to successfully carry out air traffic control 
operations, it is essential that FAA's systems interoperate, 
functioning both within and across facilities as one integrated system 
of systems. Each type of facility that we described in the previous 
section consists of numerous interrelated systems. For example, each of 
the en route centers, according to FAA officials, relies on 16 systems 
to perform mission-critical information processing and display, 
navigation, surveillance, communications, and weather functions. In 
addition, systems from different facilities interact with each other so 
that together they can successfully execute the entire air traffic 
control process. For example, systems integrate data on aircraft 
position from surveillance radars with data on flight destination from 
flight planning data systems, for use on controllers' displays. 

As FAA modernizes its air traffic control systems, information security 
will become even more critical. The agency's modernization efforts are 
designed to enhance the safety, capacity, and efficiency of the 
national airspace system through the acquisition of a vast network of 
radar, navigation, communications, and information processing 
systems.[Footnote 1] Newer systems use digital computer networking and 
telecommunications technologies that can create new vulnerabilities and 
expose them to risks that must be assessed and mitigated to ensure 
adequate protection. New vulnerabilities may also result from FAA's 
increasing reliance on commercially available hardware and software and 
from growing interconnectivity among computer and communication 
systems. Increasing interconnection increases the extent to which 
systems become vulnerable to intruders, who may severely disrupt 
operations or manipulate sensitive information. 

The administrator has designated the CIO as the focal point for 
information system security within the agency. The CIO is responsible 
for overseeing the development of the information security program, 
including oversight of information security policies, architectures, 
concepts of operation, procedures, processes, standards, training, and 
plans. This responsibility is delegated to the Office of Information 
Systems Security, whose mission is to protect the agency's 
infrastructure through leadership in innovative information assurance 
initiatives. In addition, the agency has established Information System 
Security Manager positions, with more detailed information security 
responsibilities, within FAA's various lines of business, such as the 
air traffic organization. 

We have previously reported information security weaknesses at 
FAA.[Footnote 2] For instance, in December 2000, we reported that the 
agency had physical security vulnerabilities, ineffective operational 
systems security, inadequate service continuity efforts, an ineffective 
intrusion detection capability, and ineffective personnel security. We 
also noted that the agency had not yet implemented its information 
security program. 

Information system controls are an important consideration for any 
organization that depends on computerized systems and networks to carry 
out its mission or business. These controls should provide adequate 
protections against outside as well as inside threats. It is especially 
important for government organizations, such as FAA, where maintaining 
the public trust is essential. Inadequately protected systems are at 
risk of intrusion by individuals or groups with malicious intent, who 
could use their illegitimate access to obtain sensitive information, 
disrupt operations, or launch attacks against other computer systems 
and networks. 

Since 1997, we have designated information security as a governmentwide 
high-risk area.[Footnote 3] Our previous reports, and those of agency 
inspectors general, describe persistent information security weaknesses 
that place a variety of federal operations at risk of disruption, 
fraud, and inappropriate disclosure. Congress and the executive branch 
have taken actions to address the risks associated with persistent 
information security weaknesses. In December 2002, Congress enacted the 
Federal Information Security Management Act (FISMA),[Footnote 4] which 
is intended to strengthen the information security of federal systems. 
In addition, the administration has taken important steps to improve 
information security, such as integrating it into the President's 
Management Agenda Scorecard. Moreover, the Office of Management and 
Budget (OMB) and the National Institute of Standards and Technology 
(NIST) have issued security guidance to federal agencies. 

Objective, Scope, and Methodology: 

The objective of our review was to determine the extent to which FAA 
had implemented information security for its air traffic control 
systems. Our evaluation was based on (1) our Federal Information System 
Controls Audit Manual,[Footnote 5] which contains guidance for 
reviewing information system controls that affect the integrity, 
confidentiality, and availability of computerized data; (2) previous 
reports from DOT's Office of Inspector General (OIG); and (3) FISMA, 
which sets key elements that are required for an effective information 
security program. 

Specifically, we evaluated information system controls that are 
intended to: 

* protect resources, data, and software from unauthorized access;

* prevent the introduction of unauthorized changes to application and 
system software;

* provide segregation of duties in the areas of application 
programming, system programming, computer operations, information 
security, and quality assurance;

* ensure recovery of computer processing operations in case of disaster 
or other unexpected interruption; and: 

* ensure an adequate information security program. 

To evaluate these controls, we identified and reviewed pertinent DOT 
and FAA security policies and procedures. In addition, to determine 
whether information system general controls were in place, adequately 
designed, and operating effectively, we conducted vulnerability testing 
and assessments of systems from within the agency's network. We also 
held discussions with agency staff to gain an understanding of FAA's 
processes and controls. In addition, in order to take advantage of 
their prior work in this area, we held discussions with OIG staff and 
reviewed recent information security reports pertaining to air traffic 
control systems. Because the OIG had recently reviewed the system used 
by controllers to ensure the safe separation of aircraft, we did not 
include that system in our review. 

We performed our review at FAA headquarters and tested operational and 
management controls[Footnote 6] at three other sites. At two additional 
sites, we tested these controls and, in addition, tested technical 
controls for three critical air traffic control systems. The limited 
distribution report contains further details on the scope of our 
review. This review was performed from March 2004 through June 2005 in 
accordance with generally accepted government auditing standards. 

Although Progress Has Been Made, Air Traffic Control Systems Remain 
Vulnerable: 

Although FAA has made progress in implementing information security for 
its air traffic control systems by establishing an agencywide 
information security program and addressing many of its previously 
identified security weaknesses, significant control weaknesses threaten 
the integrity, confidentiality, and availability of those systems and 
information. In the systems we reviewed, we identified 36 weaknesses in 
electronic access controls and in other areas such as physical 
security, background investigations, segregation of duties, and 
application change controls. A key reason for these weaknesses is that 
the agency has not yet fully implemented an information security 
program. As a result, FAA's air traffic control systems remain 
vulnerable to unauthorized access, use, modification, and destruction 
that could disrupt aviation operations. 

Electronic Access Controls Were Inadequate: 

A basic management objective for any organization is to protect the 
resources that support its critical operations from unauthorized 
access. Organizations accomplish this objective by designing and 
implementing electronic controls that are intended to prevent, limit, 
and detect unauthorized access to computing resources, programs, and 
information. Electronic access controls include those related to 
network management, patch management, user accounts and passwords, user 
rights and file permissions, and audit and monitoring of security-
relevant events. Inadequate electronic access controls diminish the 
reliability of computerized information, and they increase the risk of 
unauthorized disclosure, modification, and destruction of sensitive 
information and of disruption of service. 

Network Management: 

Networks are collections of interconnected computer systems and devices 
that allow individuals to share resources such as computer programs and 
information. Because sensitive programs and information are stored on 
or transmitted along networks, effectively securing networks is 
essential to protecting computing resources and data from unauthorized 
access, manipulation, and use. Organizations secure their networks, in 
part, by installing and configuring network devices that permit 
authorized network service requests, deny unauthorized requests, and 
limit the services that are available on the network. Devices used to 
secure networks include (1) firewalls that prevent unauthorized access 
to the network, (2) routers that filter and forward data along the 
network, (3) switches that forward information among segments of a 
network, and (4) servers that host applications and data. Network 
services consist of protocols for transmitting data between network 
devices. Insecurely configured network services and devices can make a 
system vulnerable to internal or external threats, such as denial-of-
service attacks.[Footnote 7] Because networks often include both 
external and internal access points for electronic information assets, 
failure to secure these assets increases the risk of unauthorized 
modification of sensitive information and systems, or disruption of 
service. 

For the systems we reviewed, FAA did not consistently configure network 
services and devices securely to prevent unauthorized access to and 
ensure the integrity of computer systems operating on its networks. We 
identified weaknesses in the way the agency restricted network access, 
developed application software, segregated its network, protected 
information flow, and stored the certificates[Footnote 8] that are used 
for authentication. For example: 

* Access for system administration was not always adequately 
restricted, and unnecessary services were available on several network 
systems. 

* Application software exhibited several weaknesses that could lead to 
unauthorized access or to service disruptions. 

* Although FAA implemented controls to segregate network traffic, 
weaknesses in the application and infrastructure systems could allow an 
external attacker to circumvent network controls in order to gain 
unauthorized access to the internal network. 

* FAA did not encrypt certain information traversing its internal 
network. Instead, it used clear text protocols that made the network 
susceptible to eavesdropping. 

* FAA did not comply with federal standards for protected handling of 
certificates and keys.[Footnote 9] Because certificates are a primary 
tool for controlling access to applications, this improper storage puts 
major applications at risk of intrusion. 

Patch Management: 

Patch management is a critical process that can help to alleviate many 
of the challenges of securing computing systems.[Footnote 10] As 
vulnerabilities in a system are discovered, attackers may attempt to 
exploit them, possibly causing significant damage. Malicious acts can 
range from defacing Web sites to taking control of entire systems and 
thereby being able to read, modify, or delete sensitive information; 
destroy systems; disrupt operations; or launch attacks against other 
organizations' systems. After a vulnerability is validated, the 
software vendor develops and tests a patch or workaround. Incident 
response groups and software vendors issue information updates on the 
vulnerability and the availability of patches. FAA's patch management 
policy assigns organizational responsibilities for the patch management 
process--including the application of countermeasures to mitigate 
system vulnerability--and requires that patches be kept up to date or 
that officials otherwise accept the risk. 

For the systems we reviewed, FAA did not consistently install patches 
in a timely manner. For example, patches that had been issued in 2002 
had not been applied to certain servers that we reviewed. On another 
system, the operating system software, from 1991, was outdated and 
unpatched, although several vulnerabilities had been identified in the 
meantime. The agency did not believe that the system was vulnerable to 
unauthorized access or that it was at low risk of exposure to these 
vulnerabilities. Because FAA had not yet installed the latest patches 
at the time of our review, firewalls, Web servers, and servers used for 
other purposes were vulnerable to denial-of-service attacks and to 
external attackers' taking remote control of them. 

User Accounts and Passwords: 

A computer system must be able to identify and differentiate among 
users so that activities on the system can be linked to specific 
individuals. When an organization assigns unique user accounts to 
specific users, the system distinguishes one user from another--a 
process called identification. The system must also establish the 
validity of a user's claimed identity through some means of 
authentication, such as a password, that is known only to its owner. 
The combination of identification and authentication--such as user 
account/password combinations--provides the basis for establishing 
individual accountability and for controlling access to the system. 
Accordingly, agencies (1) establish password parameters, such as number 
of characters, type of characters, and the frequency with which users 
should change their passwords, in order to strengthen the effectiveness 
of passwords for authenticating the identity of users; (2) require 
encryption for passwords to prevent their disclosure to unauthorized 
individuals; and (3) implement procedures to control the use of user 
accounts. FAA policy identifies and prescribes minimum requirements for 
creating and managing passwords, including how complex the password 
must be and how to protect it. DOT policy also addresses the necessity 
to assign only one user to a given ID and password. 

FAA did not adequately control user accounts and passwords to ensure 
that only authorized individuals were granted access to its systems. 
Because the agency did not always comply with complexity requirements, 
passwords on numerous accounts may be easy for an attacker to guess. 
Additionally, one of the databases we reviewed did not require strong 
passwords. We also identified database passwords that were not 
adequately protected because they were (1) readable by all system users 
on two Web servers, (2) in clear text format on multiple shared server 
directories, and (3) written into application program code. Such 
weaknesses increase the risk that passwords may be disclosed to 
unauthorized users and used to gain access to the system. Further, 
administrators and/or users shared user IDs and passwords on various 
devices, including servers, routers, and switches, thereby diminishing 
the effectiveness of the control for attributing system activity to 
individuals. As a result, FAA may not be able to hold users 
individually accountable for system activity. 

User Rights and File Permissions: 

The concept of "least privilege" is a basic underlying principle for 
securing computer systems and data. It means that users are granted 
only those access rights and permissions that they need to perform 
their official duties. To restrict legitimate users' access to only 
those programs and files that they need to do their work, organizations 
establish access rights and permissions. "User rights" are allowable 
actions that can be assigned to users or to groups of users. File and 
directory permissions are rules that are associated with a particular 
file or directory and regulate which users can access them and the 
extent of that access. To avoid unintentionally giving users 
unnecessary access to sensitive files and directories, an organization 
must give careful consideration to its assignment of rights and 
permissions. DOT and FAA policies require that access privileges be 
granted to users at the minimum level required to perform their job-
related duties. 

FAA permitted excessive access to air traffic control systems, granting 
rights and permissions that allowed more access than users needed to 
perform their jobs. For example, FAA had granted users of a database 
system the access rights to create or change sensitive system files--
even though they did not have a legitimate business need for this 
access. Further, the permissions for sensitive system files also 
inappropriately allowed all users to read, update, or execute them. 

Audit and Monitoring of Security-Relevant Events: 

To establish individual accountability, monitor compliance with 
security policies, and investigate security violations, it is crucial 
to determine what, when, and by whom specific actions have been taken 
on a system. Organizations accomplish this by implementing system or 
security software that provides an audit trail that they can use to 
determine the source of a transaction or attempted transaction and to 
monitor users' activities. The way in which organizations configure 
system or security software determines the nature and extent of 
information that can be provided by the audit trail. To be effective, 
organizations should configure their software to collect and maintain 
audit trails that are sufficient to track security-relevant events. DOT 
policy requires that audit logging be enabled on systems so that these 
events can be monitored. 

For the systems we reviewed, FAA did not consistently audit and monitor 
security-relevant system activity on its servers. For example, on key 
devices that we reviewed, logging either was disabled or configured to 
overwrite, or it did not collect information on important security-
relevant events such as failed login attempts. As a result, if a system 
was modified or disrupted, the agency's capability to trace or recreate 
events would be diminished. 

In response to weaknesses that we identified in electronic access 
controls, FAA officials told us that they had already corrected many of 
the weaknesses. Agency officials also pointed out that because major 
portions of air traffic control systems consist of custom-built, older 
equipment with special-purpose operating systems, proprietary 
communication interfaces, and custom-built software, the possibilities 
for unauthorized access are limited and therefore mitigate the risks. 
However, as we noted in our 1998 report[Footnote 11] on FAA information 
security, one cannot conclude that old or obscure systems are secure 
simply because their configurations may not be commonly understood by 
external hackers. In addition, the systems' proprietary features do not 
provide protection from attack by disgruntled current and former 
employees who understand them, or from more sophisticated hackers. The 
weaknesses that we identified could allow unauthorized access to 
certain systems. 

Other Information System Controls Were Not Sufficient: 

In addition to electronic access controls, other important controls 
should be in place to ensure the security and reliability of an 
organization's data. These controls include policies, procedures, and 
control techniques to physically secure computer resources, conduct 
suitable background investigations, provide appropriate segregation of 
duties, and prevent unauthorized changes to application software. 
However, weaknesses existed in each of these areas. These weaknesses 
increase the risk of unauthorized access to and modification of FAA's 
information systems and of disruption of service. 

Physical Security: 

Physical security controls are important for protecting computer 
facilities and resources from espionage, sabotage, damage, and theft. 
These controls restrict physical access to computer resources, usually 
by limiting access to the buildings and rooms in which the resources 
are housed and by periodically reviewing the access granted, in order 
to ensure that access continues to be appropriate. At FAA, physical 
access control measures (such as guards, badges, and locks--used alone 
or in combination) are vital to protecting the agency's sensitive 
computing resources from both external and internal threats. 

FAA has implemented a facility security management program that 
requires all staffed facilities to undergo a physical security review. 
These physical security reviews are part of an overall facility 
accreditation program, which requires facilities to meet all required 
security measures in order to become accredited. Since our December 
2000 report, FAA has made progress with this program and has accredited 
about 430 additional facilities for a total of 64.8 percent of its 
staffed facilities (see fig. 5). 

Figure 5: Percentage of Staffed Facilities That Have Been Accredited: 

[See PDF for image] 

[End of figure] 

Although FAA had taken some actions to strengthen its physical security 
environment, certain weaknesses reduced its effectiveness in protecting 
and controlling physical access to sensitive areas such as server 
rooms. Facility reviews are supposed to determine the overall risk 
level at the facility, examine the facility's security procedures, and 
discover local threats and vulnerabilities. However, in 2004, DOT's OIG 
reported that these physical security reviews generally focused more on 
the facility's perimeter than on vulnerabilities within the facility. 
We also identified weaknesses in FAA's physical security controls. 
Specific examples are listed below: 

* FAA did not consistently ensure that access to sensitive computing 
resources had been granted to only those who needed it to perform their 
jobs. 

* At the time of our review, FAA did not have a policy in place 
requiring that (1) physical access logs be reviewed for suspicious 
activity or (2) access privileges be reviewed to ensure that employees 
and contractors who had been granted access to sensitive areas still 
needed it. As a result, none of the sites we visited could ensure that 
employees and contractors who were accessing sensitive areas had a 
legitimate need for access. 

* Sensitive computing resources and critical operations areas were not 
always secured. 

* FAA did not properly control the badging systems used for granting 
physical access to facilities. The required information security access 
controls regarding password protection were inconsistently implemented, 
and division of roles and responsibilities was not enforced in the 
automated system. 

* The entrances to facilities were not always adequately protected. 
Visitor screening procedures were inconsistently implemented, and 
available tools were not being used properly or to their fullest 
capability. 

These weaknesses in physical security increase the risk that 
unauthorized individuals could gain access to sensitive computing 
resources and data and could inadvertently or deliberately misuse or 
destroy them. 

Background Investigations: 

According to OMB Circular A-130,[Footnote 12] it has long been 
recognized that the greatest harm to computing resources has been done 
by authorized individuals engaged in improper activities--whether 
intentionally or accidentally. Personnel controls (such as screening 
individuals in positions of trust) supplement technical, operational, 
and management controls, particularly where the risk and magnitude of 
potential harm is high. NIST guidelines suggest that agencies determine 
the sensitivity of particular positions, based on such factors as the 
type and degree of harm that the individual could cause by misusing the 
computer system and on more traditional factors, such as access to 
classified information and fiduciary responsibilities. Background 
screenings (i.e., investigations) help an organization to determine 
whether a particular individual is suitable for a given position by 
attempting to ascertain the person's trustworthiness and 
appropriateness for the position. The exact type of screening that 
takes place depends on the sensitivity of the position and any 
applicable regulations by which the agency is bound. 

In 2000, we testified[Footnote 13] that FAA had failed to conduct 
background investigations on thousands of contractor personnel. 
Further, according to the testimony, many reinvestigations--which are 
required every 5 years for top secret clearances--were never completed. 
Since our 2000 testimony, the agency has made improvements to its 
background investigation program. For example, according to agency 
officials, it has completed background investigations for 90 percent of 
its contractor personnel and has implemented an automated system to 
track and report when reinvestigations are required. 

Although FAA has recently made improvements to its background 
investigation program, the agency has not always properly designated 
sensitivity levels for positions involving tasks that could have a 
major impact on automated information systems. According to the Office 
of Personnel Management (OPM), positions with major responsibility for 
the design, testing, maintenance, operation, monitoring, or management 
of systems hardware and software should be designated as "high 
risk."[Footnote 14] However, FAA has designated some of these types of 
positions as "moderate risk;" all 20 individuals that we identified as 
having system responsibilities with potentially significant access were 
designated as moderate risk or below. Further, OPM recommends a minimum 
background investigation[Footnote 15] for moderate risk positions. 
Nonetheless, FAA had been requiring only a National Agency Check and 
Inquiry, a less stringent investigation. Without properly designating 
position sensitivity levels and performing the appropriate background 
investigations, the agency faces an increased risk that inappropriate 
individuals could modify critical information and systems or disrupt 
operations. 

Segregation of Duties: 

Segregation of duties refers to the policies, procedures, and 
organizational structure that help ensure that no single individual can 
independently control all key aspects of a process or computer-related 
operation and thereby gain unauthorized access to assets or records. 
Often segregation of duties is achieved by dividing responsibilities 
among two or more individuals or organizational groups. This diminishes 
the likelihood that errors and wrongful acts will go undetected, 
because the activities of one individual or group will serve as a check 
on the activities of the other. Inadequate segregation of duties 
increases the risk that erroneous or fraudulent transactions could be 
processed, improper program changes be implemented, and computer 
resources be damaged or destroyed. 

For the systems we reviewed, FAA did not properly segregate 
incompatible duties in its computer-related operations. Key duties in a 
computer environment that are generally segregated include software 
design, development, and testing; software change control; computer 
operations; and computer production control. However, on one of the 
systems that we reviewed, FAA allowed software developers to place 
application code into the production environment. With access to 
production systems, software developers could intentionally introduce 
malicious code. Additionally, FAA did not have mitigating controls; for 
example, there was no provision for reviewing code on production 
systems to ensure that only authorized code was placed into production. 
FAA officials told us that it plans to establish an independent 
production control group that would place code into production once 
resources become available for this particular system. Without adequate 
segregation of duties or appropriate mitigating controls, FAA is at 
increased risk that unauthorized code could be introduced into the 
production environment, possibly without detection. 

Application Change Controls: 

It is important to ensure that only authorized and fully tested 
application programs are placed in operation. To ensure that changes to 
application programs are necessary, work as intended, and do not result 
in the loss of data or program integrity, such changes should be 
documented, authorized, tested, and independently reviewed. In 
addition, test procedures should be established to ensure that only 
authorized changes are made to the application's program code. 

Application change control procedures that FAA's contractor used were 
incomplete. At one site, we reviewed change control and quality 
assurance documentation for 10 of 50 software changes that had been 
made by FAA's contractor in 2004. We determined that the contractor 
appropriately followed its own change control process, only omitting a 
few minor items in its documentation. However, although the 
contractor's change control process adequately addressed software 
testing, it did not include reviewing code after it had been installed 
on production systems to verify that the correct code had been placed 
into production. This issue is important, because developers are 
allowed access to production systems. With no mitigating controls in 
place, developers could introduce unauthorized code into production 
systems--without detection. 

Information Security Program Is Not Yet Fully Implemented: 

A key reason for the information security weaknesses that we identified 
in FAA's air traffic control systems was that the agency had not yet 
fully implemented its information security program to help ensure that 
effective controls were established and maintained. FAA has implemented 
the foundation for an effective information security program with 
written policy and guiding procedures that designate responsibility for 
implementation throughout the agency. 

FISMA[Footnote 16] requires agencies to implement an information 
security program that includes: 

* periodic assessments of the risk and the magnitude of harm that could 
result from the unauthorized access, use, disclosure, disruption, 
modification, or destruction of information and information systems;

* policies and procedures that (1) are based on risk assessments, (2) 
cost-effectively reduce risks, (3) ensure that information security is 
addressed throughout the life cycle of each system, and (4) ensure 
compliance with applicable requirements;

* plans for providing adequate information security for networks, 
facilities, and systems;

* security awareness training to inform personnel--including 
contractors and other users of information systems--of information 
security risks and of their responsibilities in complying with agency 
policies and procedures;

* at least annual testing and evaluation of the effectiveness of 
information security policies, procedures, and practices relating to 
management, operational, and technical controls of every major 
information system that is identified in the agencies' inventories;

* a process for planning, implementing, evaluating, and documenting 
remedial action to address any deficiencies in their information 
security policies, procedures, or practices;

* procedures for detecting, reporting, and responding to security 
incidents; and: 

* plans and procedures to ensure continuity of operations for 
information systems that support the operations and assets of the 
agency. 

FAA has made progress in implementing information security by 
establishing an agencywide information security program and addressing 
many of its previously identified security weaknesses. FAA's 
Information System Security Program Handbook requires each of these 
FISMA elements, and the agency has initiatives under way in all of 
these areas. In addition, the Office of Information Systems Security 
has developed a security management tool to monitor (1) the status of 
corrective actions, (2) the status of certifications and 
authorizations[Footnote 17] for all systems in FAA's inventory, (3) 
information security-related budgetary allocations and expenditures, 
and (4) training requirements for key security personnel. 

However, we identified instances in which the program had not been 
fully or consistently implemented for the air traffic control systems. 
Agency officials recognize that more work is needed to continue to 
improve their information security program. 

Risk Assessments: 

Identifying and assessing information security risks are essential 
steps in determining what controls are required. Moreover, by 
increasing awareness of risks, these assessments can generate support 
for the policies and controls that are adopted in order to help ensure 
that these policies and controls operate as intended. Further, OMB 
Circular A-130, appendix III, prescribes that risk be reassessed when 
significant changes are made to computerized systems--or at least every 
3 years, as does FAA policy. Consistent with NIST guidance, FAA 
requires that risk assessments include identifying system 
interconnections, information sensitivity, threats and existing 
countermeasures and analyzing vulnerabilities. 

The risk assessments that we reviewed generally complied with FAA 
requirements. For the systems we reviewed, FAA provided five risk 
assessments. Four of the five included the required topics. However, 
the risk assessment for the fifth one was incomplete and did not always 
address countermeasures. Inadequately assessing risk and identifying 
countermeasures can lead to implementing inadequate or inappropriate 
security controls that might not address the system's true risk, and to 
costly efforts to subsequently implement effective controls. 

Policies and Procedures: 

Another key task in developing an effective information security 
program is to establish and implement risk-based policies, procedures, 
and technical standards that govern security over an agency's computing 
environment. If properly implemented, policies and procedures should 
help reduce the risk that could come from unauthorized access or 
disruption of services. Technical security standards provide consistent 
implementing guidance for each computing environment. Because security 
policies are the primary mechanism by which management communicates its 
views and requirements, it is important to establish and document them. 

FAA's Office of Information Systems Security has developed systems 
security policies, with the intent to provide security commensurate 
with the risks of unauthorized access or disruption of service. For 
example, FAA has developed policies on an overall information system 
security program, background investigations, and password management. 
Further, the agency's Information System Security Program Handbook 
provides detailed information on certification and authorization of 
information systems. DOT has also developed various technical 
standards, which address various computing environments. However, FAA's 
policies and procedures did not address issues such as reviewing and 
monitoring physical access. In addition, the agency had not yet 
developed procedures to effectively implement patch management for its 
air traffic control systems. Also, as noted earlier, in some instances-
-such as password management--FAA was not following its own policies 
and procedures. Without effectively implementing policies and 
procedures, the agency has less assurance that their systems and 
information are protected. 

Security Plans: 

The objective of system security planning is to improve the protection 
of information technology resources. A system security plan provides an 
overview of the system's security requirements and describes the 
controls that are in place--or planned--to meet those requirements. OMB 
Circular A-130 requires that agencies develop and implement system 
security plans for major applications and for general support 
systems[Footnote 18] and that these plans address policies and 
procedures for providing management, operational, and technical 
controls. Further, Circular A-130 requires that agencies' plans be 
consistent with guidance issued by NIST. FAA policy requires that 
security plans be developed, and its Information System Security 
Program Handbook provides guidance on developing security plans. 
According to both FAA and NIST, plans should include elements such as 
security controls currently in place or planned, the individual 
responsible for the security of the system, a description of the system 
and its interconnected environment, and rules of behavior. 

Although the security plans that we reviewed generally complied with 
FAA policy and guidance, we identified instances where plans were 
incomplete or not up-to-date. All five of the information system 
security plans we reviewed were missing information required by FAA. 
Procedures outlining the individuals responsible for plan reviews and 
monitoring the status of planned controls were missing in each case. 
Also, no agency officials were identified to fulfill this 
responsibility. Although a security plan had been developed for one of 
FAA's major applications, it was missing such required sections as 
rules of behavior and controls in place for public access. Another plan 
did not identify the system owner or the individual who had 
responsibility for system security. Further, some sections in one of 
the plans we reviewed were outdated. For example, security controls 
that existed at the time of our review were not described in the plan. 
Without complete and up-to-date security plans, FAA cannot ensure that 
appropriate controls are in place to protect its systems and critical 
information. 

Security Awareness Training: 

Another FISMA requirement for an information security program is that 
it promote awareness and provide required training for users so that 
they can understand the system security risks and their role in 
implementing related policies and controls to mitigate those risks. 
Computer intrusions and security breakdowns often occur because 
computer users fail to take appropriate security measures. For this 
reason, it is vital that employees and contractors who use computer 
resources in their day-to-day operations be made aware of the 
importance and sensitivity of the information they handle, as well as 
the business and legal reasons for maintaining its confidentiality, 
integrity, and availability. FISMA mandates that all federal employees 
and contractors who use agency information systems be provided with 
periodic training in information security awareness and accepted 
information security practice. FAA has established a policy requiring 
employees and contractors to take annual security awareness training. 
Further, FISMA requires agency CIOs to ensure that personnel with 
significant information security responsibilities get specialized 
training. OMB and NIST also require agencies to implement system-
specific security training. 

In December 2000, we reported that FAA had not fully implemented a 
security awareness and training program. Since then, the agency has 
established its policy for annual training and has implemented an 
agencywide security awareness program that includes newsletters, 
posters, security awareness days, and a Web site. FAA has also 
implemented a Web-based security awareness training tool that not only 
meets the requirements of FISMA, but also records whether individuals 
have completed the training. The training records that we reviewed 
showed that personnel with significant information security 
responsibilities had received specialized training. 

Despite the agency's progress in security awareness training, we 
identified shortcomings with the program. For example, although FAA 
implemented a Web-based training tool, the agency does not require all 
employees and contractors to use it. As a result, not all contractors 
and employees receive annual training, training is not appropriately 
tracked and reported, and the training provided in place of the tool is 
not always adequate. Although FAA reported in its most recent FISMA 
report that 100 percent of its employees and contractors had taken 
security awareness training, it was unable to provide documentation for 
more than one-third of selected[Footnote 19] employees and contractors. 
Further, the agency does not have an effective tracking mechanism for 
security awareness training. In some circumstances, management relies 
on verbal responses from employees and contractors on whether they have 
completed training, but it has no uniform reporting requirements. 
Instead they receive responses in different forms, such as telephone 
conversations, e-mails, and faxes. In instances where the Web-based 
tool is not used, the awareness training may be inadequate. At one of 
the sites we visited, this training consisted of a briefing that did 
not cover information system security and risks. Further, the agency 
had not developed guidance or procedures for system-specific security 
training, as required by OMB and NIST. 

Without adequate security awareness and training programs, security 
lapses are more likely to occur. As in our 2000 report, we were able to 
access sensitive security information on the Internet. FAA agreed that 
the information we identified was sensitive and took prompt action to 
remove the specific examples that we had provided. However, 8 months 
later, one of the examples was available on the Internet again, even 
though it was marked for "Internal Distribution Only."

Tests and Evaluations of Control Effectiveness: 

Another key element of an information security program is testing and 
evaluating systems to ensure that they are in compliance with policies 
and that policies and controls are both appropriate and effective. This 
type of oversight is a fundamental element because it demonstrates 
management's commitment to the security program, reminds employees of 
their roles and responsibilities, and identifies and mitigates areas of 
noncompliance and ineffectiveness. Although control tests and 
evaluations may encourage compliance with security policies, the full 
benefits are not achieved unless the results improve the security 
program. Analyzing the results of security reviews provides security 
specialists and business managers with a means of identifying new 
problem areas, reassessing the appropriateness of existing controls, 
and identifying the need for new controls. FISMA requires that the 
frequency of tests and evaluations be based on risks, but occur no less 
than annually. Security tests and evaluations are part of FAA's 
certification and authorization process, which is required every 3 
years or when significant changes to the system occur. According to 
agency officials, in each of the following 2 years, FAA conducts a self-
assessment based on NIST guidance. 

Although FAA had conducted system tests and evaluations, documentation 
and testing were not always adequate. For example: 

* In three of the five test plan and results reports we reviewed, most 
of the test results were not included. Additionally, very little 
testing was conducted on the network and infrastructure pieces of any 
of the systems we reviewed. 

* As of April 2005, the certifications and authorizations for about 24 
percent of the air traffic control systems were either outdated or had 
not been completed. According to FAA officials, the agency's risk-based 
approach focused on certifying and accrediting all of its systems; 
therefore, management accepted an extension beyond 3 years for some 
systems. 

* DOT's IG testified that some of the testing is being conducted only 
on developmental systems, rather than operational systems. 

* FAA's practice was to perform system tests and evaluations annually 
without regard to criticality. Our tests of critical systems identified 
many weaknesses. More frequent testing by FAA of these systems may have 
identified, and FAA could have corrected, many of the information 
security weaknesses discussed in this report. 

Without appropriate tests and evaluations, the agency cannot be assured 
that employees and contractors are complying with established policies 
or that policies and controls are appropriate and working as intended. 

Remedial Actions: 

Remedial action plans are a key component described in FISMA. They 
assist agencies in identifying, assessing, prioritizing, and monitoring 
the progress in correcting security weaknesses that are found in 
information systems. According to OMB Circular A-123, agencies should 
take timely and effective action to correct deficiencies that they have 
identified through a variety of information sources. To accomplish 
this, remedial action plans should be developed for each deficiency, 
and progress should be tracked for each. FAA policy requires 
remediation reports to address the results of tests and evaluations. 

Although the agency has developed a remedial action tracking system, 
which included remedial plans, for weaknesses identified through 
previous reviews in order to help it monitor the progress in correcting 
security weaknesses, these remedial plans did not address all 
identified weaknesses, and some deficiencies were not always corrected 
in a timely manner. 

Incident Handling: 

Even strong controls may not block all intrusions and misuse, but 
organizations can reduce the risks associated with such events if they 
promptly take steps to detect and respond to them before significant 
damage is done. In addition, accounting for and analyzing security 
problems and incidents are effective ways for organizations to gain a 
better understanding of threats to their information and of the costs 
of their security-related problems. Such analyses can pinpoint 
vulnerabilities that need to be eliminated so that they will not be 
exploited again. Problem and incident reports can provide valuable 
input for risk assessments, can help in prioritizing security 
improvement efforts, and can be used to illustrate risks and related 
trends for senior management. DOT has issued a policy for detecting, 
reporting, and responding to security incidents. 

In December 2000, we reported that FAA had not fully implemented an 
effective intrusion detection capability. Since then, FAA has 
established a Computer Security Incident Response Center, whose mission 
is to detect and respond to intrusions on FAA's systems. The Center 
produces incident reports and provides agency management with various 
analyses. However, the following weaknesses prevent it from effectively 
detecting and responding to many potential threats: 

* Although the agency has deployed intrusion detection systems, these 
systems do not cover all segments of the air traffic control system. 
According to FAA officials, the agency has a risk-based plan to further 
deploy intrusion detection capabilities. 

* One of the intrusion detection systems that we reviewed was 
configured in such a way that it was unable to detect potential 
intrusions. 

While FAA has made progress, it remains at risk of not being able to 
detect or respond quickly to security incidents. 

Continuity of Operations: 

Continuity of operations controls, sometimes referred to as service 
continuity, should be designed to ensure that when unexpected events 
occur, key operations continue without interruption or are promptly 
resumed, and critical and sensitive data are protected. These controls 
include environmental controls and procedures designed to protect 
information resources and minimize the risk of unplanned interruptions, 
along with a plan to recover critical operations should interruptions 
occur. If continuity of operations controls are inadequate, even a 
relatively minor interruption could result in significant adverse 
nationwide impact on air traffic. FAA requires that continuity of 
operations plans be included as part of its certification and 
authorization process. 

Although FAA has various initiatives under way to address continuity of 
operations, shortcomings exist. For the systems we reviewed, FAA 
identified five continuity of operations plans. One plan was incomplete 
and FAA included the need to complete this plan in its remediation 
report. While four plans were completed, one of these did not contain 
accurate information. It described an operating environment to be used 
as a contingency, yet this environment did not exist at the time of our 
review. Further, in April 2005, DOT's IG testified that FAA had not 
made sufficient progress in developing continuity plans to enable it to 
restore air traffic control services in case of a prolonged service 
disruption at the en route centers. Until the agency completes actions 
to address these weaknesses, it is at risk of not being able to 
appropriately recover in a timely manner from certain service 
disruptions. 

Conclusions: 

Although FAA has made progress in implementing information security by 
establishing an agencywide information security program and addressing 
many of its previously identified security weaknesses, significant 
information security weaknesses remain that could potentially lead to 
disruption in aviation operations. These include weaknesses in 
electronic access controls, for example, in managing networks, system 
patches, user accounts and passwords, and user rights and in logging 
and auditing security-relevant events. Weaknesses in physical security, 
background investigations, segregation of duties, and application 
change controls increase the level of risk. A key reason for FAA's 
weaknesses in information system controls is that it has not yet fully 
implemented an information security program to ensure that effective 
controls are established and maintained. Effective implementation of 
such a program provides for periodically assessing risks, establishing 
appropriate policies and procedures, developing and implementing 
security plans, promoting security awareness training, testing and 
evaluating the effectiveness of controls, implementing corrective 
actions, responding to incidents, and ensuring continuity of 
operations. Although FAA has initiatives under way to address these 
areas, further efforts are needed to fully implement them. 

Recommendations for Executive Action: 

To help establish effective information security over air traffic 
control systems, we recommend that the Secretary of Transportation 
direct the FAA Administrator to take the following 12 actions to fully 
implement an information security program: 

* Ensure that risk assessments are completed. 

* Develop and implement policies and procedures to address such issues 
as patch management and the reviewing and monitoring of physical 
access. 

* Review system security plans to ensure that they contain the 
information required by OMB A-130 and are up to date. 

* Enhance the security awareness training program to ensure that all 
employees and contractors receive information security awareness 
training, as well as system specific training, and that completion of 
the training is appropriately reported and tracked. 

* Develop a process to ensure that sensitive information is not 
publicly available on the Internet. 

* Conduct tests and evaluations of the effectiveness of controls on 
operational systems, and document results. 

* Perform more frequent testing of system controls on critical systems 
to ensure that the controls are operating as intended. 

* Review remedial action plans to ensure that they address all of the 
weaknesses that have been identified. 

* Prioritize weaknesses in the remedial action plans and establish 
appropriate, timely milestone dates for completing the planned actions. 

* Implement FAA's plan to deploy intrusion detection capabilities for 
portions of the network infrastructure that are not currently covered. 

* Correct configuration issues in current intrusion detection systems 
to ensure that they are working as intended. 

* Review service continuity plans to ensure that they appropriately 
reflect the current operating environment. 

We are also making recommendations in a separate report with limited 
distribution. These recommendations consist of actions to be taken to 
correct the specific information security weaknesses we identified that 
are related to network management, patch management, password 
management, user privileges, auditing and logging, physical security, 
background investigations, segregation of duties, and application 
change controls. 

Agency Comments and Our Evaluation: 

In providing oral comments on a draft of this report, the FAA's CIO 
agreed to consider our recommendations and emphasized several points. 
He stated that the issues we identified in the three individual systems 
we examined are not necessarily indicative of the security posture of 
the air traffic control system as a whole. We acknowledge that we 
focused our examination on the technical controls of three critical 
systems. In addition, we reviewed management and operational controls 
at five sites and FAA headquarters and relied on the OIG's prior work 
pertaining to air traffic control systems. We concluded that 
significant information security weaknesses remain that could 
potentially lead to a disruption in aviation operations. 

The CIO also indicated that the implications of the findings in this 
report should be tempered by the understanding that individual system 
vulnerabilities are further mitigated by system redundancies and 
separate access controls that are built into the overall air traffic 
control system architecture to provide additional protection that is 
not considered within the context of this review. He was concerned that 
our report does not always balance the identification of individual 
system issues with consideration of the relative risk that an issue may 
pose to the overall system and that the public may be prone to infer 
from the report that the security risks to the air traffic control 
system are higher than they may actually be. We acknowledge that FAA 
may have other protections built into the overall system architecture. 
However, as noted in this report, the complex air traffic control 
system relies on several interconnected systems. As a result, the 
weaknesses we identified may increase the risk to other systems. For 
example, FAA did not consistently configure network services and 
devices securely to prevent unauthorized access to and ensure the 
integrity of computer systems operating on its networks. 

In addition, the CIO indicated that all security findings for air 
traffic control systems, including those from our report, are evaluated 
and prioritized for action and that FAA has established a sound track 
record for moving quickly to address priority issues--as demonstrated 
by the extensive actions the agency has taken on issues identified in 
our previous reports and in DOT OIG reports. For example, according to 
the CIO, FAA established an extensive information security training 
program; deployed intrusion detection systems; and established the 
Computer Security Incident Response Center as a prevention, detection 
and reporting capability on a 24x7x365 basis. Finally, he stated that 
as a result of FAA's information security actions, it achieved 100 
percent of the President's Management Agenda goals for certification 
and authorization of its systems, completed certification and 
authorization for over 90 percent of its systems in fiscal year 2004, 
and completed 100 percent of its certifications and authorizations by 
June 30, 2005. We acknowledge in our report that FAA has made progress 
in implementing its information security program and has initiatives 
under way; however, we identified weaknesses in key areas cited by the 
CIO. For example, as noted in this report, although FAA conducted tests 
and evaluations as part of its certification and authorization process, 
some of these were outdated and documentation and testing were not 
always adequate. 

The CIO also provided specific technical comments, which we have 
incorporated, as appropriate, in the report. 

As agreed with your offices, unless you publicly announce the contents 
of this report earlier, we plan no further distribution until 30 days 
from the report date. At that time, we will send copies to 
congressional committees with jurisdiction over FAA and executive 
branch agencies' information security programs, the Secretary of 
Transportation, the FAA Administrator, the DOT Inspector General, and 
other interested parties. We also will make copies available to others 
on request. In addition, this report will be available at no charge on 
the GAO Web site at [Hyperlink, http://www.gao.gov]. 

If you have any questions regarding this report, please contact me at 
(202) 512-6244 or by e-mail at [Hyperlink, wilshuseng@gao.gov]. Contact 
points for our Offices of Congressional Relations and Public Affairs 
may be found on the last page of this report. Key contributors to this 
report are listed in appendix I. 

Signed by: 

Gregory C. Wilshusen: 
Director, Information Security Issues: 

[End of section]

Appendixes: 

Appendix I: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Gregory C. Wilshusen (202) 512-6244: 

Acknowledgments: 

In addition to the person named above, Edward Alexander, Mark Canter, 
Nicole Carpenter, Jason Carroll, Lon Chin, William Cook, Kirk 
Daubenspeck, Neil Doherty, Patrick Dugan, Joanne Fiorino, Edward 
Glagola, Steve Gosewehr, Jeffrey Knott, Carol Langelier, Harold Lewis, 
Duc Ngo, Eugene Stevens, and Chris Warweg made key contributions to 
this report. 

(310523): 

FOOTNOTES

[1] We have issued numerous reports and testimonies on FAA's 
modernization efforts. See, for example, GAO, Federal Aviation 
Administration: Stronger Architecture Program Needed to Guide Systems 
Modernization Efforts, GAO-05-266 (Washington, D.C. Apr. 29, 2005) and 
GAO, Air Traffic Control: FAA's Modernization Efforts--Past, Present, 
and Future, GAO-04-227T (Washington, D.C. Oct. 30, 2003). Since 1995, 
we have designated the modernization program as high risk because of 
the program's size, importance, and complexity and because of the cost 
and numerous problems it has encountered in systems acquisition. 

[2] For example, see GAO, FAA Computer Security: Recommendations to 
Address Continuing Weaknesses, GAO-01-171 (Washington, D.C. Dec. 6, 
2000); GAO, FAA Computer Security: Concerns Remain Due to Personnel and 
Other Continuing Weaknesses, GAO/AIMD-00-252 (Washington, D.C. Aug. 16, 
2000); and GAO, Air Traffic Control: Weak Computer Security Practices 
Jeopardize Flight Safety, GAO/AIMD-98-155 (Washington, D.C. May 18, 
1998). 

[3] GAO, High Risk Series: An Update, GAO-05-207 (Washington, D.C. 
January 2005). 

[4] Federal Information Security Management Act of 2002, Title III, E-
Government Act of 2002, P.L. 107-347 (Dec. 17, 2002). 

[5] GAO, Federal Information System Controls Audit Manual, Volume I-
Financial Statements Audits, GAO/AIMD-12.19.6 (Washington, D.C. January 
1999). 

[6] Operational controls focus on controls that are executed by people 
(as opposed to systems). Management controls address security 
techniques and concerns that are normally addressed by organization's 
information security program management, such as management of risk 
within the organization. Technical controls focus on the security 
controls that information systems execute; these controls require 
significant operational considerations and should be consistent with 
management of security within the organization. 

[7] A denial-of-service attack is an attack on a network that sends a 
flood of useless traffic that prevents legitimate use of the network. 

[8] A certificate is a data record that is used for authenticating 
network entities such as a server or a client. 

[9] Cryptography relies on two basic components: an algorithm and a 
key. The algorithm is the mathematical function used to encrypt or 
decrypt, and the key is the parameter used in the transformation. A 
private key is uniquely associated with an entity. 

[10] For example, see GAO, Information Security: Continued Action 
Needed to Improve Software Patch Management, GAO-04-706 (Washington, 
D.C. June 2, 2004). 

[11] GAO/AIMD-98-155. 

[12] Office of Management and Budget, Circular A-130, Appendix III, 
Security of Federal Automated Information Resources (Nov. 28, 2000). 

[13] GAO, FAA Computer Security: Actions Needed to Address Critical 
Weaknesses That Jeopardize Aviation Operations, GAO/T-AIMD-00-330 
(Washington, D.C. Sept. 27, 2000). 

[14] For "high risk" positions, OPM recommends a background 
investigation, which includes a National Agency Check, credit search, 
personal interviews of subject and sources, written inquiries, and 
record searches covering specific areas of a person's background during 
the most recent 5 years, and additional record searches during the most 
recent 7 years. 

[15] A minimum background investigation is an investigation consisting 
of a National Agency Check and Inquiry, a credit search, and telephone 
inquiries to follow-up on written inquiries not returned. 

[16] FISMA requires each agency to develop, document, and implement an 
agencywide information security program to provide information security 
for the information and systems that support the operations and assets 
of the agency, including those operated or maintained by contractors or 
others on behalf of the agency, using a risk-based approach to 
information security management. 

[17] OMB information security policy requires agency management 
officials to formally authorize each of their information systems to 
process, store, or transmit information, and to accept the risk 
associated with their operation. This authorization (accreditation) 
decision is to be supported by a formal technical evaluation 
(certification) of the management, operational, and technical controls 
established in an information system's security plan. 

[18] A general support system is an interconnected set of information 
resources under the same direct management control that shares common 
functionality. It normally includes hardware, software, information, 
data, applications, communications, facilities, and people and provides 
support for a variety of users and/or applications. 

[19] We selected 65 individuals in total from the sites we visited. We 
did not select a statistical sample. Some selections were random from a 
listing of employees and contractors on-site, while others were based 
on the role of an individual, such as a system administrator. 

GAO's Mission: 

The Government Accountability Office, the investigative arm of 
Congress, exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO's commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains 
abstracts and full-text files of current reports and testimony and an 
expanding archive of older products. The Web site features a search 
engine to help you locate documents using key words and phrases. You 
can print these documents in their entirety, including charts and other 
graphics. 

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as "Today's Reports," on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order 
GAO Products" heading. 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office

441 G Street NW, Room LM

Washington, D.C. 20548: 

To order by Phone: 

Voice: (202) 512-6000: 

TDD: (202) 512-2537: 

Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm

E-mail: fraudnet@gao.gov

Automated answering system: (800) 424-5454 or (202) 512-7470: 

Public Affairs: 

Jeff Nelligan, managing director,

NelliganJ@gao.gov

(202) 512-4800

U.S. Government Accountability Office,

441 G Street NW, Room 7149

Washington, D.C. 20548: