This is the accessible text file for GAO report number GAO-07-364 
entitled 'Information Security: Further Efforts Needed to Address 
Significant Weaknesses at the Internal Revenue Service' which was 
released on March 30, 2007. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to the Commissioner of Internal Revenue: 

United States Government Accountability Office: 

GAO: 

March 2007: 

Information Security: 

Further Efforts Needed to Address Significant Weaknesses at the 
Internal Revenue Service: 

GAO-07-364: 

GAO Highlights: 

Highlights of GAO-07-364, a report to the Commissioner of Internal 
Revenue 

Why GAO Did This Study: 

In fiscal year 2006, the Internal Revenue Service (IRS) collected about 
$2.5 trillion in tax payments and paid about $277 billion in refunds. 
Because IRS relies extensively on computerized systems, effective 
information security controls are essential to ensuring that financial 
and taxpayer information is adequately protected from inadvertent or 
deliberate misuse, fraudulent use, improper disclosure, or destruction. 

As part of its audit of IRS’s fiscal years 2006 and 2005 financial 
statements, GAO assessed (1) IRS’s actions to correct previously 
reported information security weaknesses and (2) whether controls were 
effective in ensuring the confidentiality, integrity, and availability 
of financial and sensitive taxpayer information. To do this, GAO 
examined IRS information security policies and procedures, guidance, 
security plans, reports, and other documents; tested controls over five 
critical applications at three IRS sites; and interviewed key security 
representatives and management officials. 

What GAO Found: 

IRS has made limited progress toward correcting or mitigating 
previously reported information security weaknesses at two data 
processing sites, but 66 percent of the weaknesses that GAO had 
previously identified still existed. Specifically, IRS has corrected or 
mitigated 25 of the 73 information security weaknesses that GAO 
reported as unresolved at the time of our last review. For example, IRS 
has improved password controls on its servers and enhanced audit and 
monitoring efforts for mainframe and Windows user activity, but it 
continues to (1) use inadequate account lockout settings for Windows 
servers and (2) inadequately verify employees’ identities against 
official IRS photo identification. 

Significant weaknesses in access controls and other information 
security controls continue to threaten the confidentiality, integrity, 
and availability of IRS’s financial and tax processing systems and 
information. For example, IRS has not implemented effective access 
controls related to user identification and authentication, 
authorization, cryptography, audit and monitoring, physical security, 
and other information security controls. These weaknesses could impair 
IRS’s ability to perform vital functions and increase the risk of 
unauthorized disclosure, modification, or destruction of financial and 
sensitive taxpayer information. Accordingly, GAO has reported a 
material weakness in IRS’s internal controls over its financial and tax 
processing systems. 

A primary reason for the new and old weaknesses is that IRS has not yet 
fully implemented its information security program. IRS has taken a 
number of steps to develop, document, and implement an information 
security program. However, the agency has not yet fully or consistently 
implemented critical elements of its program. Until IRS fully 
implements an agencywide information security program that includes 
risk assessments, enhanced policies and procedures, security plans, 
training, adequate tests and evaluations, and a continuity of 
operations process for all major systems, the financial and sensitive 
taxpayer information on its systems will remain vulnerable. 

What GAO Recommends: 

GAO is recommending that the IRS Commissioner take several actions to 
fully implement an agencywide information security program. In 
commenting on a draft of this report, IRS agreed to address all 
recommendations. 

[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-364]. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Greg Wilshusen at (202) 
512-6244 or WilshusenG@gao.gov or Keith A. Rhodes at (202) 512-6412 or 
Rhodesk@gao.gov. 

[End of section] 

Contents: 

Letter: 

Results in Brief: 

Background: 

Objectives, Scope, and Methodology: 

IRS Made Limited Progress in Correcting Previously Reported Weaknesses: 

Significant Weaknesses Continue to Place Financial and Taxpayer 
Information at Risk: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments: 

Appendix I: Comments from the Commissioner of Internal Revenue: 

Appendix II: GAO Contacts and Staff Acknowledgments: 

Abbreviations: 

CIO: Chief Information Officer: 
FISMA: Federal Information Security Management Act: 
IRS: Internal Revenue Service: 
MA&SS: Mission Assurance and Security Services: 
NIST: National Institute of Standards and Technology: 
OMB: Office of Management and Budget: 
TIGTA: Treasury Inspector General for Tax Administration: 

United States Government Accountability Office: 
Washington, DC 20548: 

March 30, 2007: 

The Honorable Mark W. Everson: 
Commissioner of Internal Revenue: 

Dear Commissioner Everson: 

The Internal Revenue Service (IRS) has a demanding responsibility in 
collecting taxes, processing tax returns, and enforcing the nation's 
tax laws. It relies extensively on computerized systems to support its 
financial and mission-related operations. Effective information system 
controls are essential to ensuring that financial and taxpayer 
information are adequately protected from inadvertent or deliberate 
misuse, fraudulent use, improper disclosure, or destruction. These 
controls also affect the confidentiality, integrity, and availability 
of financial and sensitive taxpayer information. 

As part of our audit of IRS's fiscal years 2006 and 2005 financial 
statements, we assessed the effectiveness of the service's information 
security controls[Footnote 1] over key financial systems, information, 
and interconnected networks at three locations. These systems support 
the processing, storage, and transmission of financial and sensitive 
taxpayer information. In our report on IRS's fiscal years 2006 and 2005 
financial statements,[Footnote 2] we reported that the new information 
security deficiencies we identified in fiscal year 2006 and the 
unresolved deficiencies from prior audits represent a material 
weakness[Footnote 3] in internal controls over financial and tax 
processing systems. 

We assessed (1) the status of IRS's actions to correct or mitigate 
previously reported information security weaknesses at two data 
processing sites and (2) whether controls over key financial and tax 
processing systems are effective in ensuring the confidentiality, 
integrity, and availability of financial and sensitive taxpayer 
information. 

This report provides a general summary of the vulnerabilities 
identified and our recommendations to help strengthen and improve IRS's 
information security program. We are also issuing a separate report for 
limited distribution that contains sensitive information. It describes 
in more detail the information security weaknesses that we identified 
and our specific recommendations for correcting them. 

We performed our review in accordance with generally accepted 
government auditing standards, from June 2006 through November 2006. 

Results in Brief: 

IRS has made limited progress toward correcting previously reported 
information security weaknesses at two data processing sites. It has 
corrected or mitigated 25 of the 73 information security weaknesses 
that we reported as unresolved at the time of our last review at those 
sites. Actions have been taken to address weaknesses related to access 
controls and configuration management, among other things. For example, 
IRS has implemented controls used to authorize access to Windows 
systems, network devices,[Footnote 4] databases, and mainframe systems; 
improved password controls on its servers; enhanced audit and 
monitoring efforts for mainframe and Windows user activity; conducted a 
facility risk assessment at a critical data processing site; and 
improved change controls over one of its mainframe systems. 
Nevertheless, 66 percent, or 48 of the 73 previously identified 
information security weaknesses remain unresolved. 

Significant weaknesses in access controls and other information 
security controls continue to threaten the confidentiality, integrity, 
and availability of IRS's financial and tax processing systems and 
information. IRS has not consistently implemented effective access 
controls to prevent, limit, or detect unauthorized access to computing 
resources from within its internal network. These access controls 
include those related to user identification and authentication, 
authorization, cryptography, audit and monitoring, and physical 
security. In addition, IRS faces risks to its financial and sensitive 
taxpayer information due to weaknesses in configuration management, 
segregation of duties, media destruction and disposal, and personnel 
security controls. A key reason for the information security weaknesses 
in IRS's financial and tax processing systems is that it has not yet 
fully implemented its agencywide information security program to ensure 
that controls are effectively established and maintained. As a result, 
weaknesses in information security controls over its key financial and 
tax processing systems could impair IRS's ability to perform vital 
functions and could increase the risk of unauthorized disclosure, 
modification, or destruction of financial and sensitive taxpayer 
information. 

We are making recommendations to the Commissioner of Internal Revenue 
to take several actions to fully implement a comprehensive agencywide 
information security program. We also are making recommendations to the 
commissioner in a separate report with limited distribution. These 
recommendations consist of actions to be taken to correct the specific 
information security weaknesses related to user identification and 
authentication, authorization, cryptography, audit and monitoring, 
physical security, configuration management, segregation of duties, 
media destruction and disposal, and personnel security. 

In providing written comments on a draft of this report, the 
Commissioner of Internal Revenue recognized that continued diligence of 
IRS's security and privacy responsibilities is required. He further 
stated that IRS would continue to remedy all recommendations to 
completion to ensure that operations of its applications and systems 
adhere to security requirements. 

Background: 

Information security is a critical consideration for any organization 
that depends on information systems and computer networks to carry out 
its mission or business. It is especially important for government 
agencies, where the public's trust is essential. The dramatic expansion 
in computer interconnectivity and the rapid increase in the use of the 
Internet are changing the way our government, the nation, and much of 
the world communicate and conduct business. Without proper safeguards, 
systems are unprotected from individuals and groups with malicious 
intent who can intrude and use their access to obtain sensitive 
information, commit fraud, disrupt operations, or launch attacks 
against other computer systems and networks. These concerns are well 
founded for a number of reasons, including the dramatic increase in 
reports of security incidents, the ease of obtaining and using hacking 
tools, and steady advances in the sophistication and effectiveness of 
attack technology. 

Our previous reports, and those by the Treasury Inspector General for 
Tax Administration (TIGTA), describe persistent information security 
weaknesses that place federal agencies, including IRS, at risk of 
disruption, fraud, or inappropriate disclosure of sensitive 
information. Recognizing the importance of securing federal agencies' 
information systems, Congress enacted the Federal Information Security 
Management Act (FISMA) in December 2002[Footnote 5] to strengthen the 
security of information and systems within federal agencies. FISMA 
requires each agency to develop, document, and implement an agencywide 
information security program to provide information security for the 
information and systems that support the operations and assets of the 
agency, using a risk-based approach to information security management. 
Such a program includes developing and implementing security plans, 
policies, and procedures; testing and evaluating the effectiveness of 
controls; assessing risk; providing specialized training; planning, 
implementing, evaluating, and documenting remedial action to address 
information security deficiencies; and ensuring continuity of 
operations. We have designated information security as a governmentwide 
high-risk area since 1997[Footnote 6]--a designation that remains in 
force today.[Footnote 7] 

IRS has demanding responsibilities in collecting taxes, processing tax 
returns, and enforcing the nation's tax laws. It relies extensively on 
computerized systems to support its financial and mission-related 
operations. In fiscal year 2006, IRS collected about $2.5 trillion in 
tax payments, processed hundreds of millions of tax and information 
returns, and paid about $277 billion in refunds to taxpayers. IRS is a 
large and complex organization, adding unique mission operational 
challenges for management. It employs tens of thousands of people in 10 
service center campuses, 3 computing centers, and numerous other field 
offices throughout the United States. 

IRS also collects and maintains a significant amount of personal and 
financial information on each American taxpayer. The confidentiality of 
this sensitive information must be protected; otherwise, taxpayers 
could be exposed to loss of privacy and to financial loss and damages 
resulting from identity theft or other financial crimes. 

The Commissioner of Internal Revenue has overall responsibility for 
ensuring the confidentiality, availability, and integrity of the 
information and information systems that support the agency and its 
operations. FISMA states that the Chief Information Officer (CIO) is 
responsible for developing and maintaining an information security 
program. Within IRS, this responsibility is delegated to the Chief of 
Mission Assurance and Security Services (MA&SS). The Chief of MA&SS is 
responsible for developing policies and procedures regarding 
information technology security; establishing a security awareness and 
training program; conducting security audits; coordinating the 
implementation of logical access controls into IRS systems and 
applications; providing physical and personnel security; and, among 
other things, monitoring IRS security activities. To help accomplish 
these goals, MA&SS has developed and published information security 
policies, guidelines, standards, and procedures in the Internal Revenue 
Manual, the Law Enforcement Manual, and other documents. The 
Modernization and Information Technology Services organization, led by 
the CIO, is responsible for developing security controls for systems 
and applications; conducting annual tests of systems; implementing, 
testing, and validating the effectiveness of remedial actions; ensuring 
that continuity of operations requirements are addressed for all 
applications and systems it owns; and mitigating technical 
vulnerabilities and validating the mitigation strategy. 

Objectives, Scope, and Methodology: 

The objectives of our review were to determine (1) the status of IRS's 
actions to correct or mitigate previously reported weaknesses at two 
data processing sites and (2) whether controls over key financial and 
tax processing systems located at three sites were effective in 
ensuring the confidentiality, integrity, and availability of financial 
and sensitive taxpayer information. This review was completed to 
support the annual financial statement audit, by assessing the 
effectiveness of information system controls for the purposes of 
supporting our opinion on internal controls over the preparation of the 
financial statements. 

We concentrated our evaluation primarily on threats emanating from 
sources internal to IRS's computer networks. Our evaluation was based 
on (1) our Federal Information System Controls Audit Manual, which 
contains guidance for reviewing information system controls that affect 
the confidentiality, integrity, and availability of computerized 
information; (2) FISMA, which establishes key elements that are 
required for an effective agencywide information security program; and 
(3) previous reports from TIGTA and GAO. Specifically, we evaluated 
information security controls that are intended to: 

* prevent, limit, and detect electronic access to computer resources 
(information, programs, and systems), thereby protecting these 
resources against unauthorized disclosure, modification, and use; 

* provide physical protection of computer facilities and resources from 
espionage, sabotage, damage, and theft; 

* prevent the exploitation of security vulnerabilities; 

* prevent the introduction of unauthorized changes to application or 
system software; 

* ensure that work responsibilities for computer functions are 
segregated so that one individual does not perform or control all key 
aspects of computer-related operations and, thereby, have the ability 
to conduct unauthorized actions or gain unauthorized access to assets 
or records without detection; 

* provide confidentiality of used media; and: 

* limit the disruption to a system due to the intentional or 
unintentional actions of individuals. 

In addition, we evaluated IRS's agencywide information security 
program. We identified and reviewed pertinent IRS information security 
policies and procedures, guidance, security plans, relevant reports, 
and other documents. We also tested the effectiveness of information 
security controls at three IRS sites. We focused on five critical 
applications that directly or indirectly support the processing of 
material transactions that are reflected in the agency's financial 
statement. These applications are used for procurement, asset 
management, and tax administration, which are located at the sites. We 
also discussed with key security representatives and management 
officials whether information security controls were in place, 
adequately designed, and operating effectively. 

IRS Made Limited Progress in Correcting Previously Reported Weaknesses: 

IRS has made limited progress toward correcting previously reported 
information security weaknesses at two data processing sites. 
Specifically, it has corrected or mitigated 25 of the 73 weaknesses 
that we reported as unresolved at the time of our last review. IRS 
corrected weaknesses related to access controls and configuration 
management, among others. For example, it has: 

* made progress in implementing controls used to authorize access to 
Windows systems, network devices, databases, and mainframe systems by, 
among other things, removing administrative privileges from Windows 
users who did not need them to perform job duties; securely configuring 
the protocol used for managing network performance; improving control 
over data sharing among mainframe users; and restricting a certain 
access privilege to mainframe users who did not need it to perform 
their job duties; 

* improved password controls on its servers by installing a password 
filter on Windows systems requiring users to create passwords in 
accordance with IRS policy, discontinuing the use of stored passwords 
in clear text for automatic logon files and structured query language 
scripts, and requiring password complexity and stronger password 
expiration policies on Windows systems; 

* enhanced audit and monitoring efforts for mainframe and Windows user 
activity; 

* conducted a facility risk assessment at a critical data processing 
site; and: 

* improved change controls over one of IRS's mainframe systems. 

In addition, IRS has made progress in enhancing its information 
security program. For example, IRS has trained its staff to restore 
operations in the event of an emergency at an off-site location, 
assessed risks for the systems we reviewed, certified and accredited 
the systems we reviewed, enhanced information security awareness and 
training by providing training to employees and contractors, and 
established an ongoing process of testing and evaluating its systems to 
ensure compliance with policies and procedures. 

Although IRS has made progress in correcting many of the previously 
identified security weaknesses, 48 weaknesses (66 percent) remain 
unresolved. For example, IRS continued to, among other things, 

* use inadequate account lockout settings for Windows servers, 

* improperly restrict file permissions on UNIX systems, 

* routinely permit unencrypted protocols for remote logon capability to 
servers, 

* insufficiently monitor system activities and configure certain 
servers to ensure adequate audit trails, 

* inadequately verify employees' identities against official IRS photo 
identification, 

* use an ineffective patch management program, and: 

* use disaster recovery plans that did not include disaster recovery 
procedures for certain mission-critical systems. 

Significant Weaknesses Continue to Place Financial and Taxpayer 
Information at Risk: 

Significant weaknesses in access controls and other information 
security controls continue to threaten the confidentiality, integrity, 
and availability of IRS's financial and tax processing systems and 
information. A primary reason for these weaknesses is that IRS has not 
yet fully implemented its information security program. As a result, 
IRS's ability to perform vital functions could be impaired and the risk 
of unauthorized disclosure, modification, or destruction of financial 
and sensitive taxpayer information is increased. 

Access Controls Were Inadequate: 

A basic management objective for any organization is to protect the 
resources that support its critical operations from unauthorized 
access. Organizations accomplish this objective by designing and 
implementing controls that are intended to prevent, limit, and detect 
unauthorized access to computing resources, programs, information, and 
facilities. Inadequate access controls diminish the reliability of 
computerized information and increase the risk of unauthorized 
disclosure, modification, and destruction of sensitive information and 
disruption of service. Access controls include those related to user 
identification and authentication, authorization, cryptography, audit 
and monitoring, and physical security. IRS did not ensure that it 
consistently implemented effective access controls in each of these 
areas, as the following sections in this report demonstrate. 

User Identification and Authentication: 

A computer system must be able to identify and authenticate different 
users so that activities on the system can be linked to specific 
individuals. When an organization assigns unique user accounts to 
specific users, the system is able to distinguish one user from 
another--a process called identification. The system also must 
establish the validity of a user's claimed identity by requesting some 
kind of information, such as a password, that is known only by the 
user--a process known as authentication. According to IRS policy, user 
accounts will be associated with only one individual or process and 
should automatically lockout after three consecutive failed logon 
attempts. If user accounts are not associated with an individual (e.g., 
group user accounts), they must be controlled, audited, and managed. In 
addition, IRS policy requires strong enforcement of passwords for 
authentication to IRS systems. For example, passwords are to expire and 
are not to be shared by users. 

IRS did not adequately control the identification and authentication of 
users to ensure that only authorized individuals were granted access to 
its systems. For example, administrators at one site shared logon 
accounts and passwords when accessing a database production server for 
the procurement system.[Footnote 8] By allowing users to share accounts 
and passwords, individual accountability for authorized system activity 
as well as unauthorized system activity could be lost. In addition, at 
the same site, IRS did not enforce strong password management on the 
same database production server. Accounts did not lock out users after 
failed logon attempts and passwords did not expire. As a result, the 
database was susceptible to a brute force password attack that could 
result in unauthorized access. Furthermore, at another site, IRS stored 
user IDs and passwords in mainframe files that could be read by every 
mainframe user. As a result, increased risk exists that an intruder or 
unauthorized user could read and use these IDs and passwords to log on 
to the computer systems and masquerade as an authorized user. 

Authorization: 

Authorization is the process of granting or denying access rights and 
permissions to a protected resource, such as a network, a system, an 
application, a function, or a file. A key component of granting or 
denying access rights is the concept of "least privilege." Least 
privilege is a basic principle for securing computer resources and 
information. This principle means that users are granted only those 
access rights and permissions that they need to perform their official 
duties. To restrict legitimate users' access to only those programs and 
files that they need to do their work, organizations establish access 
rights and permissions. "User rights" are allowable actions that can be 
assigned to users or to groups of users. File and directory permissions 
are rules that regulate which users can access a particular file or 
directory and the extent of that access. To avoid unintentionally 
authorizing users access to sensitive files and directories, an 
organization must give careful consideration to its assignment of 
rights and permissions. IRS policy requires that all production systems 
be securely configured to specifically limit access privileges to only 
those individuals who need them to perform their official duties. 

IRS permitted excessive access to key financial systems by granting 
rights and permissions that gave users more access than they needed to 
perform their official duties. For example, at one site, excessive read 
access was allowed to production system libraries that contained 
mainframe configuration information. In addition, this site did not 
maintain documentation of approved access privileges allowed to each 
system resource by each user group. Without such documentation, IRS 
limits its ability to monitor and verify user access privileges. 
Furthermore, IRS did not appropriately restrict the use of anonymous e-
mails on the two mainframe systems we reviewed. These servers allowed 
anonymous e-mails from one of our analysts masquerading as a legitimate 
sender and could expose IRS employees to malicious activity, including 
phishing.[Footnote 9] At another site, IRS granted all users excessive 
privileges to sensitive files on its production database server for the 
procurement system. Additionally, the procurement system was vulnerable 
to a well-known exploit whereby database commands could be inserted 
into the application through a user input screen that was available to 
everyone on the agency's network. Administrative privileges also were 
granted to the procurement system's database application user ID at 
this location. This user ID allowed extensive administrative privileges 
that were inappropriate for this type of account. Excessive or 
unauthorized access privileges provide opportunities for individuals to 
circumvent security controls. 

Cryptography: 

Cryptography[Footnote 10] underlies many of the mechanisms used to 
enforce the confidentiality and integrity of critical and sensitive 
information. A basic element of cryptography is encryption. Encryption 
can be used to provide basic data confidentiality and integrity, by 
transforming plain text into cipher text using a special value known as 
a key and a mathematical process known as an algorithm. IRS policy 
requires the use of encryption for transferring sensitive but 
unclassified information between IRS facilities. The National Security 
Agency also recommends disabling protocols that do not encrypt 
information transmitted across the network, such as user ID and 
password combinations. 

IRS did not consistently apply encryption to protect sensitive data 
traversing its network. For example, at one site, IRS was using an 
unencrypted protocol to manage network devices on a local server. In 
addition, the procurement application and the UNIX servers we reviewed 
at another site were using unencrypted protocols. Therefore, all 
information, including user ID and password information, was being sent 
across the network in clear text. These weaknesses could allow an 
attacker to view information and use that knowledge to gain access to 
financial and system data being transmitted over the network. 

Audit and Monitoring: 

To establish individual accountability, monitor compliance with 
security policies, and investigate security violations, it is crucial 
to determine what, when, and by whom specific actions have been taken 
on a system. Organizations accomplish this by implementing system or 
security software that provides an audit trail, or logs of system 
activity, that they can use to determine the source of a transaction or 
attempted transaction and to monitor users' activities. The way in 
which organizations configure system or security software determines 
the nature and extent of information that can be provided by the audit 
trail. To be effective, organizations should configure their software 
to collect and maintain audit trails that are sufficient to track 
security-relevant events. The Internal Revenue Manual requires that 
auditable events be captured and audit logs be used to review what 
occurred after an event, for periodic reviews, and for real-time 
analysis. In addition, the manual requires that audit logs be 
maintained and archived in a way that allows for efficient and 
effective retrieval, viewing, and analysis, and that the logs be 
protected from corruption, alteration, or deletion. 

IRS did not consistently audit and monitor security-relevant system 
activity on its applications. According to IRS officials, IRS did not 
capture auditable events for its procurement application as a result of 
system performance issues. Therefore, no audit reports were being 
reviewed by managers for this application. In addition, IRS was unable 
to effectively monitor activity for its administrative financial system 
because the volume of the information in the log made it difficult for 
IRS officials to systematically analyze targeted activities and 
security-relevant events or archive logs. As a result, unauthorized 
access could go undetected, and the agency's ability to trace or 
recreate events in the event of a system modification or disruption 
could be diminished. 

Physical Security: 

Physical access controls are used to mitigate the risks to systems, 
buildings, and supporting infrastructure related to their physical 
environment and to control the entry and exit of personnel in buildings 
as well as data centers containing agency resources. Examples of 
physical security controls include perimeter fencing, surveillance 
cameras, security guards, and locks. Without these protections, IRS 
computing facilities and resources could be exposed to espionage, 
sabotage, damage, and theft. IRS policy states that only authorized 
personnel should have access to IRS buildings and structures. 

Although IRS has implemented physical security controls over its 
information technology resources, certain weaknesses reduce the 
effectiveness of these controls. For example: 

* IRS did not physically protect a server containing source code for 
its procurement application. The server was not located in a secured 
computer room; instead, it was located in a cubicle. 

* IRS did not consistently manage the use of proximity cards, which are 
used to gain access to secured IRS facilities. For example, one of the 
sites we visited could not account for active proximity cards for at 
least 11 separated employees. At that same site, at least 12 employees 
and contractors were given proximity cards that allowed them access to 
a computer room, although these individuals did not need this access to 
perform their official duties. 

* IRS did not always effectively secure certain restricted areas. For 
example, it implemented motion detectors at one site to release the 
locks on doors that lead from areas that are accessible by the general 
public directly into IRS-controlled areas. The motion detector's field 
of view was set wider than necessary, so that an unauthorized 
individual would simply have to wait for an authorized individual to 
pass by the motion detector on the IRS-controlled side of the door to 
gain unauthorized access to the IRS facility. 

As a result, IRS is at increased risk of unauthorized access to 
financial information and inadvertent or deliberate disruption of 
procurement services. 

Other Information System Controls Were Not Sufficient: 

In addition to access controls, other important controls should be in 
place to ensure the confidentiality, integrity, and availability of an 
organization's information. These controls include policies, 
procedures, and techniques for securely configuring information 
systems, segregating incompatible duties, sufficiently disposing of 
media, and implementing personnel security. Weaknesses in these areas 
increase the risk of unauthorized use, disclosure, modification, or 
loss of IRS's information and information systems. 

Configuration Management: 

The purpose of configuration management is to establish and maintain 
the integrity of an organization's work products. By implementing 
configuration management, organizations can better ensure that only 
authorized applications and programs are placed into operation through 
establishing and maintaining baseline configurations and monitoring 
changes to these configurations. According to IRS policy, changes to 
baseline configurations should be monitored and controlled. Patch 
management, a component of configuration management, is an important 
factor in mitigating software vulnerability risks. Proactively managing 
vulnerabilities of systems will reduce or eliminate the potential for 
exploitation and involves considerably less time and effort than 
responding after an exploit has occurred. Up-to-date patch installation 
can help diminish vulnerabilities associated with flaws in software 
code. Attackers often exploit these flaws to read, modify, or delete 
sensitive information; disrupt operations; or launch attacks against 
other organizations' systems. According to the National Institute of 
Standards and Technology (NIST), tracking patches allows organizations 
to identify which patches are installed on a system and provides 
confirmation that the appropriate patches have been applied. IRS's 
patch management policy also requires that patches be implemented in a 
timely manner, and that critical patches are applied within 72 hours to 
minimize vulnerabilities. 

IRS did not properly implement configuration management procedures. For 
example, IRS did not record successful changes to baseline 
configurations on one of its mainframe systems, which supports its 
general ledger for tax administration activities. Without adequately 
logging system configuration changes, IRS cannot adequately ensure they 
are properly monitored and controlled. In addition, IRS did not 
effectively track or install patches in a timely manner. For example, 
one IRS location did not have a tracking process in place to ensure 
that up-to-date patches have been applied on UNIX servers. Furthermore, 
installation of critical patches through the configuration management 
process for Windows systems was not timely. For example, critical 
Windows patches released in July 2006 had not yet been applied at the 
time of our review in August 2006. As a result, increased risk exists 
that the integrity of IRS systems could be compromised. 

Segregation of Duties: 

Segregation of duties refers to the policies, procedures, and 
organizational structures that help ensure that no single individual 
can independently control all key aspects of a process or computer-
related operation and thereby gain unauthorized access to assets or 
records. Often, organizations achieve segregation of duties by dividing 
responsibilities among two or more individuals or organizational 
groups. This diminishes the likelihood that errors and wrongful acts 
will go undetected, because the activities of one individual or group 
will serve as a check on the activities of the other. Inadequate 
segregation of duties increases the risk that erroneous or fraudulent 
transactions could be processed, improper program changes implemented, 
and computer resources damaged or destroyed. The Internal Revenue 
Manual requires that IRS divide and separate duties and 
responsibilities of incompatible functions among different individuals, 
so that no individual shall have all of the necessary authority and 
system access to disrupt or corrupt a critical security process. 

IRS did not always properly segregate incompatible duties. For example, 
IRS established test accounts on a production server for its 
procurement system. Test accounts are used by system developers and are 
not typically found on production servers. Allowing test accounts on 
production servers creates the potential for individuals to perform 
incompatible functions, such as system development and production 
support. Granting this type of access to individuals who do not require 
it to perform their official duties increases the risk that sensitive 
information or programs could be improperly modified, disclosed, or 
deleted. 

Media Destruction and Disposal: 

Media destruction and disposal is a key to ensuring confidentiality of 
information. Media can include magnetic tapes, optical disks (such as 
compact disks), and hard drives. Organizations safeguard used media to 
ensure that the information it contains is appropriately controlled. 
Improperly disposed media can lead to the inappropriate or inadvertent 
disclosure of an agency's sensitive information or the personally 
identifiable information of its employees and customers. This potential 
vulnerability can be mitigated by properly sanitizing the media. 
According to IRS policy, all media should be sanitized prior to 
disposal in such a manner that sensitive information on that media 
cannot be recovered by ordinary means. The policy further requires that 
IRS maintain records certifying that sanitation was performed. 

IRS did not have an appropriate process for disposing of information 
stored on optical disk. According to agency officials at one of the 
sites we visited, discarded optical disks were left unattended in a 
hallway bin awaiting destruction by the cleaning staff. These disks had 
not been sanitized, and IRS staff were unaware if the unattended disks 
contained sensitive information. Furthermore, the cleaning staff did 
not maintain records certifying that the media were destroyed. As a 
result, IRS could not ensure the confidentiality of potentially 
sensitive information stored on optical disks marked for destruction. 

Personnel Security: 

The greatest harm or disruption to a system comes from the actions, 
both intentional and unintentional, of individuals. These intentional 
and unintentional actions can be reduced through the implementation of 
personnel security controls. According to NIST, personnel security 
controls help organizations ensure that individuals occupying positions 
of responsibility (including third-party service providers) are 
trustworthy and meet established security criteria for those positions. 
Organizations should also ensure that information and information 
systems are protected during and after personnel actions, such as 
terminations and transfers. Organizations can decrease the risk of harm 
or disruption of systems by implementing personnel security controls 
associated with personnel screening and termination. Personnel 
screening controls should be implemented when an individual requires 
access to facilities, information, and information systems before 
access is authorized. Organizations should also implement controls for 
when employment is terminated, including ceasing information system 
access and ensuring the return of organizational information system- 
related property (e.g., ID cards or building passes). 

According to the Internal Revenue Manual, contractor employees must 
complete a background investigation to be granted on-site, staff-like 
access to IRS facilities. However, if a background investigation has 
not been completed, individuals may not have access to IRS sensitive 
areas unless they are escorted by an IRS employee. The manual further 
states that managers are responsible for identifying separated 
employees in order to recover IRS assets, such as ID media. Separated 
employees' accounts are to be deactivated within 1 week of an 
individual's departure on friendly terms and immediately upon an 
individual's departure on unfriendly terms. 

IRS did not always ensure the effective implementation of its personnel 
security controls. For example, at two sites, IRS granted 
contractors[Footnote 11] who did not have a completed background 
investigation unescorted physical access to sensitive areas. In 
addition, at all three sites we reviewed, IRS did not appropriately 
remove application access for separated personnel. For example, 19 
individuals who had separated from IRS for periods ranging from 3 weeks 
to 14 months still maintained access to applications during our review 
this year. These practices increase the risk that individuals might 
gain unauthorized access to IRS resources. 

Agencywide Information Security Program Was Not Yet Fully Implemented: 

A key reason for the information security weaknesses in IRS's financial 
and tax processing systems is that it has not yet fully implemented its 
agencywide information security program to ensure that controls are 
effectively established and maintained. FISMA requires each agency to 
develop, document, and implement an information security program that, 
among other things, includes: 

* periodic assessments of the risk and the magnitude of harm that could 
result from the unauthorized access, use, disclosure, disruption, 
modification, or destruction of information and information systems; 

* policies and procedures that (1) are based on risk assessments, (2) 
cost-effectively reduce risks, (3) ensure that information security is 
addressed throughout the life cycle of each system, and (4) ensure 
compliance with applicable requirements; 

* plans for providing adequate information security for networks, 
facilities, and systems; 

* security awareness training to inform personnel of information 
security risks and of their responsibilities in complying with agency 
policies and procedures, as well as training personnel with significant 
security responsibilities for information security; 

* at least annual testing and evaluation of the effectiveness of 
information security policies, procedures, and practices relating to 
management, operational, and technical controls of every major 
information system that is identified in the agency's inventories; 

* a process for planning, implementing, evaluating, and documenting 
remedial action to address any deficiencies in its information security 
policies, procedures, or practices; and: 

* plans and procedures to ensure continuity of operations for 
information systems that support the operations and assets of the 
agency. 

Although IRS continued to make important progress in developing and 
documenting a framework for its information security program, key 
components of the program had not been fully or consistently 
implemented. 

Risk Assessments: 

Identifying and assessing information security risks are essential to 
determining what controls are required. Moreover, by increasing 
awareness of risks, these assessments can generate support for the 
policies and controls that are adopted in order to help ensure that 
these policies and controls operate as intended. The Office of 
Management and Budget (OMB) Circular A-130, appendix III, prescribes 
that risk be reassessed when significant changes are made to 
computerized systems--or at least every 3 years. Consistent with NIST 
guidance, IRS requires its risk assessment process to detail the 
residual risk assessed and potential threats, and to recommend 
corrective actions for reducing or eliminating the vulnerabilities 
identified. 

Although IRS had implemented a risk assessment process, it did not 
always effectively evaluate potential risks for the systems we 
reviewed. IRS has reassessed the risk level for each of its 264 systems 
and categorized them on the basis of risk. Furthermore, the five risk 
assessments that we reviewed were current, documented residual risk 
assessed and potential threats, and recommended corrective actions for 
reducing or eliminating the vulnerabilities they identified. However, 
IRS did not identify many of the vulnerabilities in this report and did 
not assess the risks associated with them. As a result, potential risks 
to these systems may be unknown. 

Policies and Procedures: 

Another key element of an effective information security program is to 
develop, document, and implement risk-based policies, procedures, and 
technical standards that govern security over an agency's computing 
environment. If properly implemented, policies and procedures should 
help reduce the risk that could come from unauthorized access or 
disruption of services. Technical security standards provide consistent 
implementation guidance for each computing environment. Developing, 
documenting, and implementing security policies is important because 
they are the primary mechanisms by which management communicates its 
views and requirements; these policies also serve as the basis for 
adopting specific procedures and technical controls. In addition, 
agencies need to take the actions necessary to effectively implement or 
execute these procedures and controls. Otherwise, agency systems and 
information will not receive the protection that the security policies 
and controls should provide. 

Although IRS has developed and documented information security 
policies, standards, and guidelines that generally provide appropriate 
guidance to personnel responsible for securing information and 
information systems, it did not always provide needed guidance on how 
to guard against significant mainframe security weaknesses. For 
example, IRS policy lacked guidance on how to correctly configure 
certain mainframe IDs used by the operating system and certain powerful 
mainframe programs used to control processing. As a result, IRS has 
reduced assurance that its systems and the information they contain are 
sufficiently protected. 

Security Plans: 

An objective of system security planning is to improve the protection 
of information technology resources. A system security plan provides an 
overview of the system's security requirements and describes the 
controls that are in place--or planned--to meet those requirements. OMB 
Circular A-130 requires that agencies develop system security plans for 
major applications and general support systems, and that these plans 
address policies and procedures for providing management, operational, 
and technical controls. 

IRS had developed system security plans for four of the five systems we 
reviewed. The plans addressed policies and procedures for providing 
management, operational, and technical controls. However, IRS had not 
developed a system security plan for the system that supports its 
general ledger for tax administration activities. As a result, IRS 
cannot ensure that appropriate controls are in place to protect this 
key financial system and critical information. 

Specialized Training: 

People are one of the weakest links in attempts to secure systems and 
networks. Therefore, an important component of an information security 
program is providing required training so that users understand system 
security risks and their own role in implementing related policies and 
controls to mitigate those risks. IRS policy mandates that personnel 
with significant security responsibilities be provided with specialized 
training.[Footnote 12] In addition, IRS policy requires that personnel 
performing information technology security duties meet minimum 
continuing professional education levels in accordance with their 
roles. Specifically, personnel performing technical security roles are 
required to have 24 hours of specialized training per year, personnel 
performing nontechnical roles are required to have 16 hours of 
specialized training per year, and personnel performing executive 
security roles should have 6 hours of specialized training per year. 
IRS policy also requires that effective tracking and reporting 
mechanisms be in place to monitor specialized training. 

Although IRS has made significant progress in providing security 
personnel with job-related training and established a methodology for 
identifying employees with significant security responsibilities, in 
fiscal year 2006, at least 95 individuals with significant security 
responsibilities did not have the minimum number of hours of 
specialized training required by IRS policy. Of those 95 individuals, 
18 had not completed any training for the last reporting year. In 
addition, IRS was not able to determine whether all of its employees 
had met minimum continuing professional education requirements. For 
example, IRS monitored employee training through its Enterprise 
Learning Management System, but the system could not differentiate 
between employees who are required to have only 6 hours of training and 
employees who are required to have more. Furthermore, IRS did not track 
all security-related training courses taken by its employees. These 
conditions increase the risk that employees and contractors may not be 
aware of their security responsibilities. 

Tests and Evaluations of Control Effectiveness: 

Another key element of an information security program is to test and 
evaluate policies, procedures, and controls to determine weather they 
are effective and operating as intended. This type of oversight is a 
fundamental element because it demonstrates management's commitment to 
the security program, reminds employees of their roles and 
responsibilities, and identifies and mitigates areas of noncompliance 
and ineffectiveness. Although control tests and evaluations may 
encourage compliance with security policies, the full benefits are not 
achieved unless the results improve the security program. FISMA 
requires that the frequency of tests and evaluations be based on risks 
and occur no less than annually. IRS policy also requires periodic 
testing and evaluation of the effectiveness of information security 
policies and procedures. 

IRS tested and evaluated information security controls for each of the 
systems we reviewed. However, these evaluations did not address many of 
the vulnerabilities we have identified in this report. For example, 
IRS's test and evaluation plan for its procurement system did not 
include tests for password expiration, insecure protocols, or the 
removal of employees' system access after separation from the agency. 
As a result, IRS has limited assurance that it has appropriately 
implemented controls, and it will be less able to identify needed 
controls. 

Remedial Actions: 

A remedial action plan is a key component described in FISMA. Such a 
plan assists agencies in identifying, assessing, prioritizing, and 
monitoring progress in correcting security weaknesses that are found in 
information systems. According to IRS policy, the agency should 
document weaknesses found during security assessments as well as 
document any planned, implemented, and evaluated remedial actions to 
correct any deficiencies. The policy further requires that IRS track 
the status of resolution of all weaknesses and verify that each 
weakness is corrected. 

IRS has developed and implemented a remedial action process to address 
deficiencies in its information security policies, procedures, and 
practices, however, this remedial action process was not working as 
intended. For example, the verification process used to determine 
whether remedial actions were implemented was not always effective. Of 
the 73 previously reported weaknesses, IRS had indicated that it had 
corrected or mitigated 57 of them. However, of those 57 weaknesses, 33 
still existed at the time of our review. In addition, IRS had 
identified weaknesses but did not document them in a remedial action 
plan. For example, we reviewed system self-assessments for five systems 
and identified at least 8 weaknesses not documented in a remedial 
action plan. These weaknesses pertained to system audit trails, 
approval and distribution of continuity of operations plans, and 
documenting emergency procedures. TIGTA also reported that IRS was not 
tracking all weaknesses found during security assessments in 2006. As a 
result, increased risk exists that known vulnerabilities will not be 
mitigated. 

IRS did not proactively ensure that weaknesses found at one of its 
facilities or on one of its systems were considered and, if necessary, 
corrected at other facilities or on similar systems. Many of the issues 
identified in this report were previously reported at other locations 
and on similar systems. Yet, IRS had not applied those recommendations 
to the facilities and systems we reviewed this year. For example, we 
have been identifying weaknesses with encryption at IRS since 
1998.[Footnote 13] However, IRS was not using encryption to protect 
information traversing its network. In addition, in 2002 we recommended 
that IRS promptly remove system access for separated employees and 
verify that system access has been removed. Nevertheless, IRS did not 
promptly remove system access for separated employees. 

Recognizing the need for a servicewide solution, IRS developed a plan 
in October 2006 to address many of the recurring weaknesses. This plan 
includes remedial actions to address various weaknesses such as access 
authorization, audit and monitoring, configuration management, and 
testing of technical controls. According to IRS, the plan should be 
fully implemented by fiscal year 2012. However, until IRS fully 
implements its plan to address recurring weaknesses, it may not be able 
to adequately protect its information and information systems from 
inadvertent or deliberate misuse, fraudulent use, improper disclosure, 
or destruction. 

Continuity of Operations: 

Continuity of operations planning is a critical component of 
information protection. To ensure that mission-critical operations 
continue, it is necessary to be able to detect, mitigate, and recover 
from service disruptions while preserving access to vital information. 
The elements of robust continuity of operations planning include, among 
others, identifying preventative controls (e.g., environmental 
controls); developing recovery strategies, including alternative 
processing locations; and performing disaster recovery exercises to 
test the effectiveness of continuity of operations plans. According to 
NIST, systems need to have a reasonably well-controlled operating 
environment, and failures in environmental controls such as air-
conditioning systems may cause a service interruption and may damage 
hardware. IRS policy mandates that an alternate processing site be 
identified, and that agreements be in place when the primary processing 
capabilities are unavailable. The policy further requires that each 
application's recovery plan be tested on a yearly basis. 

IRS did not have adequate environmental controls at one of the sites we 
visited. For example, the air-conditioning system for the computer room 
that houses the procurement system could not adequately cool down the 
systems in the room and was supplemented by a portable fan. In 
addition, the fire extinguishers for the same room had not had an up- 
to-date inspection. Without providing adequate environmental controls, 
IRS is at increased risk that critical system hardware may be damaged. 

Also, IRS had established alternate processing sites for four of the 
five applications we reviewed. However, it did not have an alternate 
processing site for its procurement system, and it had not tested the 
application's recovery plan. As a result, unforeseen events could 
significantly impair IRS's ability to fulfill its mission. 

Conclusions: 

IRS has made important progress in correcting or mitigating previously 
reported weaknesses, implementing controls over key financial and tax 
processing systems, and developing and documenting a solid framework 
for its agencywide information security program. However, information 
security weaknesses--both old and new--continue to impair the agency's 
ability to ensure the confidentiality, integrity, and availability of 
financial and sensitive taxpayer information. These deficiencies 
represent a material weakness in IRS's internal controls over its 
financial and tax processing systems. A key reason for these weaknesses 
is that the agency has not yet fully implemented critical elements of 
its agencywide information security program. Until IRS (1) fully 
implements a comprehensive agencywide information security program that 
includes risk assessments, enhanced policies and procedures, security 
plans, training, adequate tests and evaluations, and a continuity of 
operations process for all major systems and (2) begins to address 
weaknesses across the service, its facilities, computing resources, and 
the financial and sensitive taxpayer information on its systems will 
remain vulnerable. 

Recommendations for Executive Action: 

To help establish effective information security over key financial and 
tax processing systems, financial and sensitive taxpayer information, 
and interconnected networks, we recommend that you take the following 
10 actions to implement an agencywide information security program: 

* update the risk assessments for the five systems reviewed to include 
the vulnerabilities identified in this report; 

* update policies and procedures to include guidance on configuring 
mainframe ID's used by the operating system and certain powerful 
mainframe programs used to control processing; 

* develop a system security plan for the system that supports the 
general ledger for tax administration activities; 

* enhance the Enterprise Learning Management System to include all 
security-related training courses taken by IRS employees and 
contractors and to differentiate required training hours for all 
employees; 

* update test and evaluation procedures to include tests for 
vulnerabilities identified in this report, such as password expiration, 
insecure protocols, and removal of system access after separation from 
the agency; 

* implement a revised remedial action verification process that ensures 
actions are fully implemented; 

* document weaknesses identified during security assessments in a 
remedial action plan; 

* provide adequate environmental controls for the computer room that 
houses the procurement system, such as a sufficient air-conditioning 
system and up-to-date fire extinguishers; 

* establish an alternate processing site for the procurement 
application; and: 

* test the procurement system recovery plan. 

We are also making 50 detailed recommendations in a separate report 
with limited distribution. These recommendations consist of actions to 
be taken to correct the specific information security weaknesses 
related to user identification and authentication, authorization, 
cryptography, audit and monitoring, physical security, configuration 
management, segregation of duties, media destruction and disposal, and 
personnel security. 

Agency Comments: 

In providing written comments (reprinted in app. I) on a draft of this 
report, the Commissioner of Internal Revenue stated that IRS 
understands that information security controls are essential for 
ensuring information is adequately protected from inadvertent or 
deliberate misuse, disruption, or destruction. He also noted that IRS 
has taken several steps to create a strong agencywide information 
security program as required by FISMA. The commissioner recognized that 
continued diligence of IRS's security and privacy responsibilities is 
required, and he further stated that IRS will continue to remedy all 
recommendations to completion to ensure that operations of its 
applications and systems adhere to security requirements. 

This report contains recommendations to you. As you know, 31 U.S.C. 720 
requires the head of a federal agency to submit a written statement of 
the actions taken on our recommendations to the Senate Committee on 
Homeland Security and Governmental Affairs and to the House Committee 
on Oversight and Government Reform not later than 60 days from the date 
of the report and to the House and Senate Committees on Appropriations 
with the agency's first request for appropriations made more than 60 
days after the date of this report. Because agency personnel serve as 
the primary source of information on the status of recommendations, GAO 
requests that the agency also provide it with a copy of your agency's 
statement of action to serve as preliminary information on the status 
of open recommendations. 

We are sending copies of this report to interested congressional 
committees and the Secretary of the Treasury. We will also make copies 
available to others upon request. In addition, this report will be 
available at no charge on the GAO Web site at http://www.gao.gov. 

If you have any questions regarding this report, please contact Gregory 
Wilshusen at (202) 512-6244 or Keith Rhodes at (202) 512-6412. We can 
also be reached by e-mail at wilshuseng@gao.gov and rhodesk@gao.gov. 
Contact points for our Offices of Congressional Relations and Public 
Affairs may be found on the last page of this report. Key contributors 
to this report are listed in appendix II. 

Sincerely yours, 

Signed by: 

Gregory C. Wilshusen: 
Director, Information Security Issues: 

Signed by: 

Keith A. Rhodes, Chief Technologist: 

[End of section] 

Appendix I: Comments from the Commissioner of Internal Revenue: 

Commissioner: 
Department Of The Treasury: 
Internal Revenue Service: 
Washington, D.C. 20224: 

March 16, 2007: 

Mr. Gregory C. Wilshusen: 
Director, Information Security Issues: 
U.S. Government Accountability Office: 
441 G Street, NW: 
Washington, DC 20548: 

Dear Mr. Wilshusen: 

I am writing to provide the Internal Revenue Service's (IRS's) comments 
on the Government Accountability Office (GAO) draft report, Information 
Security. Further Efforts Needed to Address Significant Weaknesses at 
the Internal Revenue Service (GAO-07-364). 

Thank you for recognizing the progress IRS has made in taking actions 
to implement more effective information security controls over key 
financial and tax processing systems. The report indicates that the IRS 
has corrected or mitigated several of the specific technical weaknesses 
that GAO reported as unresolved at the time of your last review. We 
understand that effective information security controls are essential 
for ensuring information is adequately protected from inadvertent or 
deliberate misuse, disruption, or destruction. 

The IRS has taken significant steps to create a strong, agency-wide 
information technology security program as required by the Federal 
Information Security Management Act (FISMA). This was noted in the 
recent Treasury Inspector General for Tax Administration assessment of 
IRS's progress toward that goal. We established the Mission Assurance 
and Security Services organization to bring focus to all security 
disciplines. Over the last year, we have made progress in addressing 
computer security deficiencies throughout the IRS by focusing attention 
in key areas: 

* We began an aggressive initiative to complete the full suite of 
security certification and accreditation activities for all IRS 
computer applications and systems to bring them into compliance with 
recently issued National Institute of Standards and Technology (NIST) 
security guidance. 

* We implemented NIST recommendations for the protection of sensitive 
information on laptops and removable media and established a 
comprehensive set of data protection initiatives to further safeguard 
our sensitive agency information. In conjunction with these 
initiatives, policies have been updated and issued; multi-layered 
encryption technology has been deployed; and extensive user training 
has been provided to our personnel. 

* We established an Access Controls Project Team charged with 
documenting the appropriate authorization and access to all IRS systems 
and applications. We are currently implementing an automated process 
that will systematically control the proper authorization for gaining 
access; thus, minimizing our risk of unauthorized disclosure of 
sensitive information and disruption of service. In addition, system 
access privileges are regularly audited using tools that we have in 
place, and all security violations are captured and aggressively 
pursued. 

* We strengthened our IT security program by ensuring that our 
personnel have specialized, role-based training to improve the secure 
operations of all computing environments. 

* We continued our commitment of ensuring that all contractors and 
employees with access to our systems, data, or facilities have had an 
appropriate investigation commensurate with the level of risk of the 
positions they encumber prior to providing access. 

* We developed a Physical Security Design Guide and standard operating 
procedures to improve the security and control of assets and to enhance 
the protections of IRS facilities. By adhering to our corrective action 
monitoring plan, the IRS is addressing physical security 
vulnerabilities at an enterprise level and monitoring for completion. 

* We implemented protections to ensure that our computer and network 
infrastructure systems are resistant to external attacks-thus far, 
there have been no successful penetrations into any IRS systems by 
unauthorized users. 

As mandated by FISMA, all IRS senior officials are actively engaged in 
fulfilling their security responsibilities for the business systems and 
applications in their areas of responsibility. The Chief Information 
Officer and Chief, Mission Assurance and Security Services are 
collaborating with executives throughout the IRS to ensure security 
policies, standards, and procedures are followed across the enterprise. 

The IRS takes its security and privacy responsibilities very seriously. 
While we have made significant progress, we recognize that continued 
diligence is required. The report indicates ten recommendations for 
executive action. We will provide a detailed corrective action plan 
addressing each of the recommendations with our response to the final 
report. We will continue to remedy all recommendations to completion to 
ensure the operations of IRS applications and systems adhere to 
security requirements. 

I appreciate your continued support and the valuable assistance and 
guidance from your staff. If you have any questions, or you would like 
to discuss this response in more detail, please contact Richard Spires, 
Chief Information Officer, at (202) 622-6800 or Daniel Galik, Chief 
Mission Assurance and Security Services at (202) 622-8910. 

Sincerely, 

Signed by: 

Mark W. Everson: 

[End of section] 

Appendix II: GAO Contacts and Staff Acknowledgments: 

GAO Contacts: 

Gregory C. Wilshusen, (202) 512-6244 Keith A. Rhodes, (202) 512-6412: 

Staff Acknowledgments: 

In addition to the persons named above, Don Adams, Bruce Cain, Mark 
Canter, Nicole Carpenter, Jason Carroll, West Coile, Denise 
Fitzpatrick, Edward Glagola Jr., David Hayes, Kevin Jacobi, Jeffrey 
Knott (Assistant Director), George Kovachick, Joanne Landesman, Leena 
Mathew, Kevin Metcalfe, Amos Tevelow, and Chris Warweg made key 
contributions to this report. 

FOOTNOTES 

[1] Information security controls include electronic access controls, 
software change controls, physical security, segregation of duties, and 
continuity of operations. These controls are designed to ensure that 
access to data is appropriately restricted, that only authorized 
changes to computer programs are made, that physical access to 
sensitive computing resources and facilities is protected, that 
computer security duties are segregated, and that back-up and recovery 
plans are adequate to ensure the continuity of essential operations. 

[2] GAO, Financial Audit: IRS's Fiscal Years 2006 and 2005 Financial 
Statements, GAO-07-136 (Washington, D.C.: Nov. 9, 2006). 

[3] A material weakness is a reportable condition that precludes the 
entity's internal controls from providing reasonable assurance that 
material misstatements in the financial statements would be prevented 
or detected on a timely basis. 

[4] Organizations secure their networks, in part, by installing and 
configuring network devices that permit authorized network service 
requests, deny unauthorized requests, and limit the services that are 
available on the network. Devices used to secure networks include (1) 
firewalls that prevent unauthorized access to the network, (2) routers 
that filter and forward data along the network, (3) switches that 
forward information among segments of a network, and (4) servers that 
host applications and data. 

[5] FISMA was enacted as title III, E-Government Act of 2002, Pub. L. 
No. 107-347, 116 Stat. 2946 (Dec. 17, 2002). 

[6] GAO, High-Risk Series: Information Management and Technology, GAO/ 
HR-97-9 (Washington, D.C.: February 1997). 

[7] GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.: 
January 2007). 

[8] This system processed about $3.9 billion in fiscal year 2006. 

[9] Phishing is the act of tricking individuals into disclosing 
sensitive personal information through deceptive computer-based means. 

[10] Cryptography is used to secure transactions by providing ways to 
ensure data confidentiality, data integrity, authentication of the 
message's originator, electronic certification of data, and 
nonrepudiation (proof of the integrity and origin of data that can be 
verified by a third party). 

[11] This year's background investigation review only consisted of 
contractors. 

[12] In its fiscal year 2006 FISMA submission, IRS reported that it has 
2,476 employees with significant security responsibilities. 

[13] GAO, IRS Systems Security: Although Significant Improvements Made, 
Tax Processing Operations and Data Still at Serious Risk, GAO/ AIMD-99-
38 (Washington, D.C.: Dec. 14, 1998); and Information Security: 
Continued Progress Needed to Strengthen Controls at the Internal 
Revenue Service, GAO-06-328 (Washington, D.C.: Mar. 23, 2006). 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts 
newly released reports, testimony, and correspondence on its Web site. 
To have GAO e-mail you a list of newly posted products every afternoon, 
go to www.gao.gov and select "Subscribe to Updates." 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office 441 G Street NW, Room LM 
Washington, D.C. 20548: 

To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202) 
512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S. 
Government Accountability Office, 441 G Street NW, Room 7125 
Washington, D.C. 20548: 

Public Affairs: 

Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800 
U.S. Government Accountability Office, 441 G Street NW, Room 7149 
Washington, D.C. 20548: