Skip to main content

Information Security: IRS Needs to Enhance Internal Control over Financial Reporting and Taxpayer Data

GAO-11-308 Published: Mar 15, 2011. Publicly Released: Mar 15, 2011.
Jump To:
Skip to Highlights

Highlights

The Internal Revenue Service (IRS) has a demanding responsibility in collecting taxes, processing tax returns, and enforcing the nation's tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect financial and sensitive taxpayer information that resides on those systems. As part of its audit of IRS's fiscal years 2010 and 2009 financial statements, GAO assessed whether controls over key financial and tax processing systems are effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information. To do this, GAO examined IRS information security policies, plans, and procedures; tested controls over key financial applications; and interviewed key agency officials at four sites.

Although IRS made progress in correcting previously reported information security weaknesses, control weaknesses over key financial and tax processing systems continue to jeopardize the confidentiality, integrity, and availability of financial and sensitive taxpayer information. Specifically, IRS did not consistently implement controls that were intended to prevent, limit, and detect unauthorized access to its financial systems and information. For example, the agency did not sufficiently (1) restrict users' access to databases to only the access needed to perform their jobs; (2) secure the system it uses to support and manage its computer access request, approval, and review processes; (3) update database software residing on servers that support its general ledger system; and (4) enable certain auditing features on databases supporting several key systems. In addition, 65 of 88--about 74 percent--of previously reported weaknesses remain unresolved or unmitigated. An underlying reason for these weaknesses is that IRS has not yet fully implemented key components of its comprehensive information security program. Although IRS has processes in place intended to monitor and assess its internal controls, these processes were not always effective. For example, IRS's testing did not detect many of the vulnerabilities GAO identified during this audit and did not assess a key application in its current environment. Further, the agency had not effectively validated corrective actions reported to resolve previously identified weaknesses. Although IRS had a process in place for verifying whether each weakness had been corrected, this process was not always working as intended. For example, the agency reported that it had resolved 39 of the 88 previously identified weaknesses; however, 16 of the 39 weaknesses had not been mitigated. IRS has various initiatives underway to bolster security over its networks and systems; however, until the agency corrects the identified weaknesses, its financial systems and information remain unnecessarily vulnerable to insider threats, including errors or mistakes and fraudulent or malevolent acts by insiders. As a result, financial and taxpayer information are at increased risk of unauthorized disclosure, modification, or destruction; financial data is at increased risk of errors that result in misstatement; and the agency's management decisions may be based on unreliable or inaccurate financial information. These weaknesses, considered collectively, are the basis for GAO's determination that IRS had a material weakness in internal control over financial reporting related to information security in fiscal year 2010. GAO recommends that IRS take eight actions to fully implement key components of its comprehensive information security program. In a separate report with limited distribution, GAO is recommending 32 specific actions for correcting newly identified control weaknesses. In commenting on a draft of this report, IRS agreed to develop a detailed corrective action plan to address each recommendation.

Recommendations

Recommendations for Executive Action

Agency Affected Recommendation Status
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should update risk assessments whenever there is a significant change to the system, the facilities where the system resides, or other conditions that may affect the security or status of system accreditation.
Closed – Implemented
In 2012, we validated that IRS had appropriately updated risk assessments.
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should update the risk assessment for the mainframe environment supporting the general ledger for tax-related activities and tax processing applications to include all portions of the environment that could affect security.
Closed – Implemented
In 2012, we validated that IRS had updated the risk assessment for the mainframe environment that supports the general ledger.
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should update policies and procedures pertaining to password controls to ensure they are consistent.
Closed – Implemented
In 2012, we validated that IRS updated policies and procedures pertaining to password controls.
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should document and implement policy and procedures for how systems-managed storage as an access control mechanism should be administered, managed, and monitored.
Closed – Implemented
In fiscal year 2015, GAO validated that IRS no longer operationally relies on systems-managed storage as an access control mechanism.
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should update the application security plan to describe controls in place in its current mainframe operating environment.
Closed – Implemented
In 2012, we validated that IRS updated the application security plan to describe controls in place for the current mainframe operating environment.
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should perform comprehensive testing of the key network component considered to be a high-risk system, at least annually.
Closed – Implemented
In fiscal year 2011, we verified that IRS established a Memorandum of Understanding with Treasury to conduct testing of this key network component and verified that Treasury tested the component.
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should test the application security for the general ledger system for tax-related activities in its current operating environment.
Closed – Implemented
In 2012, we validated that IRS tested application security for the general ledger system in its current operating environment.
Internal Revenue Service To fully implement key components of the IRS comprehensive information security program, the Commissioner of Internal Revenue should perform comprehensive testing of security controls over the mainframe environment to include all portions of the operating environment.
Closed – Implemented
In 2012, we validated that IRS performed comprehensive testing of security controls over the mainframe environment to include all portions of the operating environment.

Full Report

Office of Public Affairs

Topics

Access controlComputer securityComputer systemsData integrityDatabasesFinancial disclosureFinancial statement auditsFinancial statementsFraudInformation disclosureInformation securityInformation security managementInformation security regulationsInternal controlsReporting requirementsSecurity policiesSecurity threatsSystem vulnerabilitiesTax administration systemsTax information confidentialityCorrective actionFinancial reportingPolicies and procedures