GAO cites information security weaknesses
The Government Accountability Office says agencies continue to face major information security vulnerabilities despite making progress in complying with FISMA requirements.
Despite indications that agencies have improved their compliance with parts of the Federal Information Security Management Act, many major agencies still consider their information security controls a significant deficiency or material weakness, according to the Government Accountability Office.
Gregory Wilshusen, director of information-security issues for GAO, told the House Oversight and Government Reform Government Committee's Management, Organization and Procurement Subcommittee today many agencies had not fully or effectively implemented key elements of an agencywide information-security program, as required by FISMA. Meanwhile, GAO recommended that the Office of Management and Budget improve its guidance for FISMA reporting.
GAO’s findings come as lawmakers consider reforming the FISMA law that critics say relies too much on paper compliance reports and doesn’t fully address information-technology vulnerabilities. Sen. Thomas Carper (D-Del.) on April 28 introduced legislation designed to improve FISMA .
“Six years after FISMA was enacted, we continue to report that poor information security is a widespread problem with potentially devastating consequences,” Wilshusen said in prepared remarks based on a draft GAO report. That draft analyzed reports on government information security from agencies, inspectors general, OMB, Congress and the GAO.
GAO found that out of 24 major agencies:
- Thirteen said controls over financial systems and information were a “significant deficiency” and seven said it was a “material weakness” in performance and accountability reports for fiscal 2008.
- Twenty-two of the agencies’ IGs identified information security as a “major management challenge” for their agency.
- Twenty-three had weaknesses in access controls reported and 23 had weaknesses in their agencywide information security programs.
Wilshusen said OMB’s annual instructions for FISMA reporting weren’t always clear and didn’t cover key security activities. In addition, he said, OMB didn’t include key information about findings and significant deficiencies identified by IGs in its report to Congress on agencies’ FISMA compliance.
Vivek Kundra, the federal chief information officer and the top IT official in OMB, said the administration wanted to make security compliance more automatic and ongoing. FISMA “has raised the level of awareness in the agencies and in the country at large, but we’re not where we need to be,” he said.
Kundra said the administration’s initial review of government information security showed the performance data currently collected under FISMA doesn’t reflect the security posture of agencies and the current collection process is cumbersome and takes time away from meaningful analysis. He also said there is too much focus on compliance and not enough on outcomes.
“While the current reporting metrics have made sense, or may have made sense when FISMA was enacted, they’re largely compliance based; they are trailing — rather than leading — indicators,” Kundra said. “We need metrics give us insight into agencies’ security postures and possible vulnerabilities on an ongoing basis.”
Agencies need to adopt a “risk-based approach” to IT security, Kundra said, including for cloud computing which President Barack Obama endorsed in his fiscal 2010 budget request.