Security policies fall short
Agencies are failing to follow policies to ensure that changes in their software and systems do not open security vulnerabilities, GAO told CIOs
Federal agencies are failing to follow the policies to ensure that changes
in their software and systems do not open security vulnerabilities, the
General Accounting Office told agency officials last month.
In letters to 16 federal chief information officers, GAO officials warned
that "without proper software change controls, there are risks that security
features could be inadvertently or deliberately omitted or rendered inoperable,
processing irregularities could occur, or malicious code could be introduced."
GAO found varying types of policies within each agency, and it often
found no departmentwide policy or oversight. Most agencies are at some stage
of working to develop the appropriate practices based on the Carnegie Mellon
University Software Engineering Institute's Capability Maturity Model, according
to the letters.
But other agencies have not yet taken such steps, including officials
at the FBI who "took issue with the need for a formally documented component-level
change control process," wrote David McClure, associate director of governmentwide
and defense information systems at GAO.
GAO performed the review of the software change controls at the 16 agencies
at the request of Rep. Stephen Horn (R-Calif.), chairman of the House Government
Reform Committee's Government Management, Information and Technology Subcommittee.
Horn and other members of the subcommittee had expressed concern about the
possible security vulnerabilities introduced by contractors during Year
2000 remediation projects.
NEXT STORY: HTML forms getting a tune-up