Audit Chides Department Of Homeland Security's WAN
Among other problems, DHS has not clearly outlined baseline security controls or rules of use on the interconnected systems to prevent unauthorized transactions on the WAN, auditors said.
The Department of Homeland Security's wide area network risks service disruptions and losing data because of a high volume of security problems, according to a recent audit.
The Office of the Inspector General found that DHS had 65 million security event messages from February through April 2005, and 6.5 million were tagged as possible misuse of computers to access pornography Web sites.
The overall figure represents an increase of more then a 400 percent from the year before, but the number of porn warnings could be due to legitimate law enforcement investigations, DHS information officers told the OIG in an audit released at the end of 2005. That's difficult to determine because of the way the network is monitored.
Despite rules requiring DHS to monitor the network, which serves 22 organizations under its umbrella, DHS turned responsibility for monitoring over to U.S. Customs and Border Protection with no formal agreement about how they should collaborate, according to the audit posted online in January.
The department has not clearly outlined baseline security controls or rules of use on the interconnected systems to prevent unauthorized transactions on the WAN. Without those controls, DHS cannot remove a problematic group from the network or require that risky computer use be performed through a dial-up connection or other method to reduce risk, auditors noted.
According to the audit, DHS needs to improve its incident response capabilities, choose more effective means of collecting, analyzing and reporting data and build communication between various groups like legal, human resources and external groups. It should also appoint an information security manager for the WAN, create a security operations center for the network and sign interconnection service agreements for systems connected to the network.
Finally, it needs to draft security plans, institute certification and accreditation requirements, perform risk assessments, add equipment for traffic analysis and comply with its own investment policies. DHS hasn't received all of the approvals it needs for its network. That means it "risks spending on investments which may not directly support or further its mission."
In a response, Scott Charbo, chief information officer for DHS, agreed that most improvements suggested in the audit are needed. He said some would be completed when DHS finishes constructing a networks in December.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.