08:39 PM

Audit Chides Department Of Homeland Security's WAN

Among other problems, DHS has not clearly outlined baseline security controls or rules of use on the interconnected systems to prevent unauthorized transactions on the WAN, auditors said.

The Department of Homeland Security's wide area network risks service disruptions and losing data because of a high volume of security problems, according to a recent audit.

The Office of the Inspector General found that DHS had 65 million security event messages from February through April 2005, and 6.5 million were tagged as possible misuse of computers to access pornography Web sites.

The overall figure represents an increase of more then a 400 percent from the year before, but the number of porn warnings could be due to legitimate law enforcement investigations, DHS information officers told the OIG in an audit released at the end of 2005. That's difficult to determine because of the way the network is monitored.

Despite rules requiring DHS to monitor the network, which serves 22 organizations under its umbrella, DHS turned responsibility for monitoring over to U.S. Customs and Border Protection with no formal agreement about how they should collaborate, according to the audit posted online in January.

The department has not clearly outlined baseline security controls or rules of use on the interconnected systems to prevent unauthorized transactions on the WAN. Without those controls, DHS cannot remove a problematic group from the network or require that risky computer use be performed through a dial-up connection or other method to reduce risk, auditors noted.

According to the audit, DHS needs to improve its incident response capabilities, choose more effective means of collecting, analyzing and reporting data and build communication between various groups like legal, human resources and external groups. It should also appoint an information security manager for the WAN, create a security operations center for the network and sign interconnection service agreements for systems connected to the network.

Finally, it needs to draft security plans, institute certification and accreditation requirements, perform risk assessments, add equipment for traffic analysis and comply with its own investment policies. DHS hasn't received all of the approvals it needs for its network. That means it "risks spending on investments which may not directly support or further its mission."

In a response, Scott Charbo, chief information officer for DHS, agreed that most improvements suggested in the audit are needed. He said some would be completed when DHS finishes constructing a networks in December.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of July 17, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.