Lack of comprehensive mobile security policy and thousands of unauthorized devices are among the security shortcomings of the Army's mobile efforts.
The Army has been considering wider adoption of mobile devices, but according to a new report by the military's inspector general, the Army's CIO has thus far done an inadequate job of ensuring the security of commercial mobile devices.
The report, filed last week, finds that, among other shortcomings, the Army CIO hasn't developed sufficiently comprehensive security policies for the service's mobile device programs, and that Army commands have not been getting authorization for mobile pilots as required by Army policy.
The report cautions that these failures could make the Army more vulnerable to cybersecurity threats. "If devices remain insecure, malicious activities could disrupt Army networks and compromise sensitive DoD information," DOD assistant inspector general Alice Carey wrote in a memo to the Army's CIO that accompanied the report.
The Army has been among the most ardent advocates of the use of mobile devices in the military. Last February, Army deputy CIO Mike Kreiger characterized the Army as "pushing the envelope and moving fast" in its mobile strategy as he announced an Army plan to move toward a bring-your-own-device strategy in 2013. The Army has also been among the government leaders in pushing the development of enterprise mobile application stores.
However, according to the report by the DOD inspector general, the Army CIO needs to develop more complete cybersecurity policies for mobile device management and remote device administration, use of mobile devices as removable media, and mobile device training.
The report, which was limited to Android, iPhone and Windows mobile devices, found that, among other things, the Army CIO "inappropriately concluded that [mobile devices] were not connecting to Army networks and storing sensitive information," which resulted in the inadequate application of security controls to the Army's mobile device efforts.
As part of the study, the inspector general visited the U.S. Military Academy and the Army Corps of Engineers' Engineer Research and Development Center, each of which has pilot and other mobile device efforts underway. However, neither organization got CIO authorization to use or even in some cases to test a large portion of their mobile devices, which left the Army CIO unaware of more than 600 mobile devices actively in use.
In fact, both organizations used Army data, including "sensitive legal information" and Army email, without obtaining even an authority to test the mobile devices or the mobile data itself.
The study also found inconsistent and incomplete use of mobile device management software; Army employees and soldiers storing and transferring personal and in some cases sensitive data; inadequate training; and the lack of a comprehensive security policy.
Security has become one of the biggest stumbling blocks to the wider adoption of mobile devices across the federal government. Recently, for example, the Department of Veterans Affairs announced that it was holding off on its bring-your-own-device strategy until concerns about privacy could be resolved.
The Army CIO, which largely agreed with the Army's inspector general's recommendations to strengthen mobile security, would do well to take care in navigating mobile security concerns, lest mobile security become an even bigger problem for the Army going forward.
A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data. Also in the new, all-digital Secure The Data Center issue of InformationWeek Government: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade. (Free registration required.)
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.