Lack of comprehensive mobile security policy and thousands of unauthorized devices are among the security shortcomings of the Army's mobile efforts.
The Army has been considering wider adoption of mobile devices, but according to a new report by the military's inspector general, the Army's CIO has thus far done an inadequate job of ensuring the security of commercial mobile devices.
The report, filed last week, finds that, among other shortcomings, the Army CIO hasn't developed sufficiently comprehensive security policies for the service's mobile device programs, and that Army commands have not been getting authorization for mobile pilots as required by Army policy.
The report cautions that these failures could make the Army more vulnerable to cybersecurity threats. "If devices remain insecure, malicious activities could disrupt Army networks and compromise sensitive DoD information," DOD assistant inspector general Alice Carey wrote in a memo to the Army's CIO that accompanied the report.
The Army has been among the most ardent advocates of the use of mobile devices in the military. Last February, Army deputy CIO Mike Kreiger characterized the Army as "pushing the envelope and moving fast" in its mobile strategy as he announced an Army plan to move toward a bring-your-own-device strategy in 2013. The Army has also been among the government leaders in pushing the development of enterprise mobile application stores.
However, according to the report by the DOD inspector general, the Army CIO needs to develop more complete cybersecurity policies for mobile device management and remote device administration, use of mobile devices as removable media, and mobile device training.
The report, which was limited to Android, iPhone and Windows mobile devices, found that, among other things, the Army CIO "inappropriately concluded that [mobile devices] were not connecting to Army networks and storing sensitive information," which resulted in the inadequate application of security controls to the Army's mobile device efforts.
As part of the study, the inspector general visited the U.S. Military Academy and the Army Corps of Engineers' Engineer Research and Development Center, each of which has pilot and other mobile device efforts underway. However, neither organization got CIO authorization to use or even in some cases to test a large portion of their mobile devices, which left the Army CIO unaware of more than 600 mobile devices actively in use.
In fact, both organizations used Army data, including "sensitive legal information" and Army email, without obtaining even an authority to test the mobile devices or the mobile data itself.
The study also found inconsistent and incomplete use of mobile device management software; Army employees and soldiers storing and transferring personal and in some cases sensitive data; inadequate training; and the lack of a comprehensive security policy.
Security has become one of the biggest stumbling blocks to the wider adoption of mobile devices across the federal government. Recently, for example, the Department of Veterans Affairs announced that it was holding off on its bring-your-own-device strategy until concerns about privacy could be resolved.
The Army CIO, which largely agreed with the Army's inspector general's recommendations to strengthen mobile security, would do well to take care in navigating mobile security concerns, lest mobile security become an even bigger problem for the Army going forward.
A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data. Also in the new, all-digital Secure The Data Center issue of InformationWeek Government: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade. (Free registration required.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.