GAO scolds EPA for poor security | SC Media
Encryption, Patch management

GAO scolds EPA for poor security

August 22, 2012

The U.S. Environmental Protection Agency (EPA) needs to clean up its security act, according to the investigative arm of Congress.

In a report released this week, the federal Government Accountability Office (GAO) found that the department charged with protecting human health and the environment is falling short at protecting its systems from unauthorized access.

In particular, the EPA is failing to always ensure that users employ strong passwords, that users are limited in the systems they can access, that critical data is encrypted, that logs are maintained to track suspicious activity and that physical access to sensitive systems is controlled.

Additionally, the agency has weaknesses in its update process, often missing patches for vulnerable database software and operating systems, and configuration tweaks for network devices, the GAO said. And the EPA is not adequately ensuring all of its media devices are properly wiped of sensitive data.

The GAO report also concluded that while the EPA has introduced a security awareness training program -- requiring that workers pass a web-based course -- it lacks a mechanism to certify that all employees have completed the work.

Earlier this month, the EPA disclosed that hackers breached a server storing data related to its Superfund program. They obtained access by tricking an employee to click on an email that contained a malicious attachment. The personal information of 7,800 people, including Social Security and bank routing numbers, may have been exposed to the intruders.

Greg Wilshusen, GAO's head of information security issues, told SCMagazine.com that the timing of the audit was coincidental with the breach

"We received the request to examine EPA's information security program from the House Committee on Energy and Commerce in March 2011," he said in an email.

The EPA operates 117 systems, according to the GAO. These include networks, telecommunications and applications. It also runs 12 systems that are managed by outside contractors.

"An underlying reason for the control weakness is that EPA has not fully implemented a comprehensive information security program," as required by the Federal Information Security Management Act (FISMA), the report said. "Although EPA has established a framework for its security program, the agency has not fully implemented all elements of its program."

Among other specifications, FISMA requires agencies to create and document policies and procedures around information security. And while the EPA has taken steps toward achieving this, there are still glaring holes, according to the GAO.

The report listed a dozen recommendations, including finalizing its 17 existing, but still interim, information security policies and procedures, and implementing National Institute of Standards (NIST) guidance.

In a letter from Malcolm Jackson, the EPA's assistant administrator, the agency mostly agreed with the GAO's recommendations.

The EPA is the latest federal agency to earn reproach from the GAO. In the past, the IRS and NASA have faced criticism over their security postures.

prestitial ad