J OFFICE OF INSPECTOR GENERAL Audit Report Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System Report No. 2006-P-00019 March 28, 2006 ------- Report Contributors: Rudolph M. Brevard Charles Dade Neven Morcos Jefferson Gilkeson Scott Sammons Abbreviations ASSERT Automated Security Self-Evaluation and Remediation Tracking C&A Certification and Accreditation CERCLIS Comprehensive Environmental Response, Compensation, and Liability Information System EPA U.S. Environmental Protection Agency FISMA Federal Information Security Management Act NCC National Computer Center OIG Office of Inspector General OMB Office of Management and Budget OSWER Office of Solid Waste and Emergency Response POA&M Plan of Action and Milestones RTF Research Triangle Park ------- U.S. Environmental Protection Agency Office of Inspector General At a Glance 2006-P-00019 March 28, 2006 Why We Did This Review CB&QLJS p&m&£ eri&c&i mattdale to «fean «»the , co«tact eftefcon ttie following it»k; Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System What We Found The Office of Solid Waste and Emergency Response's (OSWER's) implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency's recommended specialized security training. However, we found that OSWER's CERCL1S, a major application, was operating without a current (1) certification and accreditation package and (2) contingency plan or testing of the plan. OSWER officials could have discovered the noted deficiencies had they implemented practices to ensure these Federal and Agency information security requirements were followed. As a result, CERCL1S had security control weaknesses that could effect OSWER's operations, assets, and personnel. What We Recommend We recommend that the CERCLIS System Owner: > Conduct an independent review of security controls and a full formal risk assessment of CERCLIS and update the certification and accreditation package in accordance with Federal and Agency requirements, > Conduct a test of the updated CERCLIS contingency plan, and > Develop a Plan of Action and Milestones in the Agency's security weakness tracking system (ASSERT database) for all noted deficiencies. We recommend that the OSWER Information Security Officer: > Conduct a review of OSWER's current information security oversight processes and implement identified process improvements. OSWER agreed with the report's findings and has indicated that it has updated the CERCLIS security plan and re-authorized the application. OSWER officials also indicated that they updated the CERCLIS contingency plan and conducted a tabletop exercise of the updated plan. OSWER's complete response in included at Appendix A. ------- UNITED STATES ENVIRONMENTAL PROTECTION AGENCY WASHINGTON, D.C. 20460 OFFICE OF INSPECTOR GENERAL MEMORANDUM SUBJECT: FROM: TO: March 28, 2006 Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System ReportNo.2006-P-00019 Rudolph M. Brevard /si Director, Information Technology Audits Susan Parker Bodine Assistant Administrator for Solid Waste and Emergency Response This is our final report on the information security controls audit of the Office of Solid Waste and Emergency Response's Comprehensive Environmental Response, Compensation, and Liability Information System. This audit report contains findings that describe problems the Office of Inspector General (OIG) has identified and corrective actions the OIG recommends. This audit report represents the opinion of the OIG, and the findings in this audit report do not necessarily represent the final U.S. Environmental Protection Agency (EPA) position. EPA managers, in accordance with established EPA audit resolution procedures, will make final determinations on matters in this audit report. Action Required In accordance with EPA Manual 2750, you are required to provide a written response to this report within 90 calendar days of the date of this report. You should include a corrective action plan for agreed upon actions, including milestone dates. We have no objection to further release of this report to the public. For your convenience, this report will be available at http://www.epa.gov/oig. If you or your staff have any questions regarding this report, please contact me at (202) 566-0893. ------- Table of Contents At a Glance Purpose of Audit 1 Background 1 Scope and Methodology 2 CERCLIS' Compliance with Federal and Agency Security Requirements 3 Certification and Accreditation 4 Contingency Planning 4 Recommendations 5 Agency Comments and OIG Evaluation 5 Appendices A Agency Response to Draft Report 6 B Distribution 9 ------- Purpose of Audit Our objective was to determine whether the Office of Solid Waste and Emergency Response's (OSWER's) Comprehensive Environmental Response, Compensation, and Liability Information System (CERCLIS) complied with Federal and Agency information system security requirements. CERCLIS provides critical information and processing in support of the Superfund program (a Federal mandate to clean up the nation's uncontrolled hazardous waste sites). Background We conducted this audit pursuant to Title III of the E-Government Act of 2002, commonly referred to as the Federal Information Security Management Act (FISMA). FISMA requires the Agency to develop policies and procedures commensurate with the risk and magnitude of harm resulting from the malicious or unintentional damage to the Agency's information assets. EPA's Chief Information Officer is responsible for establishing and overseeing an Agency- wide program to ensure that the security of its network infrastructure is consistent with these requirements. Program offices are responsible for managing the implementation of these security requirements within their respective organizations. Program offices should create a Plan of Action and Milestones (POA&M) when it identifies a security control weakness. The POA&M, which documents the planned remediation process, is recorded in the Agency's Automated Security Self-Evaluation and Remediation Tracking (ASSERT) tool. ASSERT is used to centrally track remediation of weaknesses associated with information systems and serves as the Agency's official record for POA&M activity. FISMA requires the Inspector General, along with the EPA Administrator, to report annually to the Office of Management and Budget (OMB) the status of EPA's information security program. The OIG provided the results of its review to OMB in Report No. 2006-S-00001, Federal Information Security Management Act, Fiscal Year 2005 Status of EPA's Computer Security Program, issued October 3, 2005. During our annual FISMA review, we selected one major application from each of five EPA program offices and reviewed the security practices surrounding those applications. Our review noted instances where EPA could improve its security practices overall and the OIG reported the results to EPA's Chief Information Officer in Report No. 2006-P-00002, EPA Could Improve Its Information Security by Strengthening Verification and Validation Processes, issued October 17,2005. This audit report is one in a series of reports being issued to the five program offices that had an application reviewed. This report addresses findings and 1 ------- recommendations related to information security practice weaknesses identified in OSWER. In particular, this report summarizes our results regarding how OSWER implemented Federal and EPA information security requirements. This report also includes our evaluation of how OSWER implemented, tested, and evaluated information security controls to ensure continued compliance with Federal and Agency requirements for selected security objectives. The Scope and Methodology section contains the specific security objectives we audited. Scope and Methodology We conducted our field work from March 2005 to July 2005 at EPA Headquarters in Washington, DC, and the National Computer Center (NCC) in Research Triangle Park (RTF), North Carolina. We interviewed Agency officials at both locations and contract employees at the NCC. We reviewed relevant Federal and Agency information security standards. We reviewed application security documentation to determine whether it complied with selected standards. We reviewed system configuration settings and conducted vulnerability testing of servers for known vulnerabilities. We reviewed training records for personnel with significant security responsibilities. We reviewed the following security practices for CERCLIS: • Security Certification and Accreditation (C&A) practices: We reviewed CERCLIS' C&A package to determine whether the security plan was updated and re-approved at least every 3 years and the application was reauthorized at least every 3 years, as required by OMB Circular A-130 and EPA policy. • Application contingency plans: We reviewed CERCLIS' contingency planning practices to determine whether OSWER complied with requirements outlined in EPA Directive 2195A1 (EPA Information Security Manual), National Institute of Standards and Technology Special Publication 800-34 (Contingency Planning Guide for Information Technology Systems), and EPA procedures document Procedures for Implementing Federal Information Technology Security Guidance and Best Practices. • Security controls: We identified two areas of security controls: (1) system vulnerability monitoring, which included conducting vulnerability testing; and (2) physical access controls. The NCC manages the servers that run the CERCLIS application and provides the primary security controls for the application. Therefore, when evaluating system vulnerability monitoring, we evaluated practices at the NCC. We did not test physical security controls at the NCC, because the NCC was undergoing an audit of these controls at the time of our review. This audit found instances where EPA could improve its ------- physical controls at RTF and reported the results in Report No. 2006-P-00005, EPA Could Improve Physical Access and Service Continuity/ Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus, issued December 14, 2005. • Annual Training Requirements: We reviewed whether employees with significant security responsibilities satisfied annual training requirements. We conducted this audit in accordance with Government Auditing Standards, issued by the Comptroller General of the United States. CERCLIS' Compliance with Federal and Agency Security Requirements We noted CERCLIS' production servers were being monitored for known vulnerabilities and personnel with significant security responsibility had completed the Agency's recommended specialized security training. However, our audit (1) disclosed that CERCLIS had deficiencies related to other significant security practices, and (2) highlighted areas where OSWER should place more emphasis to comply with established requirements. In particular, our review noted that CERCLIS contained security weaknesses in the following areas: • The C&A package - consisting of a security plan, a third-party risk assessment, and a written authorization for operation - had not been updated in response to recent major system changes. • The contingency plan had not been updated and tested in response to recent major system changes. Preparing and maintaining an updated C&A package are vital in helping management determine whether effective security controls are in place and work as intended to operate an application. Updating and testing the contingency plan assist management in determining whether the organization could recover from a disruption in service. These two important security controls help ensure the Agency's network infrastructure is adequately protected. These widely recognized preventive controls aid in reducing the likelihood that security incidents will occur, and by not emphasizing these key security controls, OSWER places the integrity and availability of CERCLIS at risk. In response to these findings, OSWER officials indicated that they have updated the CERCLIS security and contingency plans and have conducted a tabletop exercise of the updated contingency plan. ------- Certification and Accreditation Our audit revealed that the CERCLIS system owners had not updated the application security plan, risk assessment, and authorization for operation related to a recent major change in processing, as required by Federal and Agency policy. During our audit, we determined that CERCLIS had undergone a major change in processing. Specifically, CERCLIS changed from a decentralized application (distributed throughout EPA Headquarters and 10 EPA regional offices) to a centralized application (hosted by the NCC in RTF). However, we found that the CERCLIS security plan and risk assessment had not been updated, and the system had not been re-authorized for operation related to this "major change" in processing. Senior OSWER officials use these key C&A security documents to make the decision about whether CERCLIS' security controls are sufficient and if adjustments to security controls are necessary before reaccrediting (reauthorizing) CERCLIS for continued operation. In addition, the assessment of risk and the development of system security plans are important activities in the Agency's information security program that directly support security accreditation (management's authorization for system operation). OSWER officials indicated that they have since updated CERCLIS' security plan to reflect these major system changes and re-authorized the application. OSWER also indicated that the CERCLIS Team Leader would make a determination when the next risk assessment is to be scheduled. Contingency Planning Although OSWER had developed and tested a contingency plan for CERCLIS, the program office had not updated the plan to reflect major changes made to the system. In audit Report No. 2006-P-00005, the OIG reported that CERCLIS' contingency plan did not identify critical resources needed during an outage. The OIG was unable to determine whether contracts were in place for the restoration of the application. In response to this finding, OSWER officials indicated that they conducted a tabletop exercise of CERCLIS in September 2005. However, OSWER officials did not indicate when the office would test the new plan. Although OSWER conducted the tabletop exercise, Federal requirements specify that exercises and tests should be conducted to ensure that the procedures continue to be effective. In addition, testing of the plan would enable OSWER to become familiar with the necessary recovery steps and help management identify where additional emphasis is needed. OSWER officials indicated that the CERCLIS contingency plan had since been updated to reflect the changes to the application's operating environment and completed another tabletop review of the new plan in December 2005. ------- Recommendations We recommend that the Comprehensive Environmental Response, Compensation, and Liability Information System (CERLIS) System Owner: 1. Conduct an independent review of security controls and a full formal risk assessment of CERCLIS and update the certification and accreditation package in accordance with Federal and Agency requirements, 2. Conduct a test of the updated CERCLIS contingency plan, and 3. Develop a Plan of Action and Milestones in the Agency's security weakness tracking system (ASSERT database) for all noted deficiencies. We recommend that the Office of Solid Waste and Emergency Response (OSWER) Information Security Officer: 4. Conduct a review of OSWER's current information security oversight processes and implement identified process improvements. Agency Comments and OIG Evaluation OSWER concurred with many of the report's findings and indicated that the office took or planned steps to remediate the identified weaknesses. OSWER also provided additional details regarding its processes for maintaining the CERCLIS contingency plan and we modified the report to remove the recommendation to develop and implement a plan to maintain the contingency plan. OSWER also indicated that based on actions already taken, no further Plan of Action and Milestones are needed. However, given the resources required to complete the risk assessment and to test a contingency plan, we feel OSWER should record these significant security-planning activities in the Agency's security tracking system. OSWER's complete response is included as Appendix A. ------- Appendix A Agency Response to Draft Report March 2, 2006 MEMORANDUM: SUBJECT: OSWER Response to Audit Report: Information Security Series: Security Practices of the Comprehensive Environmental Response Compensation Liability Information System (CERCLIS)/Assignment No: 2005-000661 FROM: Susan Parker Bodine/s/ Assistant Administrator TO: Rudolph M. Brevard Director, Information Technology Audits Office of Inspector General Thank you for the opportunity to respond to the audit report on Information Security Series: Security Practices of the Comprehensive Environmental Response Compensation Liability Information System (CERCLIS). We appreciate your efforts to ensure the Agency is in compliance with the Federal Information Security Management Act (FISMA) by conducting annual audits of our applications. This memorandum addresses the accuracy of the audit report and identifies the corrective actions already initiated to ensure compliance. RESPONSE TO RECOMMENDATIONS: The system owner has provided the following information in response to your recommendations: 1. Update the CERCLIS certification and accreditation package in accordance with Federal and Agency requirements by ensuring that (1) the Security Plan is up to date, (2) an independent review of security controls and a full formal risk assessment are performed, and (3) management formally reauthorizes CERCLIS for operation. The Security plan was updated and signed by the certifying official on 12/23/05 and by the authorizing official on 02/01/06. The management, operational and technical security controls for the CERCLIS application are tested for effectiveness on a regular basis. The most recent review and independent tests for effectiveness of security controls were conducted by Booz Allen Hamilton, with a report delivered to EPA in February 2004. The risk assessment included documentation reviews, ------- manual and automated assessments of both computer hardware and software, which support the CERCLIS application. The risk assessment involved evaluating management, technical, and administrative controls already implemented. The elements of risk (threat, vulnerability, countermeasures, and impact) were evaluated as well. In addition to the risk assessment, CERCLIS performs weekly and monthly reviews of all audit reports and logs. User accounts are reviewed quarterly to ensure accounts are valid. A determination is made regarding access to the system based on pre-determined roles and user/member groups. Accounts are reviewed to ensure users have taken the required annual security training. Accounts are deleted if they have not been active within ninety days. Consequences for violating access privileges and the Rules of Behavior are taken seriously; user ids are removed or suspended for violations. Quarterly reviews of management and operational controls are a part of the standard operating procedures for the CERCLIS application. CERCLIS is moving away from performing a major risk assessment every three years to continuous monitoring of the application. Areas of focus are the management and control of its hardware, and performing security impact analysis. The agency has several IT security tools approved for use, licensed by EPA and available to Information Security Officers, System Administrators, and Local Area Network (LAN) Managers and Administrators to help protect IT assets. The CERCLIS Team Leader will make a determination when the next risk assessment is to be scheduled. 2. Conduct a test of the updated CERCLIS contingency plan. OSRTI conducted the recommended test of the updated CERCLIS contingency plan on December 17, 2005. 3. Develop and implement a process to test and maintain the CERCLIS contingency plan. The process should ensure the plan is tested at least annually and that the plan is updated whenever significant changes occur to the system, supported business processes, key personnel, or to the contingency plan itself. Over the past year, the Office of Superfund Remediation and Technology Innovation (OSRTI) has worked closely with EPA's National Computing Center (NCC) to centralize the CERCLIS Regional databases. As a follow-up to this work, the Contingency Plan for CERCLIS was revised in September 2005. Furthermore, a coordinated effort with the NCC has taken place to perform a table-top review of the CERCLIS application. The tabletop review was tested with participation and concurrence by the NCC on December 17, 2005. In complying with Agency standards, OSRTI has used the two National Institute of Standards and Technology (NIST) documents which focus specifically on contingency planning and testing. The first NIST document (NIST 800-84, Guide to Single-Organization IT Exercises) describes the procedures for the table-top review. The second document (NIST 800-34, Contingency Planning Guide for Information Technology Systems) describes in detail how to write a Contingency Plan. ------- 4. Develop a Plan of Action and Milestone in the Agency's security weakness tracking system (ASSERT database) for all noted deficiencies. Based on actions already taken as noted above, no further action is required because the noted deficiencies have been addressed. 5. Develop and implement a plan to re-evaluate system security oversight processes to ensure the above recommendations are uniformly applied to all general support systems and major applications within OSWER. The OSWER Information Security Officer (ISO), in coordination with and supported by the Senior Information Official (SIO) and Information Management Officer (MO), oversees a coordinated review of all OSWER systems annually with ongoing monitoring of major security milestones throughout the year. OSWER uses the Agency's ASSERT System to manage this process. Self-assessments occur annually and Plan of Actions and Milestones are generated to ensure changes or needed processes are addressed. OSWER's security status, as recorded in ASSERT, is independently audited by the Office of Environmental Information. Please feel free to contact Robert King at 703.603.8792 or William Bushee at 703.603.8963, if you have any questions or need additional information. cc: Renee Wynn Kevin Phelps Paula Rodriguez Michael B. Cook Joan Harrigan-Farrelly Patricia Gowland ------- Appendix B Distribution Office of the Administrator Assistant Administrator for Solid Waste and Emergency Response Acting Assistant Administrator for Environmental Information Acting Director, Technology and Information Security Staff Audit Followup Coordinator, Office of Solid Waste and Emergency Response Audit Followup Coordinator, Technology and Information Security Staff Agency Followup Official (the CFO) Agency Followup Coordinator General Counsel Associate Administrator for Congressional and Intergovernmental Relations Associate Administrator for Public Affairs Acting Inspector General ------- |