\ 01 '•». Office of Inspector General Audit Report INFORMATION RESOURCES MANAGEMENT SECURITY OF REGION VIIPs DIAL-UP ACCESS Report No. 2000-P-16 March 31, 2000 ------- Inspector General Division(s) ADP Audits and Assistance Staff Conducting the Audit Region(s) covered Region VIII Program Office(s) Involved Data Systems Management Branch ------- •(tO Sfyv " -^ \ UNITED STATES ENVIRONMENTAL PROTECTION AGENCY JSfa \ WASHINGTON, D.C. 20460 W,' OFFICE OF March 31, 2000 THE INSPECTOR GENERAL MEMORANDUM SUBJECT: Final Report: Security of Region VIII's Dial-up Access Audit No. 1999-0000165 Report No. 2000-P- 16 FROM: Patricia H. Hill, ADP Audits and Assistance StafW(24fij) TO: Patricia D. Hull, Assistant Regional Administrator Office of Technical and Management Services (8TMS-D) Rick Martin, Director National Technology and Services Division, MD-34 Attached is our final report entitled "Security of Region VIII's Dial-up Access." The primary objectives of the audit were to determine if: 1) dial-up controls currently implemented by the region adequately secure dial-up access; 2) the region is logging and auditing all dial-up attempts to their systems; and 3) any terminated employees have dial-up access to the network. This audit report contains findings that describe problems the Office of Inspector General has identified and corrective actions the OIG recommends. This audit report represents the opinion of the OIG, and the findings contained in this audit report do not necessarily represent the final EPA position. Final determinations on the matters in the audit report will be made by EPA managers in accordance with established EPA audit resolution procedures. Action Required Region VIII In response to the draft report, your office provided responsive action plans and milestone dates for correcting the findings. As a result, and in accordance with our longstanding agreement outlined in EPA Order 2750, we find your response to the report acceptable. If the previously disclosed milestones dates for corrective actions have changed, then we ask that you E-mail a description of ongoing actions and provide an updated timetable for completing corrective Recycled/Recyclable .Printed with Vegetable OH Based Inks on 100% Recycled Paper (40% Postconsumer) ------- actions. In addition, please track all action plans and milestone dates in EPA's Management Audit Tracking System. NTSD In accordance with EPA order 2750, you, as an action official, are required to provide us with a written response to the audit report within 90 days of the final report date. If corrective actions will not be complete by the response date, we ask that you describe the actions that are ongoing and reference specific milestone dates which will assist us in deciding whether to close this report. In addition, please track all action plans and milestone dates in EPA's Management Audit Tracking System. We appreciate the cooperation afforded us during the course of this audit by NTSD and Region VIII's TMS staff. We also appreciate the Region's many comments to the recornmertdations presented in the report, as well as the many actions you and your staff have already initiated to address issues concerning regional dial-up security. We have no objections to the further release of this report to the public. Should you or your staff have any questions regarding this report, please contact Ed Shields, Audit Team Leader, AAAS, at (202) 260-3656. Attachment cc: P. Riederer, Director, Data Systems Management Branch (8TMS-D) G. Bonina, Director, IT Policy and Planning Division (2831) D. McGinnis, Chief, IT Policy and Planning Division (2831) J. Worthington, Audit Liaison, OEI (2811R) ------- EXECUTIVE SUMMARY PURPOSE BACKGROUND The objectives of this audit were to determine if: (1) the dial-up controls currently implemented by the region adequately secure dial-up access; (2) the region is logging and auditing all dial-up attempts to their systems; and (3) terminated employees have dial-up access to the network. The Environmental Protection Agency National Technology Services Division (NTSD) provides the centrally managed Automated Data Processing (ADP) and telecommunications infrastructures required to support the Agency's mission. Without proper controls over dial-up access, confidential and sensitive data may be disclosed during transmission over telecommunication lines. Security of information systems may be defined as the control structure established to manage the integrity, confidentiality, and availability of information systems (IS) data and resources. A combination of controls must be implemented to minimize the risk of a successful attack by (1) making unauthorized access difficult to attain and (2) carefully monitoring the dial-up access attempts and responding swiftly to potential security incidents as they occur. The advent of telecommuting increases the risk associated with dial-up access, because more and more users employ this mode of entry to access EPA's system. The Public Switched Network is used to gain access to the internal network. Any individual possessing the proper equipment can attempt to gain access. Dial-up users, who are not situated in close physical proximity to a network connection, frequently use the public switched telephone networks to dial into the internal network. The security risks vary depending on the type of dial-up connection established with the public networks. Connections through public switched data network are established in a manner similar to that of connections in public telephone network. Report No. 2000-P-16 ------- RESULTS IN BRIEF PRINCIPAL FINDINGS Advanced Authentication Techniques and Encryption Not Used While Region VIII and NTSD management are trying to tighten security controls, the current dial-up access controls do not adequately secure access to the network. In particular, we found that Region VIII was not using advanced authentication techniques to protect the dial-up access to the Network. We also determined that logical and physical access controls contributed to poor security over dial-up access. Furthermore, Region VIII was not logging and auditing all dial-up attempts to their system. In addition, we discovered that some of the Region's terminated employees still possessed access to the regional servers. More importantly, our audit disclosed that NTSD is not planning to force dial-up access through the Agency's Internet Firewall, scheduled for implementation in April 2000. Nor does NTSD plan to provide programs or services to help the regional offices interpret logged data captured at EPA's National Computer Center. These weaknesses enable potential intruders to exploit external dial-up access points and increase the vulnerability of Regional data, as well as the Agency's network and national systems. We conclude that Agency and regional managers need to make security a top priority by allocating appropriate resources to implement and maintain adequate security processes, increasing management oversight of such processes, and developing adequate formal policies and procedures to guide regional security personnel in the administration of security matters. We evaluated the adequacy of the Region's dial-up controls in accordance with Federal and Agency guidelines, as well as commonly accepted industry practices. The following three weaknesses relate to audit objective #1, and affect the region's ability to adequately secure dial-up access to its information systems and network data. Region VIII is not using any advanced authentication techniques, such as one-time password technology and dial-back mode, to protect their dial-up access to the network. Therefore, once dial-up access is permitted, the network is potentially opened to the public by providing inadequately secured external access points. Additional controls should be implemented to properly secure and Report No. 2000-P-I6 ------- Logical Network Account Settings Do Not Comply with Directives. Policies, and Best Practices Inadequate Physical Controls Further Diminish Security No Logging or Monitoring of Dial-Up Access and Control of Modem Usage control these external dial-up access points. At the moment, Region VIII is only using encrypted static passwords for authentication of dial-up access attempts to EPA's Network. Although encrypted, static passwords do not prevent a perpetrator from capturing and replaying authenticated password data to impersonate an authorized user and gain access to the network. Some of Region VIII's Local Area Network (LAN) account settings are not in compliance with Agency Directives, Region VIII policies, and best industry practices. Complying with minimum LAN settings is important, because they implement the logical security enforced by the network operating system. By not consistently following these guidelines, the region is leaving its LANs, as well as EPA's network, vulnerable to security breaches from hacker attacks within and outside the Agency. Although Region VIII uses access Card Keys to restrict physical access to the computer room, management is not adequately addressing other controls necessary to ensure the safety of computer resources and network data. For example, regional management does not adequately control the issuance, termination, and oversight of the access cards to the computer room. Neither has management implemented policies and procedures for adequately supervising and documenting visitors in the computer room. These inadequacies provide perpetrators with a means of circumventing the logical security in place. Region VIII does not log, audit, or perform follow-up reviews on dial-up access attempts to their computer systems. Neither do NTSD staff monitor the logs generated in connection with dial-up access to Region VIII, as provided through the main access number for the Agency's remote access project. Maintaining dial-up logs and monitoring these journals is necessary to safeguard these computer access points against security violations. As a result, the region does not have specific incident response policies and procedures for handling detected dial-up access attempts. Instead, management has to rely on other organizations to notify them of attacks to the regional system. We also determined that regional staff are not 111 Report No. 2000-P-16 ------- Inadequate Termination Control Procedures NTSD Plans Impact the Adequacy of Security Management Needs To Make Security A Top Priority tracking and controlling the use of modems, nor are there any policies and procedures to govern modem usage. Consequently, unauthorized dial-up access and access points could allow the exploitation of EPA data. Region VIII management stated they were not using audit logs, because they were waiting for EPA's NTSD to identify a standard configuration for setting up the logging capability. Our audit results concluded that Region VIII has terminated/separated employees with user accounts which allow them to still access the network directly via dial-up. In addition, terminated/separated employees still possess card key account access to the computer room. Not removing the access of terminated/separated personnel allows potentially disgruntled personnel the ability to access the computer room and network. Furthermore, these accounts are prime targets for hackers to get a foothold into the network, because no users exist to complain should changes occur to their account. EPA's current plans do not sufficiently ensure that dial-up access and the associated dial-up entry points to the Agency's network will be adequately secured. In particular, NTSD management has no plans to force dial-up access through the Internet Firewall, once implemented. NTSD plans to allow dial-up connections directly to the network through communications servers, once they are all established. These servers will not direct the dial-up traffic through the Firewall(s). Such a configuration will defeat the purpose of the firewall by providing backdoors into EPA's network. Although regional operations management state they consider security to be important, they have not committed sufficient resources to adequately secure and maintain dial- up access control points. Specifically, management needs to apply an appropriate portion of available resources to fully staff and improve security processes. In addition, increased management oversight is necessary to ensure that security over regional systems is implemented and maintained. Furthermore, management needs to develop acceptable formal policies and procedures which can communicate regional control requirements and specify IV Report No. 2000-P-16 ------- RECOMMENDATIONS AGENCY COMMENTS AND OIG EVALUATION how controls should be implemented. Lastly, NTSD management needs to: (1) plan to route dial-up access through EPA's Internet Firewall, once implemented; and (2) provide additional guidance, training and tools to regional staff to ensure proper administration of regional security programs. Due to the nature of the audit findings, both Region VIII and the Agency's NTSD will need to implement corrective actions to effectively address these weaknesses. We recommend that the Assistant Regional Administrator for Technical and Management Services (TMS) implement advanced authentication techniques and provide periodic dial-up training for all remote users. We also recommend that TMS bring their LAN account settings into compliance with Agency Directives, Region VIII Policies, and best industry practices, and establish additional controls to secure sensitive activities. Furthermore, TMS should establish policies and procedures to ensure that the logical and physical access rights to the computer facilities are limited to those employees who require access to perform their jobs, and TMS should log and monitor dial-up access. Finally, we believe TMS should establish policies and procedures that (1) require all users be formally approved prior to being provided with remote access, (2) require the system to enforce the access list of remote access users, and (3) ensure the access of terminated/separated users is removed in a timely manner. In connection with our report findings, we also issued recommendations to the Director of NTSD. Specifically, we recommend that NTSD establish formal policies and procedures that require all dial-up connections to pass through the firewall. In addition, we recommend that NTSD provide system administrators and information security officers (ISO) with formal guidance and training related to monitoring dial-up access. In summary, Agency officials responded favorably to the report recommendations (see Appendices I & II). In a memorandum dated March 24, 2000, Region VIII's Assistant Regional Administrator for TMS agreed to Report No. 2000-P-16 ------- implement all report recommendations under their span of control. Likewise, in a memorandum dated March 27, 2000, the Director for NTSD agreed with the audit findings, although he stated that NTSD must review various ways of implementing corrective actions before committing to a specific plan of action. vi Report No. 2000-P-I6 ------- TABLE OF CONTENTS Page EXECUTIVE SUMMARY i ABBREVIATIONS ix GLOSSARY OF TECHNICAL TERMS xi CHAPTERS 1 INTRODUCTION 1 PURPOSE 1 BACKGROUND 1 SCOPE AND METHODOLOGY 2 PRIOR AUDIT COVERAGE 2 CRITERIA 2 2 ADVANCED AUTHENTICATION, LOGICAL AND PHYSICAL CONTROLS 5 3 REGION IS NOT MONITORING DIAL-UP ACCESS AND THE USE OF MODEMS 19 4 DIAL-UP ACCESS AND TERMINATION CONTROL PROCEDURES ARE INADEQUATE 25 5 CURRENT PLANS WILL NOT ADEQUATELY SECURE THE NETWORK VIA DIAL-UP ACCESS 31 APPENDICES I REGION VIII's OFFICE OF TECHNICAL AND MANAGEMENT SERVICES RESPONSE TO DRAFT AUDIT REPORT 35 II NATIONAL TECHNOLOGY SERVICES DIVISION RESPONSE TO DRAFT AUDIT REPORT 47 III REPORT DISTRIBUTION 51 vii Report No. 2000-P-I6 ------- THIS PAGE INTENTIONALLY LEFT BLANK viii Report No. 2000-P-16 ------- ABBREVIATIONS ADP Automated Data Processing ESTC Employee Separation or Transfer Checklist IS Information Systems ISO Information Security Officer LAN Local Area Network NDS NetWare Directory Services NTSD National Technology Services Division OMB Office of Management and Budget SA System Administrator TAPP Time and Attendance, Payroll and Personnel TMS Technical and Management Services ix Report No. 2000-P-16 ------- THIS PAGE INTENTIONALLY LEFT BLANK Report No. 2000-P-I6 ------- GLOSSARY OF TECHNICAL TERMS Authentication Ciphertext Decipher Dial-Back Encryption Firewall Key Card Modem Security Incidents The verification of the source, uniqueness and integrity of a message, action, or individual for establishing user accountability Data or plaintext which has been encrypted or enciphered, thus producing unintelligible text or signals. To convert encrypted text, by use of the appropriate key and transformation technique, into its equivalent plaintext (clear text). The user notifies the system to establish network connection (typically by voice call) and enters a password or access code. The network places an outbound call back to the user at a pre-established, authorized phone number. This mechanism can be subverted by call-forwarding. The basic manner of protecting data communications from unauthorized interception. Communications can be encrypted using end-to-end _ encryption. If communications are end-to-end encrypted, the messages are encrypted at transmission and decrypted at the receiving station. The data do not appear in clear form at any intermediate node. With link- encrypted communications, the messages are encrypted before entering a telecommunications link and decrypted after exiting the link. A control point where the access portion of a security policy can be enforced; generally enabled by a Network Communication Device of some sort, ranging in size from an A - B switch to a complex integrated system. Physical device used to control and monitor access to sensitive areas. Electronic device that enables digital data to be sent through analog transmission facilities. Modems enable the user to link to network resources through a dial-in connection. Events which result from a computer virus, other malicious code, or a system intruder. XI Report No. 2000-P-16 ------- THIS PAGE INTENTIONALLY LEFT BLANK X i i Report No. 2000-P-16 ------- CHAPTER 1 INTRODUCTION PURPOSE BACKGROUND The objectives of this audit were to determine if: (1) the dial-up controls currently implemented by the region adequately secure dial-up access; (2) the region is logging and auditing all dial-up attempts to their systems; and (3) terminated employees have dial-up access to the network. The Environmental Protection Agency National Technology Services Division (NTSD) provides the centrally managed Automated Data Processing (ADP) and telecommunications infrastructures required to support the Agency's mission. Without proper controls over dial-up access, confidential and sensitive data may be disclosed during transmission over telecommunication lines. Security of information systems may be defined as the ' control structure established to manage the integrity, confidentiality, and availability of information systems (IS) data and resources. A combination of controls must be implemented to minimize the risk of a successful attack by (1) making unauthorized access difficult to attain and (2) carefully monitoring the dial-up access attempts and responding swiftly to potential security incidents as they occur. The advent of telecommuting increases the risk associated with dial-up access, because more and more- users employ this mode of entry to access EPA's system. The Public Switched Network is used to gain access to the internal network. Any individual possessing the proper equipment can attempt to gain access. Dial-up users, who are not situated in close physical proximity to a network connection, frequently use the public switched telephone networks to dial into the internal network. The security risks vary depending on the type of dial-up connection established with the public networks. Connections through public switched data network are established in a manner similar to that of connections in public telephone network. Report No. 2000-P-16 ------- SCOPE AND METHODOLOGY PRIOR AUDIT COVERAGE CRITERIA Office of Management and Budget (OMB) Circular A-130 The primary focus of the audit was to evaluate the security of dial-up access in Region VIII. Audit fieldwork was conducted from May 1999 through August 1999, at Region VIII in Denver, Colorado. We also spoke with NTSD representatives and reviewed documentation published on the Agency Intranet site related to EPA's Remote Access Implementation Project. We conducted this audit in accordance with Government Auditing Standards. We reviewed and requested applicable system documentation governing dial-up access. In addition, we evaluated the compliance of LAN settings and configuration with established Agency Information Security policies and standards, Federal regulations, and industry standards, using the Novell LAN Manager Software. In addition, we performed a security "walkthrough" and discussed security considerations and requirements with responsible Region VIII representatives. While evaluating Region VIII's dial-up controls, we identified security issues which impact the Region's ability to adequately protect their dial-up access, although they were out of their direct control. These particular security issues fall under the control of EPA's National Technology Services Division (NTSD), and impede the Region from (1) implementing adequate dial-up controls and (2) effectively and efficiently monitoring dial-up access. Because of the significance of these issues, we are including them as a part of our audit report. No prior OIG audit coverage relates to dial-up access controls at the Region VIII facilities in Denver, Colorado. Federal and Agency guidelines, as well as industry publications, were used to form a framework of prudent, stable business practices and, therefore, served as a means to evaluate dial-up security. OMB A-130 requires each agency to ensure that a capability exists to help users when a security incident occurs in the system and to share information concerning common vulnerabilities and threats. Technical tools such Report No. 2000-P-I6 ------- National Institute of Standards and Technology: An Introduction to Security Handbook, Special Publication 800-14 as virus scanners, vulnerability assessment products (which look for known security problems, configuration errors, and the installation of the latest patches), and penetration testing can assist in the on-going review of different facets of the systems. Appendix III to this circular prescribes a minimum set of controls to be included in Federal automated information resources security programs and assigns Federal agency responsibilities for the security of automated information resources. This circular also includes limits on collection and sharing of information and procedures to assure the integrity of information as well as requirements to adequately secure the information. This handbook provides the necessary direction for computer security incidents which might result from a computer virus, other malicious code, or a system intruder or outsider. Containing an incident should include an assessment of whether the incident is part of a targeted attack on the organization or an isolated incident. This- publication emphasizes that a good incident handling capability is closely linked to an organization's training and awareness program. Identification and authentication is a technical measure that prevents unauthorized people (or an unauthorized process) from entering an IT system and, therefore, a critical building block of computer security. This measure is the basis for most types of access control and for establishing user accountability, although not all types of access controls require identification and authentication. Report No. 2000-P-I6 ------- THIS PAGE INTENTIONALLY LEFT BLANK Report No. 2000-P-16 ------- CHAPTER 2 ADVANCED AUTHENTICATION, LOGICAL AND PHYSICAL CONTROLS The authentication, logical, and physical controls implemented by Region VIII do not adequately secure dial- up access. In particular, Region VIII does not use advanced authentication techniques to help secure its dial-up access. Also, some of Region VIII's LAN account settings are not in compliance with Agency Directives, Region VIII policies, and best industry practices; therefore, logical security is not optimally enforced via the network operating system. Furthermore, Region VIII does not adequately control physical access to its computer room. All of the above represent critical controls which must be adequately implemented to help ensure dial-up access to the region's systems, as well as to EPA's Network, are adequately protected. Based on discussions with Region VIII management, we believe that the lack of personnel resources has made security a low priority. These control inadequacies could leave the region's systems, as well as EPA's Network, vulnerable to security breaches from hacker attacks within and outside the Agency. Advanced Authentication Techniques And Encryption Needed to Secure Access Region VIII is not using any advanced authentication techniques, such as one-time password technology and dial-back, to protect their dial-up access to the network. Access to a LAN is generally limited to personnel with access to the facility. However, once dial-up access is provided, the network is potentially opened to the public by providing external access points. In our opinion, dial-up access to EPA's Network needs additional controls to properly secure and control these external access points. The region's current means of authenticating dial-up users, encrypted static passwords, does not provide sufficient protection for EPA's network. Static encryption does not prevent a perpetrator from capturing the authentication password data and replaying it later to login as an authorized user. When a password is encrypted, an Report No. 2000-P-I6 ------- algorithm is applied to the password to generate a "nonsense" string of characters (ciphertext) that represent the password. After the password is transmitted and received, a second algorithm is applied to undo (decipher) what the original algorithm did to generate the ciphertext. Because the Novell system applies the same algorithm to each password, whenever the same password is encrypted, the resulting ciphertext will be the same. Therefore, although a perpetrator cannot read your encrypted password (ciphertext), they still can provide the system with the correct password. The system is not expecting the password itself to be transmitted; rather, it is expecting to receive the encrypted password (ciphertext) which it will decrypt to validate the password. Any perpetrator can break into the system by grabbing the ciphertext (without knowing the password it represents) and submitting it to the system to be decrypted and validated. In this scenario, the ciphertext (the encrypted password) becomes the password, because the system is searching for the ciphertext to authenticate the user, not the password itself. Region VIII management indicated that they only use static encrypted passwords because they choose not to invest in more advanced technologies. EPA's Information Security Manual requires encryption for the transmission of confidential information. Region VIII management stated they had not implemented encryption of the data due to a lack of funds. Region VIII indicated that users are not supposed to have any confidential information on the network. However, many of EPA's national applications require input of confidential information and these applications are accessed through the Network. For example, the Time and Attendance, Payroll and Personnel (TAPP) system is accessed through the LAN and requires the input, transmission, and storage of Privacy Act Information, such as social security numbers (considered confidential) maintained on the system. If Region VIII's LAN is compromised, perpetrators could use this unauthorized access to collect transmissions of confidential information sent over the LAN connection to the national system. The perpetrator could also use the unauthorized LAN access to compromise other systems that are accessed through the LAN connection, such as the national systems. 6 Report No. 2000-P-I6 ------- In response to our audit inquiries, management indicated that they plan to implement the 128-bit encryption provided with Novell Version 5, by the end of fiscal 2000. In our opinion, encryption is also necessary to protect sensitive information transmitted by privileged users working on the system remotely. Novell system software provides the means (i.e., "remote console") for a user to perform, remotely, privileged tasks that are normally performed at the server itself. One way to obstruct perpetrators from performing privileged tasks is to prevent them from gaining physical access to the server. Remote console was designed to allow these privileged functions to be performed from a regular work station, so that the real server could be locked away in a safe place without a keyboard and monitor. To initiate a remote console session, the user must know and enter the remote console password for that particular server. When a privileged user logs into the network remotely to initiate a remote console session, the user must transmit that static password which gives the right to initiate the remote console session. Any user who gains access to a remote console session is allowed to: • use console commands as if they were physically at the server console; • scan directories and edit text files in both NetWare and DOS partitions on the server; • transfer files to, but not from, a server; • bring down or reboot a server; and • install or upgrade NetWare. If a "remote console" password is captured by a perpetrator, it provides privileged access that could potentially compromise the EPA network. Even if a perpetrator simply monitors a privileged user's session, the perpetrator can learn sensitive information about the server and how it is configured and secured. Such information could assist the perpetrator in subsequently manipulating or destroying 7 Report No. 2000-P-16 ------- Logical LAN Account Settings Not Compliant With Directives. Policies and Best Practices EPA data. These types of sessions are very sensitive and should require end-to-end encryption for the entire session. The system administrator indicated that he transmits sensitive information when he stated that he sometimes works remotely on the system, as a privileged user, to perform fixes rather than driving all the way to the office. Our audit also disclosed that Region VIII uses the same remote console password for multiple servers, even though NTSD pointed out this vulnerability in a risk assessment, dated August 1, 1997. As a result, if a perpetrator figured out the remote console password for one of the servers, they could successfully gain remote console access on a number of others by trying the same password. As NTSD pointed out in their assessment, this practice is convenient, but it allows a security breach on a single server to compromise security on other servers and condones additional exposure of privileged IDs. Some of the Region VIII LAN account settings are not in compliance with Agency Directives, Region VIII Policies, and best industry practices. Complying with minimum LAN settings is important because they implement the logical security enforced by the network operating system. The dial-up access relies on the logical security provided by the network operating system to help secure access to the Novell network. By not consistently following these guidelines, the region is leaving its LANs, as well as EPA's network, vulnerable to security breaches from hacker attacks within and outside the Agency. Due to the nature and quantity of the vulnerabilities noted, we are presenting them in a table format. The following table summarizes the vulnerabilities and effects on the Region's LANs, as discovered during our audit: NOVELL LAN MANAGER RESULTS REGION VIII DENVER, CO CONDITION EFFECT Organizational Units with Intruder Detection Not Turned On The Organizational Units within the NetWare System must be set to Detect Intruders in order to enable its Intruder Detection capabilities. When enabled, the system can track login attempts and lock accounts after the established number of consecutive 8 Report No. 2000-P-16 ------- NOVELL LAN MANAGER RESULTS REGION VIII DENVER, CO CONDITION EFFECT incorrect login attempts have been reached. Not turning on the Intruder Detection permits unlimited access attempts to the user accounts associated with the applicable Organizational Units by an intruder. Organizational Units with Incorrect Login Attempts set greater than 3 The Incorrect Login Attempts represent the number of consecutive Incorrect Login Attempts within the time period specified within the organizational units of the system (by the Intruder Attempt Reset Interval) before the system detects the attempts as an intruder. Too high a number of allowed incorrect login attempts can give intruders multiple opportunities to gain access to the user accounts associated with the applicable Organizational Units within the system.. Organizational Units with Intruder Attempt Reset Interval set too low (less than 24 hours) The Intruder Attempt Reset Interval is the amount of time the system stores the count of consecutive incorrect login attempts (without resetting them to zero) necessary for identifying access attempts as an intrusion. The count is set back to zero when the time interval expires or when a successful login occurs. Too short a period before the count of incorrect login attempts resets to 0, can give intruders multiple opportunities to access the user accounts associated with the applicable Organizational Units by allowing them more attempts on an account within a specified period without detection. Organizational Units Not set to Lock Account after Detection An intruder can repeatedly attempt to log into the server on user accounts associated with applicable Organizational Units without interruption if an organizational unit is not set to lock account after detection. The Intruder Lockout Reset Interval not set to maximum number of days (999 days). The Intruder Lockout Reset Interval is the amount of time the system maintains an account lockout without automatically resetting (unlocking) the account. The region stated that they set their Intruder Lockout Reset Interval to 90 days. EPA requires that it be set to the maximum that the operating system will allow or until the System Administrator unlocks the account. Report No. 2000-P-16 ------- NOVELL LAN MANAGER RESULTS REGION VIII DENVER, CO CONDITION EFFECT Accounts that Do Not Require a Password All non-privileged user accounts (objects) should be required to have a unique alphanumeric password that is at least 6 characters long. Privileged user accounts (objects) should be required to have a unique alphanumeric password that is at least 8 characters long. The system should be setup to require a password for all user accounts. Requiring a password limits the exposure of a network to unlimited unauthorized usage. Accounts that Do Not Require a Unique Password The system should be set to require unique passwords. Not requiring unique passwords allows the user to reuse the same password over and over again. Since unique passwords cannot be reused after they have expired, requiring them limits the exposure of a network from unauthorized use of compromised passwords. Accounts that Do Not Require Periodic Changes to the Password The system should be set to require forced periodic changes to passwords. Not requiring periodic (at the most, every 90 days) changes to passwords allows a user to continue using the same password indefinitely. Requiring that passwords be changed periodically (at the most, every 90 days) limits exposure of a network from unauthorized use of compromised passwords. Maximum Concurrent Connections not Limited to One. The maximum concurrent connections should be limited to one. Allowing more than one concurrent connection not only creates the risk of users leaving unattended workstations logged into the file server but also allows perpetrators to log into a user's account at the same time as the user. If it was limited to one concurrent connection, the perpetrator would not be permitted to login if the user was logged in and vice versa. If a perpetrator was using the user's account, the user would be aware of a problem because the user would not be able to log into their account. The user would then be able to bring it to the system administrator's attention. With it not set at one concurrent connection, the user might never know that someone else was using their account. 10 Report No. 2000-P-16 ------- NOVELL LAN MANAGER RESULTS REGION VIII DENVER, CO CONDITION EFFECT Minimum Password Length was not set at 6 for all non-privileged accounts and at 8 for all privileged accounts The system should be set to require that all non-privileged accounts have a minimum password length of 6 and that all privileged accounts have a minimum password length of 8. Short passwords are easier to crack by a "brute force" method than are long passwords. Region VIII recognized this concept and was proactive in requiring privileged accounts to have a minimum password length of 8. The Region stated they are only using Time and Day Restrictions for performing backups. The Region indicated that time and day restrictions are set at liberal levels to provide an optimum level of customer responsiveness. The system should be set to restrict access to the network for hours that are not used for performing work (such as from 11 :OOPM to 4:OOAM Mountain Time as a default). Users with a legitimate business need can have their restrictions set specifically to meet that need. By restricting access to the system by day and time, perpetrators will have a smaller window of opportunity to compromise accounts. NTSD Server Setting Not Consistent with Best Industry Practices Physical Access to Computer Room Inadequately Controlled The NTSD security server, used for dial-up access through the main numbers, is currently set to lock out an account on the fifth consecutive incorrect login attempt. As indicated in the table above, the system should be set to lockout an account after three consecutive incorrect login attempts. Setting the number of allowed incorrect login attempts too high can give intruders additional opportunities to gain access to the system. Although Region VIII uses access Card Keys to restrict physical access to the computer room, management is not adequately addressing other controls necessary to ensure the safety of computer resources and network data. For example, regional management does not adequately control the issuance, termination, and oversight of the access cards to the computer room. Neither has management implemented policies and procedures for adequately supervising and documenting visitors in the computer room. These inadequacies provide perpetrators with a 11 Report No. 2000-P-16 ------- means of circumventing the logical security in place. In addition, security cameras only monitor the entrance and exit points to the EPA office space and do not monitor access to the computer room. We also found that Region VIII has far too many employees and contractors with Card Key access to the computer room. Specifically, the Region has 139 Card Key IDs with key-card access to the computer room. This access is broken down as follows: • 48 Card Key IDs with a Card Key access code of "06" (Access to computer room 24 hours a day/ 7days a week); • 5 Card Key IDs with a Card Key access code of "60" (Access to computer room from 6:00 AM to 6:00 PM/ Monday through Friday); and • 86 Card Key IDs with a Card Key access code of "08" (Access to everywhere in the Region, _ including the computer room 24 hours a day/7 days a week). Furthermore, a survey performed by Region VIII's ISO determined that: only 6 personnel need Card Key 24 hours/7 days a week access to the computer room, because their job functions require them to enter the computer room on a regular and frequent basis, as well as, after hours (weekends, evenings); and • an additional 7 personnel need Card Key workday access to the computer room, because their job functions require them to enter the computer room on a regular and frequent basis during normal work hours. Access Code 60 was intended to be used to limit access by personnel (such as contractors and grantees) to the computer room to only those hours when it is manned by normal operations staff. Our analysis disclosed that the personnel (with Access Code 60) that were assigned limited 12 Report No. 2000-P-16 ------- access to ensure that the computer room is manned during their visits, have the ability to access the computer room while it is not manned. Regional management confirmed that the computer room is manned during normal workday hours, from 06:30 AM to 05:00 PM, Monday through Friday. However, the limited hours assigned to personnel (Code 60) is from 6:00 AM to 6:00 PM, Monday through Friday. This difference in the hours allows these personnel (employees, grantees and contractors) the ability to gain access to the computer room while it is not manned. Management Needs to Make Operations management needs to make security a higher Security A Top Priority priority and apply an appropriate portion of available resources to properly secure, as well as maintain, dial-up access controls. Region VIII operations management indicated they were understaffed, because several people had left and their positions had never been refilled. They stated that the weaknesses we found were due to the lack of adequate staffing. Regional managers also indicated that they intentionally chose not to invest in more advanced security technologies due to a lack of funds. In our — opinion, management needs to place a higher priority on information security by providing appropriate funding and additional qualified staff necessary to implement and maintain adequate security. In our opinion, Region VIII also lacks the management oversight necessary to ensure that adequate security over their systems is implemented and maintained. For example, regional managers were aware of the results of the NTSD risk assessment, dated August 1, 1997, and yet many of the noted deficiencies were still present when we conducted our fieldwork two years later. In addition, Region VIII did not have a quality control function to ensure the controls were actually implemented and working as intended. For example, Region VIII policy states that all non-privileged users are required to use passwords which are at least six characters long. However, we found that the system did not require all non-privileged users to use passwords at least six characters long. A quality control function could have ensured that the system requirement was adequately enforced and working as intended. 13 Report No. 2000-P-I6 ------- Region VIII should also designate resources to establish adequate formal policies and procedures concerning the implementation of advanced authentication, logical access, and physical access controls. At present, Region VIII lacks acceptable formalized policies and procedures which (1) communicate to applicable personnel the control requirements and (2) specify how controls are to be implemented to ensure proper security. RECOMMENDATIONS Due to the nature of the issues, it is our opinion that both Region VIII and the Agency's NTSD need to implement corrective actions to effectively address these weaknesses. We recommend that the Assistant Regional Administrator for Technical and Management Services: 2-1. Require the use of advanced authentication techniques, such as one-time password technology and dial-back, to help protect their dial-up access to the network. 2-2. Provide initial and periodic training for all dial-up users to ensure they understand the policies and procedures related to protecting sensitive information. 2-3. Implement the following controls for privileged user's accounts and whenever "remote console" is used: a callback list or some other form of advanced authentication for authenticating the sessions, end-to-end encryption for the entire session, and • console logging to record actions performed within the session. 2-4. Implement "remote console" password controls by requiring: 14 Report No. 2000-P-16 ------- • read & browse access to the Autoexec.ncf file be limited to very few privileged users, • different passwords for each server, • periodic changing of the passwords, • unique passwords, • alphanumeric passwords (i.e., passwords containing a mixture of alpha and non-alpha characters), passwords that are at least 8 characters long, and • encryption of the password. 2-5. Implement Agency and industry standards to correct the conditions identified in the Novell LAN Manager Results Table. 2-6. Establish and implement formal policies and procedures that ensure adequate control over the issuance, termination, and oversight of the access cards to the computer room. The formal policies and procedures should ensure that: • requests for access identify the specific job duties requiring physical access to the computer room on a frequent basis. Requests should also identify the specific job duties requiring frequent access to the computer room during other than normal work hours, in order to justify card key access that allows other than normal workday hours access to the computer room. • documentation is maintained to support the review and approval process. • facilities personnel promptly remove an employee's access rights from the card key 15 Report No. 2000-P-I6 ------- system when such access is no longer required. • all card key access to the computer room is reviewed and verified by the owner of the resource at least every six months. This process will ensure that the access possessed by the applicable personnel is still required for the performance of their jobs. • code 08, which provides access to the entire regional space, not include access to the computer room. Access to the computer room should be limited to codes specifically for that purpose (e.g., codes 06 and 60). • card key access to the computer room is limited to personnel with the proper level background investigation and whose job duties require them to have physical (not logical) access to the computer room ona regular and frequent basis. Non-EPA employees which fall into this category should have their access limited to normal work hours when the computer room is manned. • times permitted for limited card key access to the computer room are modified to match the hours when the computer room is scheduled to be manned, and • secured access cards are maintained by building security, and signed in and out by guards, building engineers, and building owners on an as needed basis. 2-7. Develop policies and procedures for supervision and documentation of visitors to the computer room. These policies and procedures should include, but not be limited to, the following guidelines: 16 Report No. 2000-P-16 ------- • All personnel who do not possess a computer access card for the computer room should be considered a "visitor." • All visitors should be required to: (l)sign in and out, and write the purpose for their visit on the computer room visitors' log; and (2) be escorted by personnel authorized to access the computer room without an escort (i.e., non-visitors) while in the computer room. • Cleaning personnel should always be treated as a visitor. In addition, we recommend that the Director of NTSD: 2-8. Implement formal policies and procedures for communications servers, which are set to lock out an account after 3 consecutive, incorrect login attempts. AGENCY COMMENTS In a memorandum dated March 24, 2000, Region VIII's AND OIG EVALUATION Assistant Regional Administrator for Technical and Management Services responded to our draft report (See Appendix I). The Region agreed with and established milestones for all seven chapter recommendations. Furthermore, the Region identified and set milestones for additional actions which will further secure authentication, logical and physical controls pertaining to dial-up access. Among other things, Region VIII's response indicated they will: (1) not implement dial-up access until NTSD implements an approved solution; (2) not use "remote console" until encrypted sessions and advanced authentication techniques are implemented; (3) implement policies and procedures to control the issuance, termination, and oversight of access cards to the computer room, as well as supervise and document visitor access; (4) continue to modify LAN account settings to comply with Agency and industry standards; and (5) provide initial and periodic training for all dial-up users to ensure they understand policies and procedures concerning the protection of sensitive information. 17 Report No. 2000-P-16 ------- In our view, the corrective actions and milestone dates described in Region VIII's response to the seven recommendations are appropriate and should, when fully implemented, respond adequately to those recommendations. We will evaluate these corrective actions during our follow-up review. NTSD's Director also responded to our draft report via a memorandum dated March 27, 2000 (See Appendix II). In summary, NTSD agreed with our audit findings and conceptually agreed with the report recommendation. However, management did not provide a detailed action plan and milestones for implementing corrective action because they are currently reviewing ways to implement the recommendation. NTSD has agreed to investigate the issue and reduce the number of allowed access attempts to an absolute minimum. However, they are concerned that revoking access after three failed attempts may be impossible, because multiple levels of authentication are required by the remote access login process. 18 Report No. 2000-P-16 ------- CHAPTER 3 REGION IS NOT MONITORING DIAL-UP ACCESS AND THE USE OF MODEMS Our audit disclosed that Region VIII does not log, audit, or follow-up on dial-up access to their computer systems, although such functions are basic to monitoring computer access points for security violations. In addition, the region does not have specific incident response policies and procedures for handling detected dial-up security incidents. During our audit, we discovered that NTSD was logging the dial-up access to Region VIII through the main access number connected with the Agency's remote access project. However, we determined that neither regional nor NTSD personnel are auditing the logs to identify potential security violations. Furthermore, logging for Region VIII's systems was turned off, because management stated they were waiting for Agency IRM officials to provide them with a standard configuration for establishing the logging capability. We also determined that Region VIII is not tracking and controlling the use of modems, nor are there any policies and procedures to govern modem usage. In response to our audit, Region VIII issued policies and procedures related to the use of modems. These policies and procedures require that: • modems must be approved in writing by the LAN Administrator, and • only modems and software meeting approved Region VIII standards may be purchased or used. However, our review found these new policies and procedures to be inadequate because they do not: adequately incorporate Agency Interim National Telecommunications Network Security Policy requirements which state: (1) all remote dial-up into the Agency's telecommunication network must utilize the Agency's approved remote access 19 Report No. 2000-P-16 ------- solution; (2) the solution will be implemented by November 30, 1999; and (3) within 180 days following that date, all non-approved dial-up data circuits, modems, and modem banks must be removed by the local information management officials. • ensure that authentication data is adequately protected with access controls, one-way encryption, and advanced authentication techniques to prevent unauthorized individuals, including system administrators, from obtaining and using the data. • ensure that the location of modems, and individual(s) who control the use of the modems, are formally identified. • ensure that the use of modems will be logged and audited for security incidents and that follow-up procedures are performed on incidents. • ensure that formal written procedures are in place for approving connection of a modem before it can be connected to the network itself or to any workstation connected to the network. Procedures should specify how the formal approval process (in writing) will be performed and documented, as well as how the documentation will be maintained. • ensure that inventory records will be maintained, providing information such as the location, phone number, etc. of each approved modem. • ensure that the modem is added to the network schematic as a recognized dial-up connection. strongly state that unauthorized modems will not be permitted nor specify the consequences if the policy is not followed. In response to our audit, Region VIII attempted to identify their approved modems. However, they could not identify the approved modems because they do not maintain an inventory of the modems and their locations. 20 Report No. 2000-P-16 ------- The aforementioned dial-up access requirements are all critical controls that must be in place to adequately protect not only Region VIII's servers, but EPA's network as well. Without identifying all dial-up access points (such as modems), Region VIII is unable to identify which access points need to be monitored and controlled. Dial-up access points provide potential backdoors into the network and, therefore, must be continually logged and monitored. Without logging the dial-up access, the region cannot capture information necessary to hold users accountable, detect security incidents, and prosecute offenders. Furthermore, if the logs are not audited for potential security violations, then attacks on EPA's systems will not be discovered. Management Needs to Make As previously stated in Chapter 2, Region VIII's operations Security A Top Priority managers have not assigned security as a top management concern and, as a result, have not designated sufficient resources to adequately secure and maintain dial-up access. Regional management stated that they did not have sufficient human resources to address security controls,- citing that several personnel vacancies were never refilled We also believe that Region VIII lacks the management oversight necessary to ensure that adequate security over their systems is implemented and maintained. In particular, we refer to a prior regional risk assessment, performed by NTSD in August 1997. Although NTSD alerted Region VIII managers to various control deficiencies, we noted that many of these deficiencies still exist. In many respects, management seemed to be unaware of what network activities were and were not being conducted within the region. For example, management indicated they thought dial-up access was being logged and monitored; however, our audit disclosed that the Region was not conducting such activities and that the audit logging capability for Regional servers was not turned on at all. Similarly, management thought they could generate a list of approved modems, but later realized that they could neither identify how many modems existed within the region nor where these modems were located. Our audit results demonstrated that Region VIII has not implemented a quality control function to ensure sufficient controls exist and are operating as intended. 21 Report No. 2000-P-16 ------- In our opinion, another contributing cause is the absence of acceptable formal policies and procedures needed to communicate regional control requirements and specify how controls should be implemented. Currently, Region VIII does not have adequate formalized policies and procedures to address control functions over dial-up access, such as (1) logging, auditing, and follow-up and incident response processes, and (2) the identification, use and administration of modems. Furthermore, Region VIII staff believe they lack the guidance and training they need to perform their jobs. For example, during our audit, Regional managers indicated that they were waiting for guidance and training before implementing any logging, auditing, follow-up, and incident reports regarding dial-up access. Additionally, management indicated that they were waiting for guidance and training from NTSD (as described in Chapter 5) before turning on the Network logging function. As a result of our audit findings, management indicated that they would contact NTSD and start logging, auditing and following up on dial-up access attempts. RECOMMENDATIONS We recommend that the Assistant Regional Administrator for Technical and Management Services: 3-1. Establish formal policies and procedures that require all dial-up accesses to be logged and monitored for security incidents. These logs should be reviewed on a daily basis to detect security incidents through the use of exception reports, statistics, etc. 3-2. Develop formal policies and procedures that detail the specific responses to be taken when a security incident is identified. 3-3. Revise formal policies and procedures related to the use and control of modems. Ensure that modems are identified and adequately secured. 22 Report No. 2000-P-I6 ------- AGENCY COMMENTS TMS's March 24, 2000, response to our draft report AND OIG EVALUATION indicated that they agreed with all of the report recommendations (See Appendix I). Specifically, the Region established milestones for implementing corrective actions to address the three recommendations detailed in this chapter. In summary, Region VIII officials agreed to (1) establish formal policies and procedures covering dial- up access logging, as well as security incident handling; and (2) revise formal procedures related to the use and control of modems. In our view, the corrective actions and milestone dates described in Region VIII's response to this chapter's three recommendations are appropriate and should, when fully implemented, respond adequately to those recommendations. We will evaluate these corrective actions during our follow-up review. 23 Report No. 2000-P-16 ------- THIS PAGE INTENTIONALLY LEFT BLANK 24 Report No. 2000-P-I6 ------- CHAPTER 4 DIAL-UP ACCESS AND TERMINATION CONTROL PROCEDURES ARE INADEQUATE Our review disclosed that terminated employees retain dial- up access to the network. Specifically, we found that many of Region VIII's terminated/separated employees still possess card key account access to the computer room or on-line access to EPA's network. Our audit also disclosed that Region VIII is maintaining two conflicting lists of personnel approved to dial into and work on the network from locations such as home, hotel, etc. (i.e., telecommuters). In addition, neither of the two lists of approved telecommuters are enforced by the network operating system. Although Region VIII had policies and procedures related to the aforementioned areas, those policies and procedures, as well as their implementation, did not ensure telecommuter access was properly approved and controlled. Furthermore, those policies and procedures did not ensure that the access rights of terminated personnel were removed. These are critical controls which must be in place to adequately protect Region VIII's Systems, as well as EPA's network. Terminated/Separated Our audit results disclosed that terminated/separated Employees Maintain Access employees still possess card key account access to the Rights regional computer room or the ability to access the network directly or via dial-up. Although an employee is required to submit their card key as a part of the Employee Separation or Transfer Checklist (ESTC), not removing the access allows the card to continue to be used by whomever possesses it. If used, the card would indicate that the terminated employee entered the computer room, rather than the person who actually possessed the card. Currently, Region VIII uses an ESTC to process personnel transfers, terminations, and separations. The ESTC provides a checkoff block to verify removal of LAN User IDs, but the form does not provide a checkoff item for removing personnel from the computer room access list. All the ESTCs reviewed indicated that Network access had 25 ReportNo.2000-P-l6 ------- Region Needs Better Policies and Procedures To Govern Personnel Departures been removed; yet we noted many instances in which terminated employees still had active Network User IDs. Management indicated that, in most cases, they signed off on the checklist, recognizing the need to actually disable the account at a later date. Management believed that the cases we found were instances where the signing official forgot to return to disable the account. Not eliminating access of terminated/separated personnel gives potentially disgruntled persons the ability to access the computer room and network. This regional weakness also propagates accounts assigned to users who no longer exist on EPA's employment rolls. These accounts are prime targets for hackers to get a foothold into the network, because no users exist to complain, should changes occur to their account. In our opinion, the Region's current policies and procedures regarding terminated and separated personnel are not adequate. Current policies do not ensure that terminated/separated employees' access rights are removed on the effective date or prior to the notification date of the action, dependent on whether the departure is friendly or unfriendly. Furthermore, these policies and procedures do not adequately address important control considerations, such as: • requiring all requests for access to state the level of access to be granted, perhaps by function or by specifying a particular user profile. This control will help ensure that the access levels of the account will be consistent with those requested by the supervisor. • tracking new applications to add, upgrade and remove access to ensure that (1) users only are allowed access to those functions necessary to perform their assigned duties and (2) the access rights provided are up to date. • specifically describing separate procedures for handling friendly and unfriendly terminations. 26 Report No. 2000-P-I6 ------- List Of Approved Dial-Up Users Is Not Complete. Accurate or Enforced • ensuring that (1) access rights of potential ly unfriendly terminations (e.g., fired or laid-off personnel) are removed prior to notifying said employees, and (2) management's position regarding consequences when such procedures are not followed is clearly stated and enforced. • issuing management's position regarding (l)the prompt removal of access rights for all terminated personnel's user accounts, (2) required removal of all terminated personnel's user accounts within a specified time frame, and (3) consequences which will occur if procedures are not followed within the specified time frame. • requiring SIRMOs to follow-up on procedures for deactivating accounts and ensure that such procedures have been accomplished, as required by EPA's Information Security Manual. Region VIII maintains two conflicting lists of approved telecommuters and neither list is enforced by the system. Both human resources and the systems group maintain lists of approved telecommuters, but these two lists do not agree with each other. Furthermore, we discovered that any user who is included in the NetWare Directory Service (NDS) Tree (that is, every user in Region VIII with Network access) is permitted, by the network operating system, to access the network via dial-up connection. Accurately identifying, tracking, and enforcing user- specific dial-up access needs is a critical control which must be in place to adequately protect not only Region VIII's servers, but EPA's Network as well. Inadequate controls over who can access the network via dial-up allows all users, by default, to have this access. Moreover, the situation provides more potential user accounts through which a hacker can attempt to gain access. In addition, this exposed method of controlling access requires the system administrator to monitor (on a daily basis) the dial-up usage of a larger number of user accounts for potential security violations. 27 Report No. 2000-P-I6 ------- Region Needs Policies, Procedures and System Controls to Secure Remote Access RECOMMENDATIONS Our audit disclosed that Region VIII has not established policies and procedures to ensure that the Human Resources list of approved telecommuters represents a valid and complete accounting of people who require dial-up access to the system. Furthermore, Region VIII has not established a separate user group within the network operating system which only includes authorized dial-up users as members. Establishing a separate system group would restrict the dial-up access to only authorized users who require remote access to perform their job. We recommend that the Assistant Regional Administrator for Technical and Management Services: 4-1. Develop formal dial-up policies and procedures that ensure terminated/separated employees' access rights are removed on the effective date for friendly actions or as soon as possible for unfriendly actions (i.e., immediately upon notification if initiated by the employee or prior to the notification date if initiated by EPA). 4-2. Establish and implement policies and procedures that require periodic review and verification (at least every 6 months) of logical and physical access rights to the computer facilities to ensure that personnel still need such access to perform their jobs. 4-3. Establish and implement formal dial-up policies and procedures that require all users requesting remote access to go through a formal approval process prior to being provided with remote access to the Network. 4-4. Establish a separate NetWare user group within the Operating System that provides dial-up access rights to the Network. Only add a user to this group once the user has been formally approved to access the network via dial-up connections. 28 Report No. 2000-P-16 ------- AGENCY COMMENTS In a March 24, 2000 memorandum, Region VIII's Assistant AND OIG EVALUATION Regional Administrator for IMS responded favorably to our report recommendations. The Region agreed with the four recommendations outlined in this chapter and established milestones for implementing corrective action. Furthermore, Region management identified and set milestones for additional actions which, they agreed, would further secure dial-up access and termination control procedures. In summary, Region VIII officials agreed to establish and implement formal policies and procedures covering: (1) the granting of remote access rights, (2) periodic review and verification of logical and physical access rights to computer facilities, and (3) the prompt removal of access rights for terminated or separated employees. Regional personnel also stated that NTSD is now controlling the access list of all dial-up users and that they will rely on NTSD's solution. In our view, the corrective actions and milestone dates described in Region VIII's response to the four recommendations from this chapter are appropriate and" should, when fully implemented, respond adequately to those recommendations. We will evaluate these corrective actions during our follow-up review. 29 Report No. 2000-P-I6 ------- THIS PAGE INTENTIONALLY LEFT BLANK 30 Report No. 2000-P-I6 ------- CHAPTER 5 CURRENT PLANS WILL NOT ADEQUATELY SECURE THE NETWORK VIA DIAL-UP ACCESS While evaluating Region VIII's dial-up controls, we identified security issues which impact the Region's ability to adequately protect their dial-up access, although they were out of their direct control. These particular security issues fall under the control of EPA's National Technology Services Division (NTSD), and impede the Region from (1) implementing adequate dial-up controls and (2) effectively and efficiently monitoring dial-up access. Because of the significance of these issues, we are including them as a part of our audit report. EPA's current plans do not sufficiently ensure that dial-up access to the Agency's network will adequately secure the dial-up entry point(s) to the network, nor do their plans ensure that the monitoring of dial-up access will be accomplished in an effective and efficient manner. In particular, we discovered that NTSD currently has no plans to force dial-up access through the Internet Firewall (i.e., the firewall intended to separate the Agency's internal network from all external sources). In addition, we found that NTSD management has no plans to provide additional statistics, logs, exception reports, guidance or training to assist cognizant sites with monitoring dial-up access for security violations. We believe that the Agency's implementation of controls to support and secure dial-up access are critical, because they represent the first line of defense to the EPA Network. In our opinion, management needs to assign a higher priority to security to help ensure that dial-up access is adequately secured. Current Plans Will Allow NTSD currently allows dial-up users to connect directly to Backdoors Into EPA's Network EPA's network through communications servers; furthermore, management has no plans to force dial-up access to these servers through the Firewall, once implemented. As such, dial-up connections to regional communication servers will not be directed through the Agency's firewall(s). 'In our opinion, such a configuration 31 ReportNo.2000-P-l6 ------- No Statistics Or Exceptions Reports To Assist System Administrators Lack Of Guidance And Training Inhibit Insightful Analysis Of System Data will defeat the purpose of the firewall(s) by providing backdoors into EPA's network. One of the basic requirements for a firewall to be effective is that all external traffic must pass through it. The more exceptions management makes to that basic philosophy, the less reliance the Agency can place on its ability to secure data from external users. NTSD management has no plans to create additional statistics, logs, or exception reports to assist system administrators in monitoring dial-up access for security violations. Although logged information is available for monitoring security, no exception reports or statistical information are specifically designed and disseminated to assist the System Administrators (SAs) in monitoring dial- up access for security incidents. At present, SAs must execute queries against log files to obtain information useful for monitoring the dial-up access to their systems. While providing SAs with the ability to query the log files is a good option, we believe that a more time- and cost- effective approach would be to provide them with standardized exception reports and statistics. In our opinion, providing SAs with reports and statistics to monitor their systems' security may help combat the inconsistencies which currently exist regarding the application of security controls between regions and program offices within EPA. Our audit disclosed that NTSD management assigns responsibility and provides a tool for System Administrators to use in fulfilling that responsibility, but they do not provide adequate guidance and training on how to use the tool to fulfill the responsibility assigned. Currently, NTSD management has no plans for providing training or formal guidance to SAs regarding how logs, statistics, or reports should be used to monitor dial-up access for security violations. However, NTSD management stated that they plan to disseminate information to Agency Security, Telecom, and Information Technology operations managers to inform them that such information is available for use. In our opinion, providing adequate tools, guidance and training to the personnel responsible for monitoring dial-up access is necessary to 32 Report No. 2000-P-I6 ------- Management Not Planning To Afford Security Adequate Resources RECOMMENDATIONS help ensure that monitoring is performed correctly and in a consistent, efficient and effective manner. Management needs to assign a higher priority to security to help ensure that dial-up access is adequately secured. NTSD officials state that the cost of implementing a firewall for each of the planned remote access servers is prohibitive; for that main reason, they do not plan to force the dial-up access through the Firewall. Furthermore, NTSD management believe that exception reports, additional logs or statistics are not needed to assist regions in monitoring dial-up access. Management believes that regional staff can do an adequate job of monitoring access if NTSD (1) continues to log all available data from the Cisco Secure System and (2) provides cognizant personnel query access to these logs. NTSD management also indicates that guidance, policies, and procedures related to remote access will be included in the Agency's Network Security Policy, which is still in the process of being developed. We recommend the Director of NTSD: 5-1. Establish and implement formal policies and procedures that ensure that all dial-up connections are routed through the Firewall(s) once the firewall is completed. Develop standardized exception reports and statistics that would assist system administrators and ISOs in monitoring dial-up access to their systems for security incidents. 5-3. Develop and implement formal guidance and training for system administrators and ISOs to instruct them in the use of the logged information currently available (as well as any additional logs/statistics/reports) used to monitor their systems for security incidents. This training and guidance should also educate them on how to respond to security incidents. 5-2. 33 Report No. 2000-P-I6 ------- AGENCY COMMENTS In a memorandum dated March 27, 2000, the Director of AND OIG EVALUATION NTSD responded favorably to our draft report (see Appendix II). Although NTSD generally agreed with our audit findings, management did not provide a detailed action plan in response to recommendation #5-1, nor did they identify milestones for implementing a corrective action. NTSD management stated that they are reviewing ways to implement that recommendation and will provide a detailed action plan to the OIG by June 1, 2000. To date, NTSD management has agreed to: (1) investigate and implement standard exception reports and statistics to facilitate the access log review process; (2) develop guidance to assist EPA personnel in using log information to monitor access and respond to security incidents; and (3) provide formal training to system and security staff via an ISO conference. 34 Report No. 2000-P-I6 ------- APPENDIX I Response to Draft Report Region VIII UNITED STATES ENVIRONMENTAL PROTECTION AGENCY REGION 8 999 18™ STREET - SUITE 500 DENVER, CO 80202-2468 http://www.vpa.gov/roglon08 REF: 8TMS-ISP MAR 2 4 2000 MEMORANDUM SUBJECT: Security of Region VTII's Dial-up Access Audit No. 0000165 FROM: /^TOtricia D. Hull, Assistant Regional Administrator |V Office of Technical and Management Services TO: Patricia H. Hill, Director ADP Audits and Assistance Staff (2421) This is to respond to your audit titled "Security of Region VIII's Dial-up Access," Audit No. 0000165 dated February 23, 2000. I want to assure you that both I and our Region 8 Information Systems Program staff acknowledge the importance of the findings in this audit, especially in light of recent concerns regarding EPA's Internet and data security raised by the Government Accounting Office and members of Congress. To manage some of the vulnerabilities identified in your audit, we in Region 8 have created and attached for your review a "Region 8 Remote Access Audit Mitigation Plan and Schedule" and have already completed a number of actions to correct practices and policies where we can. Please review this plan, and let us know any concerns you may have. 35 Report No. 2000-P-16 ------- I do want to emphasize that many of the policies and procedures which you have judged inadequate to achieve secure remote access constitute agency-wide issues, with the primary responsibility for correction belonging to the Office of Environmental Information (OEI) and to the National Systems Technology Division (NTSD), the offices responsible for designing and implementing remote access agency-wide. In our work plan we have identified areas where we believe action and progress are dependent upon action for OEI and NTSD. On behalf of myself and our Region 8 Information Systems team, I do wish to thank you and your staff for the cooperative manner in which this audit was conducted by Mr. Ed Shields and Mr. Chuck Dade. We look forward to a similar collaborative approach with you and with OEI and NTSD in managing the actions needed to achieve fully secure remote access to agency information systems and data. If you have questions, you may contact Paul Riederer, Director of Information Systems at (303) 312-6635 or e-mail riederer.paul@.epa.gov. or Carl Worster, Information Security Officer at (303) 312-6865 or e-mail worster.carl@epa.gov. Attachment cc: Ed Shields Chuck Dade Mark Day Rick Martin 36 Report No. 2000-P-16 ------- REGION 8 REMOTE ACCESS AUDIT Mitigation Plan and Schedule Item No. 1 2 3 4 5 6 Recommended Mitigation Action Implement advanced authentication techniques such as one-time passwords or dial- back technology Organizational Units with Intruder Detection Not Turned On Organizational Units with Incorrect Login Attempts set greater than 3 Organizational Units with Intruder Attempt Reset Interval set too low (less than 24 hours) Organizational Units Not set to Lock Account after Detection The Intruder Lockout Reset Interval not set to maximum number of days (999 days). Projected Completio n Date 7-30-01 Actual Completio n Date 8-30-99 8-30-99 8-30-99 8-30-99 8-30-99 Comments Or Action Taken To Mitigate The Vulnerability Dial-in is now exclusively controlled by NTSD at the EPA router. Future dial-in is dependent upon an agency-wide implemented solution. Region 8 will not re- implement dial-in until an approved solution is in place. Corrected 8-30-99-and reverified 2-26-00 Corrected 8-30-99 and reverified 2-26-00 Corrected 8-30-99 and reverified 2-26-00 Corrected 8-30-99 and reverified 2-26-00 Corrected 8-30-99 and reverified 2-26-00 37 Report No. 2000-P-16 ------- 7 8 9 10 11 12 Accounts that Don't Require a Password Accounts that Don't Require a Unique Password Accounts that Don't Require Periodic Changes to the Password Maximum Concurrent Connections not Limited to One. Minimum Password Length was not set at 6 for all non- privileged accounts and at 8 for all privileged accounts The Region stated they are only using Time and Day Restrictions for performing backups. The Region indicated that time and day restrictions are set at liberal levels to provide an optimum level of customer responsiveness. 9- 1-00 at the latest 8-30-99 8-30-99 8-30-99 2-26-00 8-30-99 Corrected 8-30-99 and reverified 2-26-00. Monitoring is performed three times per week (minimum) by ISO using an automated report program. Corrected 8-30-99 and reverified 2-26-00 Corrected 8-30-99 and reverified 2-26-00 Corrected 8-30-99 and reverified 2-26-00. Monitoring is performed three times per week (minimum) by ISO using an — automated report program. Corrected 8-30-99 and reverified 2-26-00 These controls will be implemented as soon as hours of operation are approved by management and users are notified of the change. This control will be installed in the new desk-top images that are being created for the Ethernet conversion project. 38 Report No. 2000-P-I6 ------- 13 14 15 16 17 18 The NTSD security server, used for dial-up access through the main numbers, is currently set to lock out an account on the fifth consecutive incorrect login attempt instead of three. NTSD response req 'd Implement policies and procedures to control the issuance, termination, and oversight of the access cards to the computer room based on documented frequency and need. Implement policies and procedures for adequately supervising and documenting visitors to the computer room. Region VIII has far too many employees and contractors with Card Key access to the computer room. LAN administrators and select critical staff should have 24 hour access to the computer room. Others only during scheduled duty hours. Security cameras do not monitor access to the computer room. 4-15-00 4-15-00 4-15-00 4-15-00 5-30-00 8-30-99 Region 8 action is completed. Requires action from NTSD. All accounts have been locked. The Region 8 Novell NOS is set to lock after 3 invalid login attempts for all users. Two additional cameras are expected to be installed by 5- 30-00. Wiring is completed. 39 Report No. 2000-P-16 ------- 19 20 21 22 24 Operations management needs to make security a higher priority and apply an appropriate portion of available resources to properly secure, as well as maintain, dial-up access controls. Management needs to place a higher priority on information security by providing appropriate funding and additional qualified staff necessary to implement and maintain adequate security. Region VIII lacks the management oversight necessary to ensure that adequate security over their systems is implemented and maintained. Management needs to be involved in establishing and implementing policies and procedures. Region VIII did not have a quality control function to ensure the controls were actually implemented and working as intended. 6-30-00 9-30-00 12-31-00 3-31-01 12-30-00 6-30-00 9-30-00 12-31-00 3-31-01 6-30-00 8-30-99 LAN manager, LAN SA's, ISO and IRM chief will work on security. Will develop SOP's, training and implement. Will assess progress quarterly. R8 already has a full- time ISO. Additional staff are dependent upon budget and Senior Leadership Team authorization. NTSD leadership is needed for ISO PD, training and guidance. Management oversight was increased following the first exit interview by the IG audit team. IRM chief has scheduled formal reviews each quarter with ISO and LAN manager. Audit reports are being written so ISO can monitor compliance with standards; formal review scheduled for 6-30-00. 40 Report No. 2000-P-I6 ------- 25 26 27 28 Region VIII lacks acceptable formalized policies and procedures which (1) communicate to applicable personnel the control requirements and (2) specify how controls are to be implemented to ensure proper security. Provide initial and periodic training for all dial-up users to ensure they understand the policies and procedures related to the protection of sensitive information. Implement and require use of an advanced authentication technique like dial back or smart cards, console logging and end-to-end encryption whenever "remote console" is used. Provide and require use of end- to-end encryption for dial up access when performing sensitive work or when using a privileged account. 6-30-00 9-30-00 12-31-00 3-31-01 8-30-00 9-30-01 9-30-01 ISO and LAN manager are assigned these tasks. Formal reviews are scheduled for each quarter. Region 8 has done this and will do again as we roll out "Desktop 2000" with new, more secure remote access procedures. Dial in is now controlled at the NTSD router. Dial in is dependent upon a selection and implementation by NTSD. Remote console will not be used until this is implemented. Encrypted passwords and screen savers with passwords have been installed on all Novell and NT servers. Is dependent upon selection and guidance from NTSD. Users are instructed to not store or send confidential data over the network. Staff with a privileged account will not dial in unless end-to-end encryption is used. 41 Report No. 2000-P-I6 ------- 29 Enable console logging to log actions performed when using privileged accounts. 8-30-00 When new servers with adequate disk space are installed. Parameter settings and testing needs to be performed. 30 Implement "remote console" password controls including 8 character alphanumeric, unique, encrypted passwords, periodic changes and different passwords for each server. Passwords meeting standards were implemente d 1-30-00 or before. Verified and passwords changed again 2-26-00. Passwords were set to 10 digits alphanumeric for the three primary LAN administrators. Remote console is not and will not be used until encrypted sessions and advanced authtentication is implemented. 31 Read and browse access to the Autoexec.ncf file needs to be limited to a very few privileged users. 1-30-00 Partially completed. Autoexec.ncf is encrypted and hidden. Filters have been installed on all Novell servers with only the three primary LAN administrators having access. 32 Establish and implement formal policies and procedures to ensure that agency LAN NOS standard settings are maintained 5-30-00 Audit reports are being written and used so ISO can monitor compliance with standards. Monitoring has begun. 33 Establish and implement formal policies and procedures that require periodic reviews to ensure that the policies and procedures are practiced and effective. 6-30-00 9-30-00 12-31-00 3-31-01 IRM chief has scheduled quarterly, formal reviews for one year of follow-up action. 42 Report No. 2000-P-16 ------- 34 35 36 Install and use ESM software to assist in the oversight function. Review computer room key card access approvals at least every six months. Whenever no longer needed, access should be removed. Non-EPA employees and staff with limited key card access should have access to the computer room limited to hours when the computer room is staffed. 7-30-00 5-30-00 5-30-00 A major resource issue! NTSD cost estimate is $1,000,000. Regions do not have the funding nor does WCF fund this. Dependent upon NTSD obtaining licenses and testing to confirm that earlier problems with the software have been fixed. ISO will review monthly. Are getting a unique code assigned to the computer room. Are exploring separating operations from network operations with a new wall and separate access doors and locks. R8 is negotiating for day-time cleaning and other measures to meet this goal. 43 Report No. 2000-P-I6 ------- 37 An access card should be kept in a sealed envelope that has been signed by the ISO by building security and should be signed in and out by guards, building engineers and building owners on an as needed basis. The ISO should be contacted by building security each time an access card is checked out to check the log and reseal and sign the access card. 5-30-00 38 Develop policies and procedures for supervision and documentation of visitors to the computer room. All computer card access requests should be approved by management and a copy provided to the ISO to facilitate validation of the computer room access list on a regular basis. 4-15-00 39 All personnel without an access card must be considered a visitor and must sign in and out and document their purpose for the visit. They must be escorted by a person with an access card. 4-15-00 40 Cleaning personnel, building engineers and contractors should always be treated as a visitor. 4-15-00 41 Establish formal policies and procedures that require all dial- up accesses to be logged and monitored for security incidents. 4-30-00 ISO will contact NTSD to learn how to obtain remote access log reports for Region 8 and will incorporate these procedures into a formal policy. 44 Report No. 2000-P-16 ------- 42 43 44 45 46 Review dial-up logs on a daily basis to detect security incidents through the use of exception reports, statistics, etc. Develop formal policies and procedures that detail the specific responses to be taken when a security incident is identified. Revise formal policies and procedures related to the use and control of modems. Ensure that modems are identified and adequately secured. Develop formal dial-up policies and procedures that ensure term i nated/separated employees' access rights are removed on the effective date or prior to the notification date of the action depending on whether it is a friendly or unfriendly termination. Establish and implement policies and procedures that require periodic review and verification (at least every 6 months) to ensure that the logical and physical access rights to the computer facilities are still required to perform their jobs. 4-15-00 4-30-00 4-30-00 4-15-00 4-30-00 ISO will contact NTSD to learn how to obtain remote access log reports for Region 8 and will begin reviewing daily logs. — 45 Report No. 2000-P-16 ------- 47 48 49 Establish and implement formal dial-up policies and procedures that require all users requesting remote access to go through a formal approval process prior to being provided with remote access to the Network. Establish a separate Netware user group within the operating system that provides dial-up access rights to the network. Only add a user to this group once the user is formally approved to access the network via dial-up. For employees who are known in advance to be leaving, incorporate the use of user account expiration dates to preset the NOS system to disable the account as of the specific applicable date and use security monitoring software (such as ESM) on a regular basis (i.e., every 30 days) to ensure that the access and account are actually removed. 5-30-00 4-15-00 Revised process implemente donor about 3-6- 00 NTSD is exclusively and centrally controlling the access list of all dial-up users. This equivalent control is already implemented through the NTSD TACAS router software. NTSD is also currently using a formal approval and authentication process through TSSMS for remote users. 46 Report No. 2000-P-I6 ------- APPENDIX II Response to Draft Report NTSD ? ft \ UNFTED STATES ENVIRONMENTAL PROTECTION AGENCY RESEARCH TRIANGLE PARK, NC 27711 MAR 2 7 2000 OFFICE OF ENVIRONMCKTAL INFORMATION MEMORANDUM SUBJECT: Security of Region Vm Dial-Up Access Audit No OUOO165 FROM: TO: >irerto^/^xA—-«f Richard A Martin, Directo National Technical Services Division (MD-34) Patricia H. Hill,. Director ADP Audits and Assistance Staff (2421) Thank you for the opportunity to respond to your draft of audit 0000165 published on January 12, 2000. I agree with the findings of fact and conceptually agree with the recommendations presented in that portion of the audit to the Office of Technology Operations and Planning (OTOP). Specific responses to each finding and recommendation addressed to the National Technology Services Division (NTSD) are listed on the attachment. Again, I appreciate the useful recommendations on this subject and look forward to your continuing input on these issues as we implement enhanced security controls. If you have any questions on this response, do not hesitate to contact me. Attachment 47 Report No. 2000-P-I6 ------- Response to Findings and Recommendations: Audit No. 0000165 No Logging or Monitoring of Dial-Up Access and Control of Modem Usage Agree. Regular and timely log reviews by local and national CISCO remote access managers will be implemented to improve the Agency's information security posture. The National Computer Center does collect data on attempts to access the CISCO remote access servers and formats them into a database for analysis. The logs are reviewed by both national and local CISCO remote access server managers on a frequent basis but the specific requirements will be delineated in a memorandum to be issued within 30 days. NTSD Plans Impact of Adequacy of Security Agree. As you are undoubtedly aware, recent actions taken by the Office of Environmental Information (OEI) in response to the General Accounting Office (GAO) audit have changed the overall information security posture of the Agency to a considerable degree. On February 18, 2000 the Agency's Internet connection to the Wide Area Network at RTF was disconnected and Programs were instructed to disconnect their external network connections such as remote access servers, modems, and Cubix boxes. The OEI then began a comprehensive security review to rectify vulnerabilities present in our IT infrastructure. As-we gain a clear understanding of the business requirements and potential security exposure of each network service, that service is restored with appropriate security improvements or discontinued. To date, we have restored a large portion of the Internet-based public access services and have limited restoration of Internet and dial-up remote access. Across the Agency, security controls are being substantially upgraded for all systems using external connectivity. The long-term solution to remote dial-up access has a number of technical, risk and cost issues which we will address in our security planning effort. For example, we must examine the relative risk of allowing remote access services through our primary firewall as this may require the enabling of services which cannot be statefully inspected. Routing of all remote access through this single point may also greatly increase long distance costs and network capacity requirements and costs. Routing the traffic to local sites with enhanced authentication, access restrictions, and intrusion detection at each site may prove more cost-effective and allow greater network segmentation to limit the scope of any penetrations. These are technical, cost, and risk issues which we will balance as we proceed. In the meantime, we are implementing additional protections for dial-in services. For example, we restored Notes email services after implementing greater access list verification, assuring that two factors are present for authentication, restricting the scope of routing of the remote access servers and implementing the CERT router filters in each server. All of these provide reasonable compensating controls in the short term. Additionally, locations will not be authorized for remote access restoration until after the access control lists have been quality assured. 48 Report No. 2000-P-16 ------- Management Needs to Make Security A Top Priority Agree. I hope that I have conveyed OTOP's serious commitment to all aspects of security management in our increasingly complex environment. Recommendations 2-8 Implement formal policies and procedures for communications servers which lock out an account after 3 consecutive incorrect login attempts. Agree. This policy is in effect for central systems and I conceptually agree it should be mandated for remote communications servers. However, additional analysis is required before the policy is fully implemented. Remote access login requires multiple levels of authentications (router, NDS, etc.) and revoking access after 3 failed attempts may be impossible. NTSD will investigate the issue and will reduce the number of allowed access attempts to an absolute minimum. A follow up memorandum detailing our actions will be provided by June 1, 2000. 5-1 Establish and implement formal policies and procedures that ensure that all dial-up connections are routed the Firewall(s) once the firewall is completed. Agree. As with the preceding recommendation, careful technical analysis will be -- required to determine how this recommendation can be best implemented. The choice of protocols and encryption techniques have profound effects on how well the firewall controls access. The final answer on the implementation of this recommendation must wait until the Agency firewall(s) and remote access methods are fully configured. A follow up memorandum detailing our actions will be provided by June 1, 2000. 5-2 Develop standard exception reports and statistics that would assist system administrators and ISOs in monitoring dial-up access to their systems for security incidents. Agree. Reports of this nature already exist and NTSD will investigate and implement improvements to facilitate the access log review process. 5-3 Develop and implement formal guidance and training for system administrator and ISOs to instruct them in the use of logged information currently available (as well as any additional logs/statistics/reports) used to monitor their systems for security incidents. The training and guidance should also educate them on how to respond to security incidents. Agree. NTSD believes that the suggested training materials already exist in various documents. Consolidation of these materials into guidance will be completed by April 15, 2000. Formal training will be offered as part of the proposed ISO conference targeted for later this fiscal year. 49 Report No. 2000-P-I6 ------- THIS PAGE INTENTIONALLY LEFT BLANK 50 Report No. 2000-P-16 ------- APPENDIX III REPORT DISTRIBUTION Office of Inspector General Inspector General (2410) Assistant Inspector General for Audit (2421) Deputy Assistant Inspector General for Internal Audits (2421) Deputy Inspector General for Audit - Southern Audit Division Deputy Inspector General for Audit - Central Audit Division Audit Manager, RTF, NC Audits Branch (MD-53) Audit Manager, Denver, Colorado Audit Branch (8OIG) EPA Headquarters Chief Information Officer (3101) Agency Audit Followup Official (2710) Agency Followup Coordinator (2724) Director, National Technology and Services Branch (MD-34) Director, IT Policy and Planning Division (2831) Chief, IT Policy and Planning Division (2831) OEI Audit Liaison (2811R) Region VIII Assistant Regional Administrator, Office of Technical and Management Services, (8TMS-D) Director, Data Systems Management Branch (8TMS-D) Region VIII Audit Liaison (8TMS-G) 51 Report No. 2000-P-16 ------- |