U.S. Environmental Protection Agency
Office of Inspector General
At a Glance
09-P-0186
June 30, 2009
Catalyst for Improving the Environment
Why We Did This Review
The Office of Inspector
General contracted with
Williams, Adley & Company,
LLP, to conduct the annual
audit of the U.S.
Environmental Protection
Agency's (EPA's) compliance
with the Federal Information
Security Management Act
(FISMA). Williams, Adley &
Company, LLP, conducted the
network vulnerability testing
of the Agency's network
devices located at EPA's
National Computer Center in
Research Triangle Park, North
Carolina.
Background
The network vulnerability
testing was conducted to
identify any network risk
vulnerabilities and present the
results to the appropriate
EPA officials to promptly
remediate or document
planned actions to resolve the
vulnerability.
For further information,
contact our Office of
Congressional, Public Affairs
and Management at
(202)566-2391.
Results of Technical Network Vulnerability
Assessment: EPA's National Computer Center
What Williams, Adley & Company, LLP, Found
Vulnerability testing conducted in April 2009 of EPA's National Computer Center
network devices indicated several high-risk vulnerabilities. Additionally, based
on the results from Region 8 network scans conducted in April 2009, Region 8
officials indicated that the National Computer Center manages several of those
network devices with high-risk vulnerabilities. If not resolved, these
vulnerabilities could expose EPA's assets to unauthorized access and potential
harm to the Agency's network.
What Williams, Adley & Company, LLP, Recommends
Williams, Adley & Company, LLP, recommends that the Director of the National
Computer Center:
• Implement actions to resolve all high-risk vulnerability findings.
• Update EPA's Automated Security Self Evaluation and Remediation
Tracking (ASSERT) system.
• Perform a technical vulnerability assessment test of the National Computer
Center devices and Region 8's network within 30 days to demonstrate and
document corrective actions that have resolved the vulnerabilities.
Due to the sensitive nature of the report's technical findings, the full report is not
available to the public.
------- |