U.S. ENVIRONMENTAL PROTECTION AGENCY
        OFFICE OF INSPECTOR GENERAL
                            Catalyst for Improving the Environment
Evaluation Report
       Evaluation of U.S. Chemical Safety
       and Hazard Investigation Board's
       Compliance with the Federal Information
       Security Management Act and Efforts to
       Protect Sensitive Agency Information
       (Fiscal Year 2008)

       Report No. 08-P-0295
       September 29, 2008

-------
                   U.S. Environmental Protection Agency
                   Office of Inspector General

                   At   a   Glance
                                                             08-P-0295
                                                     September 29, 2008
                                                                 Catalyst for Improving the Environment
Why We Did This Review

The review was performed to
assess the U.S. Chemical Safety
and Hazard Investigation
Board's (CSB's) information
security program compliance
with the Federal Information
Security Management Act of
2002 (FISMA). Where
appropriate, we also sought to
make recommendations to
ensure a security framework  is in
place that is capable of meeting
security requirements into the
future.
Background

CSB contracted with Total
Systems Technologies
Corporation (TSTC) to assist in
performing the Fiscal Year 2008
FISMA assessment under the
direction of the U.S. Environ-
mental Protection Agency (EPA)
Office of the Inspector General
(OIG). The review adhered to
the Office of Management and
Budget (OMB) reporting
guidance for micro-agencies,
which CSB is considered, and
included an assessment of CSB
progress in protecting its
sensitive information, including
Personally Identifiable
Information.

For further information, contact
our Office of Congressional and
Public Liaison at (202) 566-2391.

To view the full report,
click on the following link:
www.epa.qov/oiq/reports/2008/
20080929-08-P-0295.pdf
Evaluation of U.S. Chemical Safety and Hazard Investigation Board's
Compliance with the Federal Information Security Management Act
and Efforts to Protect Sensitive Agency Information (Fiscal Year 2008)
 What TSTC Found
During Fiscal Year 2008, CSB continued to make significant progress in
improving the security of its information system resources. CSB had done this by
performing the following:

    •   Expanding the security training to include specialized, role-based training;
    •   Implementing incident response training and testing and issuing a Breach
       Policy; and
    •   Benchmarking and utilizing government and industry best practices and
       templates in updating the CSB Certification and Accreditation
       documentation, including the System Security Plan, the Risk Assessment,
       and the security test controls.

CSB has also taken the steps necessary to allow CSB management to align the
organization's security program with the Personally Identifiable Information
requirements issued by the OMB. CSB also took the necessary steps to complete
six of the seven planned actions in response to the security weaknesses identified
during the Fiscal Year 2007 audit. The  remaining weakness regarding
non-standard security configurations from the Fiscal Year 2007 audit is on
schedule to meet the target completion date of October 10, 2008.
 What TSTC Recommends
TSTC did find areas where CSB could continue to improve its information
security program. Specifically, TSTC recommends that CSB:

  •   Insert the approved security "banner" within all CSB database applications.
  •   Continue to update the CSB Configuration Management policy and
      associated procedures to address reviewing, approving, and documenting
      non-standard security configurations to meet the deadline established by
      CSB.
  •   Continue to update, as applicable, the appropriate security documentation
      to ensure compliance with National Institute of Standards and Technology
      Special Publication 800-53 controls guidance and update the security
      documents to include revision history information such as date of revision,
      individual who updated the document, and description of the revision.

-------
                   UNITED STATES ENVIRONMENTAL PROTECTION AGENCY
                                 WASHINGTON, D.C. 20460
                                                                          OFFICE OF
                                                                      INSPECTOR GENERAL
                                  September 29, 2008
SUBJECT:
FROM:
TO:
Evaluation of U.S. Chemical Safety and Hazard Investigation Board's
Compliance with the Federal Information Security Management Act and
Efforts to Protect Sensitive Agency Information (Fiscal Year 2008)
Report No. 08-P-0295
Rudolph M. Brevard
Director, Information Resources Management Assessment

The Honorable John S. Bresland
Chairperson
U.S. Chemical Safety and Hazard Investigation Board
This final report on the above subject area synopsizes the results of information technology
security work performed by Total Systems Technologies Corporation (TSTC) under the direction
of the U.S. Environmental Protection Agency's Office of Inspector General (OIG). The report
also includes TSTC's completed Fiscal Year 2007 Federal Information Security Management
Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

The estimated cost for the OIG performing contract management oversight is $6,224. This cost
does not include the contracting service cost, which was funded by the U.S. Chemical Safety
and Hazard Investigation Board.

In accordance with OMB reporting instructions, the OIG is forwarding this report to you for
submission, along with your Agency's required information, to the Director of OMB.

If you or your staff have any questions regarding this report, please contact me at (202) 566-0893
or brevard.rudy@epa.gov.

-------
 frsTC
Evaluation Report
Evaluation of U.S. Chemical Safety and Hazard
Investigation Board's Compliance with the Federal
Information Security Management Act and Efforts to
Protect Sensitive Agency Information


(Fiscal Year 2008)
September 29, 2008

-------
                        REPORT CONTRIBUTORS
Thomas Gangi, TSTC, Project Manager
Mark Podracky, TSTC, Subject Matter Expert (Alternate Project Manager)

-------
                              ABBREVIATIONS
ATO
AITSO
C&A
CIO
CSB
EPA
FedCIRC
FIPS
FISMA
FY
GSS
ISSM
IT
ITSO
LAN
MIS
NIST
OIG
OMB
Pll
POA&M
RA
SP
SSL
SSP
US-CERT
VPN
Authority to Operate
Assistant Information Technology Security Officer
Certification and Accreditation
Chief Information Officer
United States Chemical Safety and Hazard Investigation Board
Environmental Protection Agency
Federal Computer Incident Response Center
Federal Information Processing Standard
Federal Information Security Management Act
Fiscal Year
General Support System
Information Systems Security Manager
Information Technology
Information technology Security Officer
Local Area Network
Management Information System
National Institute of Standards  and Technology
Office of Inspector General
Office of Management and Budget
Personally Identifiable Information
Plan of Action and Milestones
Risk Assessment
Special Publication
Secure Socket Layer
System Security Plan
United States Computer Emergency Readiness Team
Virtual Private Network

-------
                                                          September 29, 2008
The U.S. Environmental Protection Agency
Office of the Inspector General
1200 Pennsylvania Avenue, NW
Washington, DC 20460
Subject:  Evaluation of U.S. Chemical Safety and Hazard Investigation Board's
         (CSB) Compliance with the Federal Information Security Management
         Act (FISMA) 2002 for Fiscal Year 2008 Evaluation Report
Ms. Hill:

Attached is the Total Systems Technologies Corporation (TSTC) report on the above
subject area. This report synopsizes the results of the information technology security
evaluation work performed by TSTC on behalf of the U.S. Environmental Protection
Agency's Office of the Inspector General (OIG).  The report includes the TSTC
completed Fiscal Year 2008 FISMA Reporting Template, as prescribed by the Office of
Management and Budget  (OMB), the completed CSB microagency template and the
CSB response to the findings depicted within this report.

If you or your staff have any questions or feedback regarding this report, please contact
me at (703)  802-4970, tgangi@totalsystech.com or Mark Podracky at (703) 802-4970,
mpodracky@totalsystech.com.
Sincerely,
Thomas Gangi, TSTC
Project Manager and Senior Auditor

-------
                      Table of Contents
Chapters
Chapter 1 - Executive Summary	1
    Background	1
    Summary of Results	1

Chapter 2 - Evaluation Results	5
    Assessment Area 1 - FISMA Systems Inventory	5
    Assessment Area 2 - C&A, Security Controls Testing, and Contingency Plan Testing	5
    Assessment Area 3 - Oversight of Contractor Systems and Quality of Agency System
    Inventory	6
    Assessment Area 4- Evaluation of Plan of Action and Milestones (POA&M) Process	7
    Assessment Area 5 - Assessment of Certification and Accreditation Process	8
    Assessment Area 6 - Assessment of Privacy Impact Assessment (PIA) Process	10
    Assessment Area 7- Progress of Agency Privacy Program	11
    Assessment Area 8 - Configuration Management	11
    Assessment Area 9- Incident Reporting	12
    Assessment Area 10- Security Awareness Training	12
    Assessment Area 11 - Collaborative Web Technologies and Peer-to-Peer File Sharing .. 13
    Assessment Area 12 - E-authentication Risk Assessments	13

Appendix A - Micro Agency Reporting Template	14

Appendix B - CSB's Response to Draft Report	16

-------
Chapter 1  - Executive Summary
Background

Total Systems Technologies Corporation (TSTC) was tasked to conduct an assessment of the
U.S. Chemical Safety and Hazard Investigation Board's (CSB's) Federal Information Security
Management Act (FISMA) compliance and their progress in meeting the requirements to manage
privacy information as described in the OMB Memorandum M-08-21 -FY 2008 Reporting
Instructions for the Federal Information Security Management Act and Agency Privacy
Management. In performing this evaluation, TSTC reviewed documentation related to prior CSB
audits/assessments, security evaluations, security program reviews, reports addressing CSB's
information security and privacy program and practices; and conducted an internal and external
vulnerability  scan of the CSB network. TSTC also reviewed documentation supporting security
training and documentation relevant to CSB information security policies and procedures. The
analysis also  involved interview sessions with CSB IT security staff.

Summary of Results

Overall, it is the conclusion of TSTC that the CSB Security Program has a rating of GOOD. The
CSB continues to improve their security posture and has made significant progress in addressing
the majority of the FY 2007 findings. The following table (Table 1) indicates the status of the FY
2007 findings and recommendations.

	Table 1: Status of FY 2007 Findings	
     FY 2007 Finding
Status
Notes
 FY07-OIG-IT-01
 Security Awareness and
 Training

 Issue Summary: CSB should
 expand the security training to
 include specialized, role-based
 training in areas specific to:
 security roles / administration;
 incident response; and
 contingency planning and
 implementation. They should
 also document the specialized
 training in a manner similar to
 that used for the annual user
 training.
                            Closed
        We conducted a review of the CSB security awareness training
        materials, rosters and training acknowledgment forms. We also
        interviewed CSB IT security staff to gain an understanding of the
        training environment. The CSB IT staff has developed and
        implemented specialized IT training. A review of the materials
        indicates that those performing security roles understand, and have
        been trained in, their roles. CSB is also maintaining signed "Roles"
        acknowledgement forms for those (ITSO and AITSO) performing
        these security duties.

-------
     FY 2007 Finding
Status
                           Notes
FY07-OIG-IT-02
Policy and Procedures

Issue Summary: CSB should
conduct annual testing, at a
minimum, to verify the Incident
Response Procedures. A
documented "Table Top" test,
using a privacy data (PII) breach
scenario, would address security
incidence response as well as of
PII incidents as mandated by
OMB.
                                Closed
         We conducted a review of the CSB incident response policy
         document and interviewed CSB security staff.  During the fiscal
         year (05/14/2008), CSB tested the incident response procedures by
         testing two scenarios: 1. A data "breach" scenario, and, 2. a lost
         laptop scenario. The testing plan and results were documented and
         led by the ITSO and AITSO.  The documentation was sufficient.
FY07-OIG-IT-03
Personally Identifiable
Information

Issue Summary: CSB should
document the Breach Policy
requirements and finalize a
policy that meets CSB needs
and OMB requirements. Also,
on an annual basis, CSB should
test the policies and procedures
for effectiveness.
Closed
We conducted a review of the CSB breach policy and procedures
documentation and interviewed CSB security staff. The CSB has
finalized the policy and tested the procedures (05/14/2008) during
their incident response testing indicated in FY07-OIG-IT-02 above.
The procedures, as currently in place, are effective.
FY07-OIG-IT-04
Configuration Management

Issue Summary: CSB should
update the security policy and
associated procedures to address
reviewing, approving and
documenting non-standard
security configurations.
 Open
This finding is still open. According to the CSB response to this
FY2007 finding, the target completion date is 09/30/2008. As of
the compilation of this report, the deadline date is still in the future.
During the interview with the CSB IT security staff, it was
indicated that this effort is in progress. As a result of the timing of
this report and the current ongoing work, the finding will be
reported as open.

-------
      FY 2007 Finding
Status
Notes
 FY07-OIG-IT-05
 Security Program Management

 Issue Summary: On an annual
 and/or semi-annual basis, CSB
 should coordinate with OMB to
 gain consensus on the CSB
 FISMA reporting requirements.
 CSB should also draft - and
 place on file - a signed
 acknowledgment letter depicting
 the roles and responsibilities of
 the CSB ITSO.
                                Closed
         We conducted a review of the CSB communications (emails)
         disseminated to OMB and interviewed CSB security staff. The
         CSB security staff has attempted numerous and methodical
         communications with OMB seeking guidance and clarity regarding
         specific FISMA reporting requirements.  We also reviewed the on-
         file acknowledgment letter depicting the roles and responsibilities
         of the CSB ITSO. The acknowledgement letter is concise and
         clearly indicates the roles/responsibilities of the CSB ITSO and
         AITSO.
 FY07-OIG-IT-06
 C&A Process

 Issue Summary: CSB should
 follow a documented standard
 for accessing various FIPS 199
 elements to avoid any
 inconsistencies. Also, leveraging
 samples/templates from other
 Agencies, CSB should update
 the System Security Plan; the
 Risk Assessment; and, the
 Security Test Procedures/
 Results.
                                Closed
         We conducted a comprehensive review of the CSB C&A process.
         This review included analysis of the CSB GSS FIPS 199, System
         Security Plan; the Risk Assessment; and, the Security Test
         Procedures/ Results documentation. The analysis also involved
         interviews with the CSB security staff.  The CSB security staff is
         actively leveraging available templates  and their documentation is
         consistent with current NIST guidance.
 FY07-OIG-IT-07
 Security Control Procedures

 Issue Summary: The CSB
 security staff should update the
 test controls artifact by marking
 the "tested" column for the
 controls that were tested and
 provide details of the test and its
 results in the "description /
 remarks" field.
                                Closed
         We conducted a comprehensive review of the CSB test controls
         documentation. The document is consistent with NIST guidance
         and test results (and status) are properly indicated within the
         documentation.
Although CSB continues to realize improvements in all facets of their information security
program, our FY2008 evaluation identified several areas that will require continued IT security
management focus. The following table (Table 2) summarizes the findings identified during the
review. Note that all of these findings are considered low risk.

-------
                                      Table 2 - FY 2008 Findings
FY 2008 Finding   Status
                      Remarks
                                              Recommendations
FY08-OIG-IT-01
Security Controls
Testing
Open
NIST guidance recommends testing - at
a minimum - one third of the system
controls each FY. This is to ensure that
over the course of a three-year cycle -
all security controls are tested and
updated.
CSB should continue to update, as
applicable, the appropriate security
documentation to ensure compliance with
National Institute of Standards and
Technology (NIST) Special Publication
(SP) 800-53 controls guidance.

Develop a plan to ensure that the CSB IT
security staff is testing approximately one-
third of unique security controls per year
and an Agency-defined set of key controls
every year.
                                                                     Any vulnerabilities identified as a result of
                                                                     this testing should be tracked in the CSB
                                                                     POA&M.
FY08-OIG-IT-02
C&A Process
Open
The C&A documents (SSP, FIPS 199,
PxA, CP, Test documents, etc.) do not
currently include revision dates and
history of changes.
CSB should update the current C&A
documentation to include revision history
information such as date of revision,
individual that updated the document, and
description of the revision. This should be a
standard practice going forward to ensure
the latest version(s) of documents is in
place.
FY08-OIG-IT-03
Privacy Impact and
Management
Open
While users accessing the CSB GSS are
presented with a banner indicating the
system is a government system and
therefore protected, the individual
database application systems located
within the  GSS do not display the
banner.
CSB IT staff should insert the approved
banner so that it is presented to all users
accessing individual databases within CSB.
This is especially important for the
"Investigations" system, because that
system has the potential to contain
Personally Identifiable Information (PII).
FY08-OIG-IT-04
Configuration
Management
Open
This finding was initially documented
during the FY07 audit. The
Configuration Management Plan does
not contain sufficient detail to indicate
non-standard security  configurations.
CSB should continue to focus on and
update the security policy and associated
procedures to address reviewing, approving
and documenting non-standard security
configurations to meet the CSB designated
target completion date of 09/30/2008.

-------
Chapter 2 - Evaluation  Results

Assessment Area 1 - FISMA Systems Inventory

Evaluate a representative subset of systems used or operated by an agency or by a contractor
of an agency or other organization on behalf of an agency. By component/bureau and FIPS
199 system impact level (high, moderate, low, or not categorized), identify the number of
agency and contractor systems, and the number of systems reviewed. Extend the worksheet
onto subsequent pages if necessary to include all components/bureaus.

The Chemical Safety Board (CSB) inventory still consists of a single general support system
(GSS). This GSS is essentially composed of their MIS LAN, web site and local
telecommunications infrastructure. A review of the FIPS 199 categorization for the GSS showed
that the inconsistencies identified in last year's (FY 2007) assessment have been corrected and
the IT security staff has correctly categorized the system as Moderate. The IT inventory is
currently maintained and up-to-date. The CSB utilizes a Microsoft Access™ database (the
"Inventory Management System") for storing and managing IT inventory information.  The
system also allows CSB IT security staff to track ownership of IT assets down to the user level
and obsolete inventory is also tracked within the system. The system also allows the CSB IT
staff to produce a number of reports - this functionality was observed during the interview
portion of this assessment. Information within the FIPS 199 is also consistent with the
information indicated within the CSB GSS  System Security Plan (SSP).

Assessment Area 2 - C&A, Security Controls Testing, and
Contingency Plan Testing

Identify the number and percentage of systems which have: a current certification and
accreditation, security controls tested and reviewed within  the past year, and a contingency
plan tested in accordance with policy.
Security Category
Number and percentage of systems certified and accredited
Number and percentage of systems where security controls are tested
Number and percentage of systems with tested contingency plans in accordance with
policy
Total
Number
1
1
1
Total
Percent
100%
100%
100%
A comprehensive review of the CSB SSP and security controls and test results indicates that
CSB is proactively managing the CSB IT infrastructure. Currently, CSB maintains only one
system requiring a C&A - the CSB General Support System (GSS). The test controls indicated
within the security controls self-assessment that map to the CSB GSS are consistent with those
indicated within the CSB SSP.  In addition, CSB IT security staff have revisited the test controls
status and updated them accordingly to reflect the fact that they have been tested. These actions
close a finding identified during the FY2007 assessment. Care must be taken to ensure that the
CSB IT security staff is testing approximately one-third of the security controls per year. This

-------
will allow them to meet guidance which suggests testing controls at a pace that sufficiently
ensures all controls are tested in any given 3-year period.

Recommendation

CSB should:

FY08-OIG-IT-01

Develop a plan to ensure that the CSB IT security staff is testing approximately one-third of the
required NIST SP  800-53 security controls per year (based upon a FIPS 199 categorization of
"moderate") and a set of CSB-defined key controls annually. This will allow CSB to meet
guidance which suggests testing controls at a pace that sufficiently ensures all controls are tested
in any given 3-year period.


Assessment Area 3 - Oversight of Contractor Systems and  Quality of
Agency System Inventory

The agency performs oversight and evaluation to ensure information systems used or operated
by a contractor of the agency or other organization on behalf of the agency meet the
requirements ofFISMA, OMB policy and NIST guidelines, national security policy, and
agency policy.

A review of the CSB IT system inventory and interviews with CSB IT security staff indicates
that the CSB maintains no contractor-operated systems. CSB currently tracks its IT inventory
using a Microsoft Access database developed with Microsoft SQL  code. The database is updated
as changes in inventory warrant and a review of the database indicates that the CSB IT security
staff accurately maintains the inventory.  Please reference the table below for a status of the
individual OMB criteria.
                OMB FY2008 Evaluation Metric
         Result
The agency performs oversight and evaluation to ensure information systems used
or operated by a contractor of the agency or other organization on behalf of the
agency meet the requirements ofFISMA, OMB policy and NIST guidelines,
national security policy, and agency policy.
N/A - No CSB systems are
currently owned or operated
by a contractor.
The agency has developed a complete inventory of major information systems
(including major national security systems) operated by or under the control of
such agency, including an identification of the interfaces between each such
system and all other systems or networks, including those not operated by or under
the control of the agency.:
The inventory is
approximately 96-100%
complete.  The CSB maintains
a complete list of all systems.
CSB has no national security
systems.
 Per OMB FY2008 FISMA Guidance, the metrics used in assessing this requirement include:
  - The inventory is approximately 0-50% complete
  - The inventory is approximately 51-70% complete
  - The inventory is approximately 71-80% complete

-------
OMB FY2008 Evaluation Metric
The IG generally agrees with the CIO on the number of agency -owned systems.
The IG generally agrees with the CIO on the number of information systems used
or operated by a contractor of the agency or other organization on behalf of the
agency.
The agency inventory is maintained and updated at least annually.
If the Agency IG does not evaluate the Agency's inventory as 96-100% complete,
please identify the known missing systems by Component/Bureau, the Unique
Project Identifier (UPI) associated with the system as presented in your FY2008
Exhibit 53 (if known), and indicate if the system is an agency or contractor system.
Result
Yes. The EPA OIG agrees
with the CIO concerning the
number of information
systems.
Yes. The EPA OIG agrees
that no information systems
are used or operated by
contactors.
Yes. The CSB inventory is
maintained and updated at
least annually
N/A. The CSB inventory is
96-100% complete.
Assessment Area 4 - Evaluation of Plan of Action and Milestones
(POA&M) Process

Assess whether the agency has developed, implemented, and is managing an agency-wide plan
of action and milestone (POA&M) process.

The CSB has a POA&M process in place (utilizing the Microsoft Office products Word and
Excel) and the CSB is almost always (96-100% of the time) proactively developing, managing,
and prioritizing their POA&Ms in accordance with guidelines. A review of the POA&M process
artifacts and quarterly reports, along with interviews with CSB IT security staff indicates that
control weaknesses from prior audits / reviews are routinely reviewed and reconciled. Last year's
(FY 2007) assessment indicated that CSB Management should coordinate and communicate with
OMB more closely to determine OMB FISMA reporting standards. A review of correspondence
(email) between CSB and OMB indicates that the CSB has repeatedly reached out to OMB.
Please reference the following table for a summary of the CSB POA&M process status.
  - The inventory is approximately 81-95% complete
  - The inventory is approximately 96-100% complete

-------
OMB FY2008 Criteria2
The POA&M is an agency -wide process, incorporating all known information
technology security weaknesses associated with information systems used or
operated by the agency or by a contractor of the agency or other organization on
behalf of the agency.
When an information technology security weakness is identified, program officials
(including the CIO if they own or operate a system) develop, implement, and
manage POA&Ms for their system(s).
Program officials and contractors report their progress on security weakness
remediation to the CIO on a regular basis (at least quarterly).
Agency CIO centrally tracks, maintains, and reviews POA&M activities on at least a
quarterly basis.
IG/external audit findings are incorporated into the POA&M process.
POA&M process prioritizes information technology security weaknesses to help
ensure significant information technology security weaknesses are addressed in a
timely manner and receive appropriate resources.
Result
Almost Always: 96-100%
of the time.
Almost Always: 96-100%
of the time.
Almost Always: 96-100%
of the time.
Almost Always: 96-100%
of the time.
Almost Always: 96-100%
of the time.
Almost Always: 96-100%
of the time.
Assessment Area 5 - Assessment of Certification and Accreditation
Process
Provide a qualitative assessment of the agency's certification and accreditation process,
including adherence to existing policy, guidance, and standards. Provide narrative comments
as appropriate.
OMB C&A Process
Rating Scale
Excellent
Good
Satisfactory
Poor
Failing
IG Rating of CSB FY2008
C&A Process

X



2 OMB FY2008 FISMA Guidance describes the response categories as follows:
   - Rarely, for example, approximately 0-50% of the time
   - Sometimes, for example, approximately 51-70% of the time
   - Frequently, for example, approximately 71-80% of the time
   - Mostly, for example, approximately 81-95% of the time
   - Almost Always, for example, approximately 96-100% of the time

-------
The IG's quality rating included (or
considered) the following aspects of the CSB
C&A process
System Security Plan
System impact level
System test and evaluation
Security control testing
Incident handling
Security awareness training
Security configurations (including
patch management)
X
X
X
X
X
X
X
During our review of the CSB C&A process, TSTC obtained the current C&A package for the
CSB GSS - and the associated security artifacts (SSP, RA, POA&M, etc.). Our review of the
GSS documentation showed that CSB is making better use of C&A templates available to
Federal Agencies - utilizing those consistent with federal requirements.  In addition, the CSB IT
security staff developed Roles and Responsibilities documents necessary to clearly indicate the
responsibilities of both the ITSO and AITSO. This mitigates a finding identified during last
year's (FY 2007) assessment. The C&A documents are current and periodically updated,
however, the documentation should be updated to include revision history (date last updated, by
whom, reason for revision, etc.) to ensure version control and that the latest versions of these
documents are in place.

Recommendation

CSB should:

FY08-OIG-IT-02

Update the current C&A documentation to include revision history information such as date of
revision, individual that updated the document, and description of the revision the latest revision
dates, the person(s) making the revisions and the reason for the revision.  This should be a
standard practice going forward to ensure the latest version(s) of documents are in place.

-------
Assessment Area 6 - Assessment of Privacy Impact Assessment
(PIA) Process

Provide a qualitative assessment of the agency's PIA process, including adherence to existing
policy, guidance, and standards.
OMB Process
Rating Scale
Excellent
Good
Satisfactory
Poor
Failing
IG Rating of CSB FY2008
PIA Process

X



A review of the CSB documentation, and interviews with CSB IT security staff, indicates that
CSB has conducted a review of their PII program using the security checklist and guidelines, as
prescribed by OMB Memorandum 06-16.

In addition, during a review of CSB  systems and in interviews with CSB IT security staff, the
CSB does not currently provide any  system access to the general public (aside from their public
facing web site), or any public-facing systems access requiring userids / passwords. Specifically,
the only public facing site they have is the CSB web site, and it does not require a login and does
not interface with  internal systems or contain PII - thus not requiring a publicly posted PIA.

During our interview with CSB IT security staff, we also observed the "Investigations" system.
Although PII is not currently present, the potential for this system containing PII exists (as a
result of PII that may be on imaged supporting documents within the system). Although not a
system of record for this PII, privacy policy rules apply to the system. A separate "banner",
distinct from the CSB standard system banner, should be inserted to warn prospective users of
the "privacy" data that may be contained within the system.
Recommendation

CSB should:

FY08-OIG-IT-03

Insert the approved banner so that it is presented to all users accessing individual databases
within CSB. This is especially important for the "Investigations" system, because that system
has the potential to contain Personally Identifiable Information (PII).
                                          10

-------
Assessment Area 7 - Progress of Agency Privacy Program

Provide a qualitative assessment of the agency's progress to date in implementing the
provisions ofM-07-16: Safeguarding Against and Responding to the Breach of Personally
Identifiable Information.
OMB Progress
Rating Scale
Excellent
Good
Satisfactory
Poor
Failing
IG Rating of CSB FY2008
Privacy Program Progress

X



In conducting interviews with CSB IT security staff and reviewing the Breach and Privacy
Policies, the vulnerability scan output, and the CSB security and awareness training documents
(and logs), the CSB program is operating in a manner consistent with industry and Federal
standards - the CSB processes are consistent with OMB and NIST guidance for ensuring PII is
protected.  The CSB IT security staff also designed, reviewed, and documented a test of their
incident response process - using a "breach" scenario as one of the tests. CSB is adequately
implementing the provisions of M-07-16.

Assessment Area 8 - Configuration Management

Approximate the extent to which applicable systems implement common security
configurations established by NIST.

During the assessment, TSTC reviewed the scan outputs (internal  performed on 08/20/2008 and
external performed on 08/27/2008) for the existence of standard configurations and any known
vulnerabilities. A review of the inventory database and logs also demonstrated compliance
regarding maintaining up-to-date records and documentation. The scans did reveal that two of
the CSB mail servers do not have installed a Microsoft Exchange  security update. However, the
CSB IT security staff was aware of the update, made a decision not to apply it based upon
research, and assumed the risk of not currently installing the update since the update has the
potential to prevent the MS Exchange store from mounting after a system restart, thus making
the e-mail system unavailable.

Although initially documented during the FY07 audit, CSB should continue to address
reviewing, approving and documenting non-standard security configurations. It is listed here
again because this is an on-going process requiring attention to ensure that the confidentiality,
integrity and availability of CSB systems are maintained.
                                         11

-------
Recommendation

CSB should:

FY08-OIG-IT-04

Update the security policy and associated procedures to address reviewing, approving and
documenting non-standard security configurations to meet the CSB designated target completion
date of 09/30/2008.
Assessment Area 9 - Incident Reporting

Indicate whether or not the agency follows documented policies and procedures for reporting
incidents internally, to US-CERT, and to law enforcement.
OMB FY2008 FISMA Guidance
The agency follows documented policies and procedures
for identifying and reporting incidents internally.
The agency follows defined procedures for reporting to the
United States Computer Emergency Readiness Team (US-
CERT).
The agency follows documented policies and procedures
for reporting to law enforcement authorities.
Result
YES
YES
YES
The CSB has developed incident response policies and procedures and addressed these within
their annual security training. A review of the CSB IT security documentation and interviews
indicate that the CSB conducted incident response testing using a "breach" scenario and a lost
laptop scenario. Reviews of the Breach and Privacy Policies, the vulnerability scan outputs, and
incident response tests processes (and results) indicate a program consistent with industry and
Federal standards - and are consistent with NIST guidance. It should be noted that the testing
included processes for reporting to both US-CERT and  other designated law enforcement
officials and organizations.

Assessment Area 10 - Security Awareness Training

The agency has ensured security awareness training of all employees, including contractors
and those employees with significant information technology security responsibilities.

We reviewed the CSB Annual Security Awareness Training documents and the training rosters
(logs) maintained by the CSB IT security  staff, as well as the training acknowledgement forms of
the CSB security awareness training attendees.  All CSB personnel and contractors had received
the mandatory FY2008 security awareness training; and the material utilized during the training
was comprehensive, up-to-date, and accurate.
                                         12

-------
Assessment Area 11 - Collaborative Web Technologies and Peer-to-
Peer File Sharing

The agency explain policies regarding collaborative web technologies and peer-to-peer file
sharing in information technology security awareness training, ethics training, or any other
agency-wide training.

During the FY2008 review, we verified that CSB personnel had completed the annual security
training that included policies (i.e., the Board 34 document) and procedures relevant to peer-to-
peer file sharing. Furthermore, peer-to-peer file sharing is not supported or condoned at the CSB
and the configurations we examined did not have peer-to-peer file sharing software installed or
configured.

Assessment Area 12 - E-authentication Risk Assessments

The agency has completed system e-authentication risk assessments.

During our FY2008 evaluation, TSTC determined that an E-authentication Risk Assessment
was completed. During a review of CSB systems and in interviews with CSB IT security
staff, the CSB does not currently provide any system access to the general public (aside from
their public facing web site), or any public-facing systems access requiring userids /
passwords. Specifically, the only public facing site they have is their web site and it does not
require a login and does not interface with internal systems. As a result, no general public
userids and/or passwords are maintained by the CSB systems.
                                        13

-------
    Appendix A - Micro Agency  Reporting Template
Microagency Reporting Template for FY 2008 FISMA and Information Privacy Management
                          Chemical Safety and Hazard Investigation Board (CSB)
                          Anna Johnson, CIO, CSB
Agency Name:
Agency Point of Contact:
Microagencies are defined as agencies employing 100 or fewer Full Time Equivalent positions (FTEs).
Microagencies must report to OMB annually on FIMSA and Information Privacy Management. While quarterly
reports/updates are not required, microagencies should be prepared to provide information or to begin
submitting quarterly reports to OMB upon request.
                               1.  Information Systems Security
a.
b.
c.
d.
e.
f.
f.
Total Number of agency and contractor systems
Number of agency and contractor systems certified and accredited
Number of agency and contractor systems for which security controls have been
tested and reviewed in the past year
Was an independent assessment conducted in the last year?
Number of employees
Number of contractors
Number of employees and contractors who received IT security awareness training
in the last year
1
1
1
Yes
38
5
43
                                   2. Information Privacy
            Breach Notification
            Agencies are required by OMB memorandum (M-07-16) of May 22, 2007, "Safeguarding Against and
            Responding to the Breach of Personally Identifiable Information" to develop and implement a breach
            notification policy within 120 days.
            Please certify whether your agency has completed the requirements of M-07-16 by answering
            "Yes" or "No" to questions (1) through (4) in the table below.
I certify the agency has completed:
1.
2.
3.
4.
A breach notification policy (Attachment 3 of M-07-16)
An implementation plan to eliminate unnecessary use of Social Security
Numbers (SSN) (Attachment 1 of M-07-16)
An implementation plan and progress update on review and reduction of
holdings of personally identifiable information (PI I) (Attachment 1 of M-
07-16)
Policy outlining rules of behavior and identifying consequences and
corrective actions available for failure to follow these rules (Attachment 4
of M-07-16)
Yes
NoJ
Yes
Yes
    3 The CSB does not have a written plan to eliminate social security numbers from their system although
    currently no social security numbers are contained within their systems. They will develop the required
    plan and have a target completion date of November 22, 2008.
                                            14

-------
  Microagency Reporting Template for FY 2008 FISMA and Information Privacy Management

 Agency Name:               Chemical Safety and Hazard Investigation Board (CSB)	
 Agency Point of Contact:     Anna Johnson, CIO, CSB
               Note:  Micro agencies must maintain all documentation supporting this certification, and make it
               available in a timely manner upon request by OMB or other oversight authorities. Micro Agencies
	are not required to provide the actual documentation with the annual report.	
               Privacy Impact Assessments (PIAs) and Systems of Record Notices (SORNs)
      b.        Please provide the URL to a centrally located web page on the agency web site on which the agency
               lists working links to all of its PIAs and working links to all of its SORNs published in the Federal
               Register. Agencies must maintain all documentation supporting this certification and make it available
               in a timely manner upon request by OMB or other oversight authorities. By submitting the template the
               agency certifies that to the best of agency's knowledge the quarterly report accounts for all of the
               agency's systems to which the privacy requirements of the E-Government Act and Privacy Act are
               applicable. If the agency does not have any PIAs or SORNS, enter "NA."

                 .  .      Provide the URL of the centrally located  page on the agency web site listing working links
                  '  '     to agency PIAs:  (Hyperlink not required)

                                                        N/A

                 .  _      Provide the URL of the centrally located  page on the agency web site listing working links
                  '  '     to the published SORNs: (Hyperlink not required)

                                      www.csb.qov/index.cfm?folder=leqal affairs&paqe=index
                                                  15

-------
Appendix B - CSB's Response to  Draft  Report
U.S. Chemical Safety and
Hazard Investigation Board
2175 K Street, NW * Suite 650 • Washington, DC 20037-1809
Phone: (202) 261-7600 • Fax: (202) 2£
www.csb.gov
John S. Bresland
Chairman and CEO
Gary L. Visscher
Board Member
William B. Wark
Board Member
William E. Wright
Board Member

September 26, 2008

Rudolph Brevard
Director, Information Resource Management Assessments
U.S. Environmental Protection Agency
Office of Inspector General
1200 Pennsylvania Ave.
Washington DC 20460

Dear Mr. Brevard:

We have reviewed the draft report on the independent evaluation of the U.S. Chemical Safety and Hazard
Investigation Board's (CSB) compliance with the Federal Information Security Management Act
(FISMA) and efforts to protect sensitive agency information.

As reported, the CSB made significant progress in completing actions on FISMA findings from Fiscal
Year (FY) 2007. The CSB took the necessary steps to close six of the seven findings, and the seventh,
FY07-OIG-IT-04, is on schedule to meet a target completion date of October 10, 2008. This action will
also satisfy the requirements to close one of the FY2008 findings, FY08-OIG-IT-04, to address
reviewing, approving, and documenting non-standard security configurations.

We also  agree with the FY 2008 findings summarized in Table 2 of the draft report. Attached is an
updated Table 2 with our planned actions to address each finding and milestones for completion. Further,
we will update our Plan of Actions and Milestones, which is submitted to the Office of Management and
Budget, to include the planned actions for each of the open findings. Please contact Anna Johnson at 202-
261-7639, or Charlie Bryant at 202-261-7666 for further information on any of these items.

  Sincerely,
  Jolm S. BrcsJand
  Chairman & CEO
Enclosure
                                            16

-------
                                                                           Enclosure
                 Summary of FY 2008 Findings & CSB Planned Actions
  FY 2008 FISMA Finding
  Status
               Planned Actions
FY08-OIG-IT-01
Security Controls Testing
Open
By January 15, 2009, the CSB will:
Test approximately one-third of unique security
controls and an Agency-defined set of key
controls.
FY08-OIG-IT-02
C&A Process
Open
By September 30, 2008, the CSB will:
Update the current C&A documentation to include
revision history information such as date of
revision, individual that updated the document,
and description of the revision.
FY08-OIG-IT-03
Privacy Impact and
Management
Open
By October 17, 2008, the CSB will:
Insert into individual database application systems
within the CSB's GSS a banner indicating the
system is a government system and therefore,
similar to the banner presented at logon to the GSS
itself.
FY08-OIG-IT-04
Configuration Management
Open
By October 10, 2008, the CSB will:
Update the security policy and associated
procedures to address reviewing, approving and
documenting non-standard security configurations.
                                         17

-------