U.S. Environmental Protection Agency
Office of Inspector General
At a Glance
09-P-0055
December 9, 2008
Catalyst for Improving the Environment
Why We Did This Review
The Office of Inspector
General contracted with
Williams, Adley & Company,
LLP, to conduct the annual
audit of the U.S.
Environmental Protection
Agency's (EPA's) compliance
with the Federal Information
Security Management Act
(FISMA). Williams, Adley &
Company, LLP, conducted the
network vulnerability testing
of the Agency's local area
network located at EPA's
National Computer Center in
Research Triangle Park, North
Carolina.
Background
The network vulnerability
testing was conducted to
identify any network risk
vulnerabilities and present the
I re suits to the appropriate EPA
officials to promptly
remediate or document
planned actions to resolve the
vulnerability.
For further information,
contact our Office of
Congressional, Public Affairs,
and Management at
(202)566-2391.
Results of Technical Network Vulnerability
Assessment: EPA's National Computer Center
What Williams, Adley & Company, LLP, Found
Vulnerability testing of EPA's National Computer Center network identified
Internet Protocol addresses with high-risk and medium-risk vulnerabilities.
Although National Computer Center personnel have taken actions to remediate
some of the documented findings, several vulnerabilities (both high and medium)
still remain unresolved.
What Williams, Adley & Company, LLP, Recommends
Williams, Adley & Company, LLP, recommends that the Director of the National
Computer Center:
• Complete actions to address all unresolved vulnerability findings.
• Update EPA's Automated Security Self Evaluation and Remediation
Tracking (ASSERT) system in accordance with the EPA Procedure for
Information Security Plans of Actions and Milestones for the vulnerabilities
not resolved within the required timeframes
• Perform a technical vulnerability assessment test of the National Computer
Center network and managed assets at the Las Vegas Radiation and Indoor
Environments National Laboratory, within 30 days, to demonstrate and
document corrective actions that have resolved the vulnerabilities.
Due to the sensitive nature of this early warning report's technical findings, the
full report is not available to the public.
------- |