U.S. ENVIRONMENTAL PROTECTION AGENCY
OFFICE OF INSPECTOR GENERAL
Catalyst for Improving the Environment
Audit Report
Project Delays Prevent
EPA from Implementing an
Agency-wide Information Security
Vulnerability Management Program
Report No. 09-P-0240
September 21, 2009
-------
Report Contributors:
Rudolph M. Brevard
Charles M. Bade
Jefferson Gilkeson
Teresa Richardson
Cory Costango
Scott Sammons
Abbreviations
ASSERT Automated Security Self-Evaluation and Remediation Tracking
BRAINS Billing and Reimbursable Accounting Network System
EPA U.S. Environmental Protection Agency
IT Information Technology
mLINQS Relocation Expense Management System
NIST National Institute of Standards and Technology
NTSD National Technology Services Division
OARM Office of Administration and Resources Management
OCFO Office of the Chief Financial Officer
OEI Office of Environmental Information
OIG Office of Inspector General
OMB Office of Management and Budget
POA&Ms Plans of Action and Milestones
VMP Vulnerability Management Program
-------
U.S. Environmental Protection Agency
Office of Inspector General
At a Glance
09-P-0240
September 21, 2009
Catalyst for Improving the Environment
Why We Did This Review
The Office of Inspector
General (OIG) sought to
determine (1) the status of
corrective actions related to
agreed-to recommendations
for selected information
security audit reports, and
(2) to what extent the U.S.
Environmental Protection
Agency (EPA) program
offices evaluated whether
corrective actions taken
resolved identified
weaknesses.
Background
Office of Management and
Budget (OMB) Circular
A-123 requires that EPA
managers take timely and
effective action to correct
deficiencies identified by a
variety of sources, such as
OIG audits. OMB Circular
A-123 also requires
management to show that
corrective actions taken
achieve the desired results.
EPA Manual 2750 and EPA
Order 1000.24 outline
management's responsibility
for following up on OIG
recommendations.
For further information, contact
our Office of Congressional,
Public Affairs and Management
at (202) 566-2391.
To view the full report,
click on the following link:
www.epa.gov/oig/reports/2009/
20090921-09-P-0240.pdf
Project Delays Prevent EPA from Implementing
an Agency-wide Information Security
Vulnerability Management Program
What We Found
EPA implemented 56 percent (15 of 27) of the information security audit
recommendations we reviewed. EPA's lack of progress on four key audit
recommendations we made in 2004 and 2005 inhibits EPA from providing an
Agency-wide process for security monitoring of its computer network. EPA has
not established an Agency-wide network security monitoring program because
EPA did not take alternative action when this project ran into significant delays.
By not performing this critical function, EPA management lacked information
necessary to respond to known threats against EPA's network and to mitigate
vulnerabilities before they can be exploited.
EPA offices do not regularly evaluate the effectiveness of actions taken to correct
identified deficiencies, as required by OMB Circular A-123. EPA is updating its
audit management and oversight policies; we provided suggestions for
strengthening them.
What We Recommend
We recommend that the Director of the Office of Technology Operations and
Planning, within the Office of Environmental Information:
• Create Plans of Action and Milestones for each unimplemented audit
recommendation listed in Appendix B.
• Update EPA's Management Audit Tracking System to show the status of
each unimplemented audit recommendation listed in Appendix B.
• Provide EPA program and regional offices with an alternative solution for
vulnerability management, including establishing a centralized oversight
process to ensure that EPA program and regional offices (a) regularly test
their computer networks for vulnerabilities, and (b) maintain files
documenting the mitigation of detected vulnerabilities.
• Establish a workgroup of program and regional EPA information
technology staff to solicit input on training needs and facilitate rolling out
the Agency-wide vulnerability management program.
• Issue an updated memorandum discussing guidance and requirements.
The Agency agreed with all of our findings and recommendations.
-------
£
5
o
•
UNITED STATES ENVIRONMENTAL PROTECTION AGENCY
WASHINGTON, D.C. 20460
OFFICE OF
INSPECTOR GENERAL
MEMORANDUM
SUBJECT:
FROM:
TO:
September 21,2009
Project Delays Prevent EPA from Implementing an Agency-wide
Information Security Vulnerability Management Program
Report No. 09-P-0240
w H 1 V.M R H tu^yU^ Vl
Rudolph M. Brevard !L> t
Director, Information Resources Management Assessments
Linda A. Travers
Acting Assistant Administrator and Chief Information Officer
Office of Environmental Information
This is our report on the subject audit conducted by the Office of Inspector General (OIG) of the
U.S. Environmental Protection Agency (EPA). This report contains findings that describe the
problems the OIG has identified and corrective actions the OIG recommends. This report
represents the opinion of the OIG and does not necessarily represent the final EPA position.
Final determinations on matters in this report will be made by EPA managers in accordance with
established audit resolution procedures.
The estimated cost of this report - calculated by multiplying the project's staff days by the
applicable daily full cost billing rates in effect at the time - is $475,431.
Action Required
In accordance with EPA Manual 2750, you are required to provide a written response to this
report within 90 calendar days. You should include a corrective actions plan for agreed-upon
actions, including milestone dates. We have no objections to the further release of this report to
the public. This report will be available at http://www.epa.gov/oig.
If you or your staff have any questions regarding this report, please contact me at 202-566-0893
or brevard.rudy@epa.gov; or Charles M. Dade, Project Manager, at 202-566-2575 or
dade. chuck@epa. gov.
-------
Project Delays Prevent EPA from Implementing an Agency-wide 09-P-0240
Information Security Vulnerability Management Program
Table of Contents
Purpose 1
Background 1
Noteworthy Achievements 1
Scope and Methodology 2
Other Reporting Matters 2
Results of Review 3
Lack of a Vulnerability Management Tool Inhibits EPA's Ability to
Continuously Monitor Its Network Resources 3
Vulnerability Management Project Needs an Interim Solution and
Stakeholder Involvement 4
Recommendations 5
Agency Comments and OIG Evaluation 6
Status of Recommendations and Potential Monetary Benefits 7
Appendices
A Status of Agreed-to Recommendations 8
B Status of Unimplemented Recommendations 9
C Agency Response to Draft Audit Report 17
D Distribution 19
-------
09-P-0240
Purpose
We sought to evaluate the implementation and effectiveness of the Agency's corrective actions
for prior information security audit recommendations.
Background
Implementing corrective actions to resolve issues is essential to improving the efficiency and
effectiveness of U.S. Environmental Protection Agency (EPA) operations. Office of
Management and Budget (OMB) Circular A-123, Management's Responsibility for Internal
Control, requires that managers take timely and effective action to correct issues identified by a
variety of sources. Office of Inspector General (OIG) audit reports represent one such source.
OMB Circular A-123 also requires management to show that corrective actions taken achieve the
desired results. It also specifies that the results achieved should be documented in writing.
Further, supporting documentation should be available for review. OMB Circular A-123 states
that correcting issues is an integral part of management accountability and must be considered a
priority by the Agency.
EPA has policies to guide managers when implementing audit recommendations. Specifically,
EPA Manual 2750, EPA Audit Management Process, provides timeframes for audit resolution.
It also requires that EPA action officials create systems to ensure that recommendations are
implemented. EPA Order 1000.24, Management Integrity, states that weaknesses should be
corrected at the organizational level closest to the problem. Further, it states that weaknesses
should be dealt with as soon as possible after being identified.
We chose four audit reports to determine whether the Agency has taken action to correct
information security weaknesses identified in each of them (see Table 1).
Table 1: Prior Audits Reviewed Regarding Information Security Weaknesses
Report No.
2004-P-00013
2005-P-00011
2007-P-00007
08-1-0032
Report Title
EPA's Administration of Network Firewalls Needs
Improvement
Security Configuration and Monitoring of EPA's Remote
Access Methods Need Improvement
EPA Could Improve Processes for Managing Contractor
Systems and Reporting Incidents
Audit of EPA's Fiscal 2007 and 2006 (Restated)
Consolidated Financial Statements (only reviewed
recommendations made to improve information security)
Date
March 3 1,2004
March 22, 2005
January 11, 2007
November 15,2007
Source: OIG analysis
Noteworthy Achievements
EPA has taken steps to strengthen network security by implementing an appliance-based firewall
server that meets an industry standard architecture. EPA also updated its incident-reporting
directive to include new roles, responsibilities, and standards for centralized incident reporting.
-------
09-P-0240
Scope and Methodology
We performed our audit from January 2008 to June 2009. We performed this audit in accordance
with generally accepted government auditing standards. These standards require that we plan
and perform the audit to obtain sufficient and appropriate evidence. The evidence is to provide a
reasonable basis for our findings and conclusions. We believe that the evidence obtained
provides a reasonable basis for our findings and conclusions.
We compared EPA's written assertions of the status of agreed-to report recommendations with
documentary support of the actions EPA took. We also spoke with EPA and contractor staff in
the Office of Environmental Information (OEI) and the Office of Administration and Resources
Management (OARM) responsible for implementing and overseeing actions to address the
related audit recommendations. We identified actions EPA still needed to take to fully satisfy
each recommendation.
We spoke with EPA and contractor staff in the Office of Air and Radiation, Office of Research
and Development, OARM, and EPA Regions 4 and 5. We asked about system control
monitoring practices of Web-Mail-enabled servers. We asked about practices, methods, and
tools these sites use to detect and protect their networks against vulnerabilities. During visits to
EPA regional offices for Regions 4 and 5, we performed vulnerability tests on selected
application servers that allow remote access to EPA's electronic mail system. We provided the
test results to the regional staff for resolution. We spoke with OEI and OARM audit follow-up
coordinators, as well as EPA line staff who implement corrective actions. These individuals
determine whether their offices have processes in place to evaluate the effectiveness of those
actions.
Other Reporting Matters
During preliminary research, we issued a memorandum to EPA's Chief Financial Officer on the
status of actions taken to correct information security weaknesses at the Cincinnati Finance
Center. The Office of the Chief Financial Officer (OCFO) took ample steps to correct material
weaknesses in physical access and environmental controls at the Cincinnati Finance Center.
However, OCFO still needed to do more work to document and test security controls over the
two critical applications at the finance center. The OIG reviewed EPA's progress in completing
these remaining recommendations during the Fiscal Year 2008 financial statement audit. In
examining that audit, we found that the Agency made significant progress in completing the
agreed-to corrective actions, but it still needs to finalize the independent reviews of the two
financial applications and update the applications' security plans. In addition, the Agency needs
to test the newly approved contingency plans for these two applications.
Also during preliminary research, we provided OCFO with written comments directing it to
strengthen EPA Manual 2750 and EPA Order 1000.24. We found that EPA needed to update
EPA Manual 2750 to more clearly assign responsibility for ensuring corrective actions are
effective and implemented in a timely manner, as required by OMB Circular A-123. We found
that internal controls for overseeing corrective actions defined in EPA Order 1000.24 needed
updating to specify something to this effect: "A determination that a weakness has been
-------
09-P-0240
corrected is made only when management demonstrates that the corrective action taken
effectively resolved the identified weakness."
Appendix A provides the status of agreed-upon recommendations for the four reports we
reviewed. Appendix B provides information on all open agreed-to recommendations that still
require EPA management action to complete.
Results of Review
EPA made progress in implementing many of the agreed-upon audit recommendations.
However, more management emphasis is needed to complete a key project that would provide
EPA offices with the necessary tools to continuously monitor their network resources. In
particular, since 2005, EPA has attempted to implement a commercial off-the-shelf network
vulnerability tool. This tool has the capability to identify and correct commonly known security
weaknesses. However, project delays have thwarted EPA's ability to move the project beyond
the pilot stage. As a result, EPA regional and program offices are inconsistent in routinely
monitoring their networks for common vulnerabilities. Offices that do routinely monitor their
networks for common vulnerabilities use inconsistent methods.
Lack of a Vulnerability Management Tool Inhibits EPA's Ability to
Continuously Monitor Its Network Resources
EPA has not established an Agency-wide security-monitoring program for its computer network.
Significant delays have occurred in completing the information technology (IT) project related to
this effort. In our 2004 audit of EPA's network firewall and our 2005 audit of remote access
methods, we recommended that EPA:
• Modify the network vulnerability assessment methodology to include scanning of all
firewall components.
• Develop and implement a security-monitoring program that includes testing all servers,
and require all system administrators to register their servers with the National
Technology Services Division and participate in the security-monitoring program.
• Expand the Agency's security-monitoring program to include using a variety of network
vulnerability scanning tools to monitor registered servers.
• Establish and implement a process to ensure program and regional offices conduct
regular security monitoring that includes vulnerability scanning.
Completing these recommendations called for EPA to implement a vulnerability management
program (VMP). In July 2005, EPA began to establish the program. Yet, more than 3 years
later, EPA is still evaluating a vulnerability management tool. The Research Triangle Park
campus and an EPA region served as the two pilot sites for testing the selected tool. OEI staff
mentioned that it is necessary to automate both the vulnerability detection and remediation
processes before rolling out the vulnerability management tool for EPA locations to use.
-------
09-P-0240
Automating only the detection process would overwhelm EPA IT security staff because they
would have to manually remediate vulnerabilities. We agree with the Agency that remediating
vulnerabilities would initially increase the workload of EPA IT security staff. However, this
increase in workload would decrease over time once the Agency becomes more familiar with the
vulnerability management tool. We believe this short-term increase in workload would put EPA
in a better position to more quickly remediate high risk vulnerabilities and provide better
protection of critical network resources once a vulnerability remediation process is in place.
National Institute of Standards and Technology (NIST) Special Publication 800-123, Guide to
General Server Security, states that scanning should occur on a weekly to monthly basis. NIST
stresses that this ongoing scanning is extremely important for mitigating vulnerabilities as soon
as possible to prevent vulnerabilities from being discovered and exploited.
Vulnerability Management Project Needs an Interim Solution and
Stakeholder Involvement
As OEI progressed with the project, automating the remediation process became increasingly
difficult. With the exception of common network services, EPA operates a decentralized managed
network. Hardware and software component configurations vary by EPA location. Calibrating a
vulnerability management tool that can remediate vulnerabilities on a variety of hardware and
software configurations across EPA's decentralized network presents a major challenge. As such,
providing an interim solution to identify vulnerabilities until an automated solution is available
would provide EPA offices with:
• A consistent approach to monitoring their networks continuously.
• A means to provide feedback to help configure the automated remediation component of
the VMP.
• A means to transition to new vulnerability management components when they become
available.
Further, establishing a formal centralized oversight structure would help ensure that management
has in place a repeatable and documented practice. This practice would provide much needed
consistency and structure to network vulnerability testing and remediation. However, EPA did
not provide offices with an interim solution for conducting continuous monitoring of their
network resources. During our visits to five EPA offices, we confirmed that they do not
regularly and consistently test their networks for vulnerabilities.
We asked employees involved in the project about this and other issues that were delaying the
project's completion. We requested information on actions taken by EPA to address these
issues. We further asked for the planned project completion date, project budget data, and status
of key milestones. However, as of August 6, 2009, EPA management had not provided the
information related to our request.
In addition, during interviews with EPA employees involved in the project, it came to our
attention that conditions existed that suggest management could have taken more steps to prepare
stakeholders for the new VMP. For example, the Project Manager indicated that EPA
management did not establish a workgroup composed of key stakeholders from the various EPA
-------
09-P-0240
programs and regional offices. Also, IT security personnel who were involved in the pilot
indicated they would need to receive additional training to ease the implementation of the
vulnerability management program associated with this project.
As of August 6, 2009, EPA provided a partial work plan, which included only the pilot phase of
the project, to implement an Agency-wide VMP. A review of this work plan shows that EPA
planned to complete the pilot phase of this project in February 2009. Nevertheless, the work
plan does not provide information on when EPA plans to have an Agency-wide VMP in place.
As of August 6, 2009, EPA did not provide information on the steps it took to address the delays
in implementing the VMP.
As a result of our audit, OEI issued a memorandum on August 3, 2009, to remind applicable
Agency personnel of their vulnerability scanning/remediation responsibilities and to point them
to available resources to assist in fulfilling these responsibilities. However, the information and
documentation referenced within the memorandum needs to be revised to reflect the latest
revision of NIST Special Publication 800-53, as well as the latest minimum standard for time
between the periodic vulnerability scanning/remediation. The memorandum indicated that the
time between periodic vulnerability scanning and remediation is not to exceed one quarter.
However, NIST guidance states that scanning should occur on a weekly to monthly basis.
Additionally, NIST also states periodic scans should be performed using two different tools
because no scanner is able to detect all known vulnerabilities.
Additionally, although the memorandum references available resources to assist Agency
personnel in fulfilling their vulnerability scanning/remediation responsibilities, OEI made
disclaimer statements regarding licensing limitations and resource availability associated with
the resources/tools they were offering. We believe this disclaimer indicates a lack of
management commitment and support for establishing an effective vulnerability management
program within EPA.
Due to the datedness and vagueness of the memorandum and the lack of resources and necessary
licenses for the tools implied by the disclaimer, we added Recommendation 5 to the
"Recommendations" section below.
Recommendations
We recommend that the Director, Office of Technology Operations and Planning, within the
Office of Environmental Information:
1. Create Plans of Action and Milestones (POA&Ms) for each unimplemented audit
recommendation listed in Appendix B.
2. Update EPA's Management Audit Tracking System to show the status of each
unimplemented audit recommendation listed in Appendix B.
3. Provide EPA program and regional offices with an interim solution for vulnerability
management. This should include establishing a centralized oversight process to
-------
09-P-0240
ensure that EPA program and regional offices (a) regularly test their computer
networks for vulnerabilities, and (b) maintain files documenting the mitigation of
detected vulnerabilities.
4. Establish a workgroup of program and regional EPA IT staff (e.g., information
security officers, system administrators, etc.) to solicit input on training needs and
facilitate the rollout of the Agency-wide vulnerability management program.
5. Issue an updated memorandum that:
a. Reflects the current version of NIST Special Publication 800-53.
b. Requires continuous scanning/remediation on at least a monthly basis.
c. Requires continuous scanning/remediation be performed using two tools
concurrently.
d. Specifies what tools and resources OEI can actually provide to help the applicable
personnel fulfill these responsibilities and what the applicable organizations will
have to obtain on their own to perform these responsibilities.
Agency Comments and OIG Evaluation
Within its July 30, 2009, response to the draft report, OEI agreed with the findings and
recommendations. OEI did not provide an updated status on the recommendations identified in
Appendix B with their response. We added an additional column to the end of Appendix B in
which we included the information we obtained from the Automated Security Self-Evaluation
and Remediation Tracking (ASSERT) system as of August 6, 2009. However, OEI indicated it
would create POA&Ms for all of the report's recommendations.
Appendix C contains the Agency's complete response to our formal draft report.
-------
09-P-0240
Status of Recommendations and
Potential Monetary Benefits
RECOMMENDATIONS
Rec.
No.
Page
No.
Subject
Status1
Action Official
Planned
Completion
Date
POTENTIAL MONETARY
BENEFITS (in SOOOs)
Claimed Agreed To
Amount Amount
5 Create Plans of Action and Milestones (POA&Ms)
for each unimplemented audit recommendation
listed in Appendix B.
5 Update EPA's Management Audit Tracking System
to show the status of each unimplemented audit
recommendation listed in Appendix B.
5 Provide EPA program and regional offices with an
interim solution for vulnerability management. This
should include establishing a centralized oversight
process to ensure that EPA program and regional
offices (a) regularly test their computer networks for
vulnerabilities, and (b) maintain files documenting
the mitigation of detected vulnerabilities.
6 Establish a workgroup of program and regional
EPA IT staff (e.g., information security officers,
system administrators, etc.) to solicit input on
training needs and facilitate the rollout of the
Agency-wide vulnerability management program.
Director, Office of
Technology Operations and
Planning, within the Office of
Environmental Information
Director, Office of
Technology Operations and
Planning, within the Office of
Environmental Information
Director, Office of
Technology Operations and
Planning, within the Office of
Environmental Information
Director, Office of
Technology Operations and
Planning, within the Office of
Environmental Information
6 Issue an updated memorandum that:
a. Reflects the current version of NIST Special
Publication 800-53.
b. Requires continuous scanning/remediation
on at least a monthly basis.
c. Requires continuous scanning/remediation
be performed using two tools concurrently.
d. Specifies what tools and resources OEI can
actually provide to help the applicable
personnel fulfill these responsibilities and
what the applicable organizations will have to
obtain on their own to perform these
responsibilities.
Director, Office of
Technology Operations and
Planning, within the Office of
Environmental Information
0 = recommendation is open with agreed-to corrective actions pending
C = recommendation is closed with all agreed-to actions completed
U = recommendation is undecided with resolution efforts in progress
-------
09-P-0240
Appendix A
Status ofAgreed-to Recommendations
Report Title/Number
EPA's Administration of Network Firewalls Needs
Improvement
(Report No. 2004-P-00013)
Security Configuration and Monitoring of EPA's Remote
Access Methods Need Improvement
(Report No. 2005-P-00011)
EPA Could Improve Processes for Managing Contractor
Systems and Reporting Incidents
(Report No. 2007-P-00007)
Audit of EPA's Fiscal 2007 and 2006 (Restated)
Consolidated Financial Statements
(Report No. 08-1-0032)
Number Completed/Not Completed
Percentage Completed/Not Completed
Recommendation
Number
2-1
3-1
3-2
2-1
2-2
2-3
2-4
2-5
3-1
3-2
2-1
2-2
2-3
3-1
3-2
3-3
3-4
12
13
14
15
16
17
18
19
20
21
Recommendations
Completed
Yes
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
15
56%
No
X
X
X
X
X
X
X
X
X
X
X
X
12
44%
Source: OIG analysis
-------
Status of Unimplemented Recommendations
09-P-0240
Appendix B
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
EPA's Administration of
Network Firewalls Needs
Improvement
(Report No. 2004-P-00013)
2-1 Develop and
implement a standard
configuration requirement
for adequately securing
workstations used to
remotely administer
network firewalls.
Complete the
implementation of
"proxy" servers for
remote access to
firewall consoles.
Management approval
and issuance of the
procedure developed
for granting access to
firewall consoles.
Planned implementation date
for both actions was August
2008. As of February 9, 2009,
EPA updated the POA&M in
the ASSERT system with a
new completion date of
March 31, 2009.
The POA&M in ASSERT
indicates that this
Milestone Status is
Completed. The OMB
Comment does not
appear to corroborate
the milestone status.
The OMB Comment
states that the review
was completed and
modifications are being
made to access methods
based on outcome.
3-2 Modify the network
vulnerability assessment
methodology to include
scanning of all firewall
components (e.g.,
workstations,
management consoles,
and enforcement point
servers).
Implement regular
vulnerability scanning
of security
infrastructure.
Planned implementation date
was September 2008. As of
February 9, 2009, EPA updated
the POA&M in the ASSERT
system with a new completion
date of March 31, 2009.
Current revised
completion date is
September 30, 2009.
-------
09-P-0240
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
Security Configuration and
Monitoring of EPA's Remote
Access Methods Need
Improvement
(Report No. 2005-P-00011)
2-1 Establish processes
and assign accountability
for independently verify
and validate that
Web-Mail and BlackBerry
servers comply with
published EPA policies
and standards.
Put formal processes in
place and formally
assign accountability
for independently
verifying and validating
that Web-Mail servers
comply with published
EPA policies and
standards.
EPA management has not
provided a complete project
plan that includes the actions
to be taken and the estimated
or planned milestone dates
for completing the actions
necessary to address the
recommendation.
Implementation date depends
on the results of the ongoing
vulnerability management pilot
program. Based on a May
2008 interview with the
project's technical lead, the
planned completion date for the
pilot program is March 2009.
Current revised
completion date is
August 31, 2009.
10
-------
09-P-0240
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
2-2 Develop and
implement a security-
monitoring program that
includes testing all
servers, and require all
system administrators to
register their servers with
NTSD and participate in
the security-monitoring
program.
Implement an Agency-
wide vulnerability
management program
that includes registering
and testing all servers
on a regular basis (in
compliance with
Federal and Agency
Regulations, Policies,
Procedures, and
Standards),
remediating the
vulnerabilities in a
timely manner.
EPA management has not
provided a complete project
plan that includes the actions
to be taken and the estimated
or planned milestone dates
for completing the actions
necessary to address the
recommendation.
Implementation date depends
on the results of the ongoing
vulnerability management pilot
program. Based on a May
2008 interview with the
project's technical lead, the
planned completion date for the
pilot program is March 2009.
Current revised
completion date is
August 31, 2009.
11
-------
09-P-0240
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
2-3 Expand the Agency's
security-monitoring
program to include using
a variety of network
vulnerability scanning
tools to monitor
registered servers.
Implement processes
and utilize tools to
support Agency-wide
vulnerability scanning
of critical network.
EPA management has not
provided a complete project
plan that includes the actions
to be taken and the estimated
or planned milestone dates
for completing the actions
necessary to address the
recommendation.
Implementation date depends
on the results of the ongoing
vulnerability management pilot
program. Based on a May
2008 interview with the
project's technical lead, the
planned completion date for the
pilot program is March 2009.
Current revised
completion date is
August 31, 2009.
12
-------
09-P-0240
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
2-4 Establish and
implement a process to
ensure program and
regional offices conduct
regular security
monitoring that includes
vulnerability scanning.
Establish and
implement a process to
ensure program and
regional offices conduct
regular security
monitoring that includes
vulnerability scanning.
EPA management has not
provided a complete project
plan that includes the actions
to be taken and the estimated
or planned milestone dates
for completing the actions
necessary to address the
recommendation.
Implementation date depends
on the results of the ongoing
vulnerability management pilot
program. Based on a May
2008 interview with the
project's technical lead, the
planned completion date for the
pilot program is March 2009.
Current revised
completion date is
August 31, 2009.
2-5 Develop and publish
standards that define
authorized open ports
and services for the
Web-Mail and BlackBerry
servers' Operating
System.
Develop and publish
standards that define
authorized open ports
and services for the
Web-Mail and
BlackBerry servers'
Operating System and
require Web-mail and
BlackBerry servers to
be single-purpose
servers.
EPA has not provided a
planned implementation date
for the corrective actions
associated with this
recommendation.
EPA has not established
a POA&M to address this
recommendation.
13
-------
09-P-0240
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
EPA Could Improve
Processes for Managing
Contractor Systems and
Reporting Incidents
(Report No. 2007-P-00007)
2-1 Develop and
implement guidance that
EPA offices can use to
identify contractor
systems that contain EPA
data.
Update Information
Security Manual to
include procedures
EPA offices can use to
identify contractor
systems that contain
EPA data.
Planned implementation date
for both actions was
September 18, 2008. As of
February 9, 2009, EPA updated
the POA&M in the ASSERT
system with a new planned
completion date of April 10,
2009.
The POA&M in ASSERT
indicates that this
Milestone Status is
completed as of June 30,
2009. The OMB
Comment does not
corroborate the
milestone status. The
OMB Comment states
that contractual and
resource ability to review
draft documents have
delayed this activity.
Audit of EPA's Fiscal 2007
and 2006 (Restated)
Consolidated Financial
Statements
(Report No. 08-1-0032)
12 Develop a
contingency plan for
BRAINS and mLINQS.
The plans should be
approved by
management and have
documented annual
reviews and testing.
Conduct a test of the
two newly developed
contingency plans.
As of the end of the Fiscal Year
2008 financial statement audit,
EPA had not completed the
corrective actions associated
with this recommendation. The
OIG will track EPA's progress
in completing this
recommendation during the
annual financial statement
audit.
The OIG will track EPA's
progress in completing
this recommendation
during Fiscal Year
2009's annual financial
statement audit.
14
-------
09-P-0240
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
13 Develop a security
plan for BRAINS and
mLINQS. This should
include having both
applications comply with
all the federal security
requirements specified by
the National Institute for
Standards and
Technology, including
completion of the security
certification and
accreditation process and
the resulting formal
authorization to operate.
Finalize the
independent reviews
and updated security
plans.
As of the end of the Fiscal
Year 2008 financial statement
audit, EPA had not completed
the corrective actions
associated with this
recommendation. The OIG will
track EPA's progress made in
completing this
recommendation during the
annual financial statement
audit.
The OIG will track EPA's
progress in completing
this recommendation
during Fiscal Year
2009's annual financial
statement audit.
15 Enter Plans of Action
and Milestones for all the
above noted deficiencies
in the Agency's security
weakness tracking
database (ASSERT).
Update ASSERT as
POA&Ms change.
As of the end of the Fiscal
Year 2008 financial statement
audit, EPA had not completed
the corrective actions
associated with this
recommendation. The OIG will
track EPA's progress in
completing this
recommendation during the
annual financial statement
audit.
The OIG will track EPA's
progress in completing
this recommendation
during Fiscal Year
2009's annual financial
statement audit.
15
-------
09-P-0240
Report Title/Number
Recommendation
Action Needed
Requested Updated Status
from Agency -
Agency Provided No Updated
Status as of June 23, 2009
ASSERT POA&M
Information as of
August 6, 2009
18 Conduct and
document an annual
verification and validation
of implemented
procedures to ensure
controls are implemented
as intended and are
effective.
Conduct and document
an annual verification
and validation of
implemented
procedures to ensure
controls are
implemented as
intended and are
effective.
As of the end of the Fiscal
Year 2008 financial statement
audit, EPA had not completed
the corrective actions
associated with this
recommendation. Based on
EPA Management's October
2008 response, EPA set
December 31, 2008, as the
implementation date for this
recommendation.
The OIG will track EPA's
progress in completing this
recommendation during the
annual financial statement
audit.
The OIG will track EPA's
progress in completing
this recommendation
during the Fiscal Year
2009 financial statement
audit.
16
-------
09-P-0240
Appendix C
Agency Response to Draft Audit Report
Jul 30, 2009
MEMORANDUM
SUBJECT: Response to Draft Audit Report Project No. OMS-FY08-0001, Project Delays
Prevent EPA from Implementing an Agency-Wide Vulnerability Management
Program
FROM: Vaughn Noga, Acting Director
Office of Technology Operations and Planning
and Acting Chief Technology Officer
TO: Rudolph M. Brevard, Director
Information Resources management Assessments
Office of Inspector General
We have completed our review of the OIG Draft Audit Report Project No. OMS-FY08-0001,
Project Delays Prevent EPA from Implementing an Agency-Wide Vulnerability Management
Program and are providing the following comments to your recommendations:
1. Recommendation #1 - Create Plans of Action and Milestones for each unimplemented
audit recommendation listed in Appendix B.
Concur in part - Many of the unimplemented audit recommendations have been assigned
Plan of Action and Milestones (POA&Ms). For those recommendations that have not
been assigned POA&Ms, OEI will ensure they have been created. Additionally, OEI will
update its POA&Ms to reflect the milestones being identified in our current process
improvement planning activities. Estimated date of completion for initial planning is
August 31,2009.
2. Recommendation #2 - Update the EPA's Management Audit Tracking System to show
the status of each unimplemented audit recommendation listed in Appendix B.
Concur - OEI will ensure EPA's Management Audit Tracking System (MATS) is
updated to show the status of each agreed upon, unimplemented audit recommendation
under its purview with in the limitations of the system. OEI recommends that OIG
continue to utilize the Automated System Security Evaluation and Remediation Tracking
(ASSERT) system to monitor status as MATS will be updated with the ASSERT
POA&M Task ID.
17
-------
09-P-0240
3. Recommendation #3 - Provide EPA Program and Regional offices with an interim
solution for vulnerability management. This should include establishing a
centralized oversight process to ensure that EPA Program and Regional offices
(1) regularly test their computer networks for vulnerabilities, and (2) maintain
files documenting the mitigation of detected vulnerabilities.
Concur - OEI will issue a memorandum to all Senior Information Officials, Information
Management Officials and Information Security Officers reminding them of their
responsibilities in accordance with the National Institute of Standards and Technology
(NIST) Special Publication 800-53 to periodically scan systems for vulnerabilities on a
continuous basis, implement appropriate remedial actions and what Agency and non-
Agency tools available/recommended for use e.g. the Test and Vulnerability Assessment
Lab (TVAL) and Nessus Vulnerability Scanner.
Additional oversight and compliance will be conducted on a continuous basis via the
Technology and Information Security Staff (TISS) Independent Verification and
Validation (IV&V) activities.
4. Establish a workgroup of program and regional EPA IT staff (e.g., information
security officers, system administrators etc.) to solicit input on training needs and
to facilitate the rollout of the Agency-wide vulnerability management program.
Concur - OEI will charter and manage a Patch and Vulnerability Group (PVG) in
accordance with NIST SP 800-40. This group will conduct a variety of functions in
support of the EVMP to include, but not limited to, identifying and ensuring the
implementation of role-based training requirements to appropriate Information
Technology (IT) personnel.
Thank you for giving us the opportunity to provide responses on this report. If there are any
questions concerning the provided information please contact Johnny E. Davis Jr. at 202-566-
1025.
cc: Johnny E. Davis Jr.
Robin Gonzalez
Bill Boone
18
-------
09-P-0240
Appendix D
Distribution
Office of the Administrator
Acting Assistant Administrator for Environmental Information and Chief Information Officer
Acting Director, Office of Technology Operations and Planning
Director, Technology and Information Security Staff
Director, National Computer Center
Chief, Security and Business Management Branch, National Computer Center
Agency Follow-up Official (the CFO)
Agency Follow-up Coordinator
General Counsel
Associate Administrator for Congressional and Intergovernmental Relations
Associate Administrator for Public Affairs
Audit Follow-up Coordinator, Office of Environmental Information
Acting Inspector General
19
------- |