Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Analysis: FISMA not real security measure
by Shaun Waterman
Washington (UPI) Dec 16, 2008


disclaimer: image is for illustration purposes only

An audit of information security at the Department of Justice says that though the agency got an A-plus rating under federal standards, those measure only processes on paper and that, in reality, no one knows how secure computers in the department -- and, by extension, the rest of the federal government -- are.

The audit, by Justice Department Inspector General Glenn A. Fine, also noted that the department "lacks effective methodologies … for maintaining an inventory of devices connected to the department's various (information technology) networks."

The Federal Information Security Management Act of 2002 says all federal departments and agencies must conduct yearly assessments to measure their compliance with information security standards in the act.

In May the Justice Department's compliance was rated A-plus by the U.S. House Committee on Oversight and Government Reform.

But FISMA mandates, as the inspector general's report noted, are primarily concerned with ensuring that all agencies "have policies and procedures to enhance the security of information in their IT systems."

The Justice Department's A-plus grade, therefore, "did not assess whether the Department has actually implemented these processes, nor did it assess the actual security of the Department's IT systems."

"Unfortunately, FISMA has become a compliance exercise," said Shannon Kellogg, director of information security policy for EMC Corp. As a result, he said, "even if an agency receives a good grade, it does not mean that that agency has significantly reduced risks to information security or reduced the number of serious cyber incidents."

Moreover, as the inspector general's report pointed out, although the department had a FISMA-mandated process for conducting regular assessments of vulnerabilities, it "had not fully implemented the policies and procedures intended to remediate identified vulnerabilities."

"These vulnerabilities increase the risk of unauthorized users gaining access to department IT systems and potentially compromising sensitive department information," said Fine in a statement, adding that the department "has struggled to mitigate these vulnerabilities after they are identified."

Details of most of the vulnerabilities were redacted from the report, but auditors did say in a footnote that anti-virus software on department computers was often out of date.

The department, in its response to the report, published Friday, concurred with the findings and recommendations. It stated that, since the audit was conducted, it had already fulfilled one of the recommendations -- for real-time monitoring of department computer networks -- by establishing a security operations center. It also said the complete inventory of devices connected to the department's networks was under way and would be completed next month.

But the report nevertheless raises the question of how to measure IT security on U.S. government systems -- an issue that has dogged officials for years and continues to be a concern, given the thousands of attacks on such networks every year by hackers, spies and potential enemies.

FISMA long has been derided by critics as promoting a "tick the box" approach to IT security.

The Justice Department has had "terribly damaging cyberattacks that were made possible because the agency had spent its budget on FISMA reporting instead of on critical security improvements," Alan Paller, director of research at the SANS Institute, a non-profit cybersecurity research group, told UPI.

"It measures compliance, it measures process, it doesn't measure outcomes," added one IT security industry executive who asked not to be quoted by name. "That is the approach bureaucrats love."

But this process-oriented approach to federal IT security recently has been challenged, in part by a new initiative being promoted by former U.S. Air Force Chief Information Officer John M. Gilligan. The Consensus Audit Guidelines, as they are known, promote an approach that focuses on fixing vulnerabilities in federal networks that hackers most frequently exploit.

"Let's figure out what are the vulnerabilities being exploited and fix those first," Gilligan told a recent IT security conference in Washington, "There should be a focus in the investment on what delivers the greatest payout."

The guidelines promote a "defense that is informed by the offense," added Paller. "You need to address the known bads first."

Paller called the guidelines "a game changer." They will be submitted for public review next year and then be taken up by the White House Office of Management and Budget.

Even FISMA's defenders acknowledge that it needs overhauling, and the Senate Homeland Security and Governmental Affairs Committee approved an updated version of the law in October, which staffers say the committee will be pushing next year.

"The law is now six years old, the threats have evolved, and FISMA needs an overhaul," Kellogg told UPI.

"The incoming Congress should make FISMA reform a priority. We can't afford to address today's quickly changing threats with a legal framework that is six years old. ... There is pretty broad consensus on that point."

The new law seeks to refocus information security efforts on performance and risk management; gives more power to department chief information security officers; and mandates independent annual audits of compliance, rather than the current departmental evaluations.

Gilligan says those changes would dovetail with the Consensus Audit Guidelines.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
China defends censoring websites that break rules
Beijing (AFP) Dec 16, 2008
China defended Tuesday the blocking of websites it said violated Chinese law and urged Internet companies to respect its legal system. "The Chinese government conducts necessary management over the Internet. It is the same with other nations," foreign ministry spokesman Liu Jianchao told journalists. "You cannot deny, some websites actually contain content that violates China's laws." ... read more


CYBER WARS
Papua New Guinea tidal waves displace 75,000: UN

Macao's University To Analyze Data From China's Moon Probe

Biggest Full Moon Of The Year

China's First Moon Probe Lowers Orbit For Further Exploration

CYBER WARS
Possible Explanation For Migration Of Volcanic Activity On Mars

Phoenix Site On Mars May Be In Dry Climate Cycle Phase

European Mars500 Participants Announced

Important Role Of Groundwater Springs In Shaping Mars

CYBER WARS
A New Vision For People In Space

NASA Science Highlights At The AGU Meeting

Space Mission Commander Gives Clues On First Hong Kong Astronaut

India, Russia sign nuclear energy, space deals

CYBER WARS
China To Launch New Remote Sensing Satellite

HK, Macao Scientists Expected To Participate In China's Aerospace Project

China's Future Astronauts Will Be Scientists

China Launches Remote Sensing Satellite

CYBER WARS
A Station Celebration

NASA Signs Modification To Contract With Russian Space Agency

New Russian Space Freighter Docks With World Orbital Station

ESA wants International Space Station to live longer

CYBER WARS
Arianespace's Sixth Ariane 5 Of 2008 Completes Assembly

China Launches Yaogan V Remote-Sensing Satellite

ILS Proton Successfully Launches Ciel II Satellite

Final Payload Integration Begins On Ariane 5's Sixth Flight Of 2008

CYBER WARS
Planets Living On The Edge

Watching For Wobbles

Planet Formation Could Lie In Stellar Storms Rather Than Gravitational Instability

Ball Aerospace Completes Environmental Testing For Kepler Mission

CYBER WARS
Eliminating Space Debris - The Quest Continues

HP offering aims at penny-pinching IT departments

First Muslim-friendly virtual world goes online

Computer industry celebrates 40 years




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement