recommended reading

Agencies Still Plugging Gaps in Smart Card Security


The Department of Health and Human Services was too lax in issuing smart ID cards to new employees and failed to deactivate them in a timely manner when workers left the agency, according to a new audit from the department’s inspector general office.

Personal identity verification, or PIV, smart cards allow agency employees and contractors to access both federal facilities and agency networks and are a key part of the 2004 Homeland Security Presidential Directive-12, which required a common ID credential for federal personnel.

Agencies have now taken most of the big steps toward HSPD-12 implementation, but the latest audit reveals some are still vexed by plugging all the gaps in the process, according to security experts.

All told, the HHS IG detailed a total of six shortcomings with the agency’s handling of smart cards, five of them deemed “high risk.”

For example, the agency lacked controls to ensure it met all requirements for issuing credentials and didn’t do enough to make sure employees responsible for assigning the smart cards had undergone the proper training.

As of last month, HHS had issued more than 109,000 PIV cards -- about 76,000 to employees and the remainder to contractors, according to a progress update on the agency’s website.

The IG also found fault with the agency’s handling of the system that stores PIV information. The system’s firewall configuration policies didn’t comply with the agency’s own policies and workstations used by employees responsible for issuing PIV cards lacked the proper controls to ensure they were protected by anti-virus software and properly patched.

The report is short on specifics, "due to the sensitive nature of the specific findings identified."

The agency’s Office of Security and Strategic Information concurred with 14 of the 18 recommendations laid out by the IG and said it would take steps to address the issues identified in the audit.

‘The Major Moving Parts are in Place’

Probably the most concerning finding from the IG is the failure to quickly deactivate cards of employees who have left the agency, said April Resnick, a manager in the defense and security practice of Big Sky Associates. Her company has helped agencies comply with HSPD-12 mandates, although Big Sky has not consulted with HHS, she said.

The problem is that even though an agency may have a policy for deactivating cards, the lines of authority may be unclear. And even when clarity isn’t an issue, these functions are often carried out by employees in the field and something may be lost in translation, she said.

"I think the way to address that risk would be to really look at where these gaps are and either put together more clear standard operating procedures and not just leave it to the discretion of the local level or to do some kind of automation that really error proofs it," Resnick said.

HHS is far from the only agency to struggle with fully implementing HSPD-12 mandates. In 2012, an Energy Department IG audit reported Energy was not yet fully compliant with HSPD mandates even after a seven-year, $15 million effort. The year prior, the Government Accountability Office found uneven implementation across agencies. One of the concerns then was that despite the new technology enabled by smart PIV cards, some agencies were still using them like basic ID badges.

But the good news is that many agencies appear to have moved past through those growing pains.

"The major moving parts are in place," Resnick said. "What we're seeing here is just representative of closing the last few gaps.”

(Image via Tashatuvango/

Threatwatch Alert

Stolen laptop

3.7M Hong Kong Voters' Personal Data Stolen

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.