recommended reading

Agencies Still Plugging Gaps in Smart Card Security


The Department of Health and Human Services was too lax in issuing smart ID cards to new employees and failed to deactivate them in a timely manner when workers left the agency, according to a new audit from the department’s inspector general office.

Personal identity verification, or PIV, smart cards allow agency employees and contractors to access both federal facilities and agency networks and are a key part of the 2004 Homeland Security Presidential Directive-12, which required a common ID credential for federal personnel.

Agencies have now taken most of the big steps toward HSPD-12 implementation, but the latest audit reveals some are still vexed by plugging all the gaps in the process, according to security experts.

All told, the HHS IG detailed a total of six shortcomings with the agency’s handling of smart cards, five of them deemed “high risk.”

For example, the agency lacked controls to ensure it met all requirements for issuing credentials and didn’t do enough to make sure employees responsible for assigning the smart cards had undergone the proper training.

As of last month, HHS had issued more than 109,000 PIV cards -- about 76,000 to employees and the remainder to contractors, according to a progress update on the agency’s website.

The IG also found fault with the agency’s handling of the system that stores PIV information. The system’s firewall configuration policies didn’t comply with the agency’s own policies and workstations used by employees responsible for issuing PIV cards lacked the proper controls to ensure they were protected by anti-virus software and properly patched.

The report is short on specifics, "due to the sensitive nature of the specific findings identified."

The agency’s Office of Security and Strategic Information concurred with 14 of the 18 recommendations laid out by the IG and said it would take steps to address the issues identified in the audit.

‘The Major Moving Parts are in Place’

Probably the most concerning finding from the IG is the failure to quickly deactivate cards of employees who have left the agency, said April Resnick, a manager in the defense and security practice of Big Sky Associates. Her company has helped agencies comply with HSPD-12 mandates, although Big Sky has not consulted with HHS, she said.

The problem is that even though an agency may have a policy for deactivating cards, the lines of authority may be unclear. And even when clarity isn’t an issue, these functions are often carried out by employees in the field and something may be lost in translation, she said.

"I think the way to address that risk would be to really look at where these gaps are and either put together more clear standard operating procedures and not just leave it to the discretion of the local level or to do some kind of automation that really error proofs it," Resnick said.

HHS is far from the only agency to struggle with fully implementing HSPD-12 mandates. In 2012, an Energy Department IG audit reported Energy was not yet fully compliant with HSPD mandates even after a seven-year, $15 million effort. The year prior, the Government Accountability Office found uneven implementation across agencies. One of the concerns then was that despite the new technology enabled by smart PIV cards, some agencies were still using them like basic ID badges.

But the good news is that many agencies appear to have moved past through those growing pains.

"The major moving parts are in place," Resnick said. "What we're seeing here is just representative of closing the last few gaps.”

(Image via Tashatuvango/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.