recommended reading

Watchdog agency cites flaws in DHS cybersecurity program

The Homeland Security Department must strengthen a team that monitors federal computer networks and fully address weaknesses identified during a 2006 cybersecurity drill, a Government Accountability Office official testified during a House hearing on Tuesday.

Comment on this article in The Forum.The United States Computer Emergency Readiness Team could do a better job of "monitoring network activity, analyzing information and investigating anomalies to determine whether they are threats, warning appropriate officials with timely and actionable threat and mitigation information, and responding to the threat," David Powner, director of information technology management issues at GAO, told the House Homeland Security Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology.

The DHS team, established in 2003 to analyze cyber threats and disseminate warning information, has failed to conduct predictive cyber analysis to identify and protect against future threats, encourage information sharing among government and private sector entities, and manage its workload, Powner testified.

Homeland Security plans to fix these shortcomings through enhancements to Einstein, an automated system that collects, correlates, analyzes and shares computer security information with US-CERT, wrote Jerald Levine, director of the Homeland Security GAO Liaison Office, in response to a report (GAO-08-855) accompanying the testimony.

"We recognize that cyber threats are growing and are increasing in sophistication and accuracy," Levine stated. "US-CERT is continuously working to establish more effective outcome measures that will inform our program delivery and focus our resources on the most prevalent and highest risk issues."

GAO also criticized Homeland Security for failing to address vulnerabilities highlighted during the original February 2006 Cyber Storm exercise. The drill, which simulated a large-scale cyberattack involving federal, state and foreign governments, and private industry, identified eight areas that needed improvement: interagency coordination, contingency planning, risk assessment, assigned roles and responsibilities, integrated detection and response, access to information, strategic communications and the exercise itself.

"While DHS has demonstrated progress in addressing the lessons it learned from its first Cyber Storm exercise, more remains to be done to fully address the lessons," GAO stated in a second report (GAO-08-825).

Of the 66 remedial steps outlined, Homeland Security has completed 43, started 16 and planned seven, according to the September report. While DHS has set deadlines for its planned activities, it has not established goals for completing its ongoing efforts.

Unfinished measures include establishing secure communications with international partners, coordinating standard procedures for information sharing and analysis, developing an emergency continuity of operations plan, and enforcing proper protocol for classified information.

"Until DHS schedules and completes its planned corrective activities, the agency risks wasting resources on subsequent exercises that repeat the lessons it learned in its first exercise," the report stated. Cyber Storm II was conducted in March 2008.

In response, Homeland Security officials noted that certain activities are best addressed incrementally. This is particularly true of corrective actions that require coordination with stakeholders outside the department, they said.

Threatwatch Alert

Accidentally leaked credentials / Software vulnerability

Cloudflare Bug Leaked Passwords, Dating Chats and Other Sensitive Info for Months

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.