recommended reading

How Do Agencies Feel About iCloud?

gst/Shutterstock.com

Clarification: This post has been updated to clarify that NASA shared concerns about iCloud in response to Nextgov's inquiries, not in response to the alleged hacking of celebrity accounts.

The investigation into the exact nature of potential security gaps in Apple's iCloud that led to the leaks of explicit images of pop stars over the weekend remains ongoing.

But many federal agencies have given the personal cloud service a wide berth for years.

In response to the purported hacks, Nextgov reached out to a handful of agencies to see if they had policies in place limiting access to iCloud -- which is enabled by default to automatically back up a user's device over Wi-Fi every day, according to Apple -- on both government-owned and employees' personal devices.

As reported earlier this week, federal employees who work on their personally owned iPhones could be inadvertently leaking office photos and GPS coordinates of undisclosed federal facilities, among other internal material.

On Thursday, NASA officials provided additional information about their long-held policies regarding iCloud. 

"The iCloud capabilities create data security concerns for NASA for several reasons, including the fact that the syncing features require the caching of information on Apple servers," NASA spokeswoman Sonja Alexander on Thursday told Nextgov in a statement. "Enabling features of iCloud can cause unintended co-mingling of NASA data and personal data on these devices, potentially leading to exfiltration of sensitive data to non-NASA devices and/or Apple servers."

In 2011, it was recommended the service not be approved for storing and processing NASA data, agency officials said.

Cracking open iCloud accounts -- though the exact nature of the hack is still unknown -- has proven to be not impossible, as evidenced by the explicit images of Academy Award winner Jennifer Lawrence now floating around the Internet.

Some agencies, such as the General Services Administration, remotely ban iCloud use on personal -- commonly called Bring-Your-Own-Device -- phones. GSA relies on a "mobile device management” system that links with each iPhone to deactivate the service. 

NASA is in the process of installing mobile management software that would do the same for its employees, Alexander said. 

She added, "We are always concerned with the protection of government information, whether via iCloud or other storage sites, and stress that importance through ongoing IT security awareness training, continuous monitoring and other assessments."

The space agency has fallen victim to data breaches multiple times, including the theft of a laptop in March 2011 that contained formulas used to control the International Space Station. 

(Image via gst/Shutterstock.com)

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.