Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome.org cryptome.info jya.com eyeball-series.org cryptome.cn


29 August 1999
Source: http://www.access.gpo.gov/su_docs/aces/aaces002.html


DOD Information Security: Serious Weaknesses Continue To Place Defense
Operations at Risk (Letter Report, 08/26/1999, GAO/AIMD-99-107).

GAO updated its previous report on the security of the Department of
Defense's (DOD) information systems, focusing on DOD's efforts to: (1)
address specific weaknesses identified in GAO's 1996 reports; and (2)
develop a comprehensive departmentwide information security program.

GAO noted that: (1) serious weaknesses in DOD information security
continue to provide both hackers and hundreds of thousands of authorized
users the opportunity to modify, steal, inappropriately disclose, and
destroy sensitive DOD data; (2) these weaknesses impair DOD's ability
to: (a) control physical and electronic access to its systems and data;
(b) ensure that software running on its systems is properly authorized,
tested, and functioning as intended; (c) limit employees' ability to
perform incompatible functions; and (d) resume operations in the event
of a disaster; (3) as a result, numerous DOD functions, including
weapons and supercomputer research, logistics, finance, procurement,
personnel management, military health, and payroll, have already been
adversely affected by system attacks or fraud; (4) GAO's review found
that some corrective actions have been initiated in response to the
recommendations GAO's 1996 reports made to address pervasive information
security weaknesses in DOD; (5) however, progress in correcting the
specific control weaknesses identified during GAO's previous reviews has
been inconsistent across the various DOD components involved and
weaknesses persist in every area of general controls; (6) accordingly,
GAO reaffirms the recommendations made in its 1996 reports; (7) the DOD
component activities GAO evaluated generally did not have effective
processes for identifying and resolving information security weaknesses;
(8) however, the Defense Information Systems Agency (DISA) which
operates the Defense Megacenters (DMC), has established and is
implementing a comprehensive security review process; (9) DISA developed
Standard Technical Implementation Guides (STIG), which prescribe clear
and detailed standards for configuring its systems software; (10) also,
DISA's Security Readiness Review process enables it to test DMC
compliance with the STIGs and other DISA security standards, track the
weaknesses identified by the testing, and monitor and report on efforts
to correct them; (11) DOD announced in January 1998 its plans for a
Defense-wide Information Assurance Program (DIAP) under the jurisdiction
of the DOD Chief Information Officer to provide a comprehensive,
departmentwide information security program; and (12) in December 1998,
DOD also implemented the Joint Task Force for Computer Network Defense,
which DOD expects will support the DIAP by monitoring DOD's computer
networks and defending against hacker attacks and other unauthorized
access.

--------------------------- Indexing Terms -----------------------------

 REPORTNUM:  AIMD-99-107
     TITLE:  DOD Information Security: Serious Weaknesses Continue To
	     Place Defense Operations at Risk
      DATE:  08/26/1999
   SUBJECT:  Information resources management
	     Computer crimes
	     Computer security
	     Confidential communication
	     Internal controls
	     Information systems
	     Data integrity
	     Computer software
	     Computer software verification and validation
IDENTIFIER:  Military Retirement Trust Fund
	     DOD Defense Information Assurance Program

******************************************************************
** This file contains an ASCII representation of the text of a  **
** GAO report.  This text was extracted from a PDF file.        **
** Delineations within the text indicating chapter titles,      **
** headings, and bullets have not been preserved, and in some   **
** cases heading text has been incorrectly merged into          **
** body text in the adjacent column.  Graphic images have       **
** not been reproduced, but figure captions are included.       **
** Tables are included, but column deliniations have not been   **
** preserved.                                                   **
**                                                              **
** Please see the PDF (Portable Document Format) file, when     **
** available, for a complete electronic file of the printed     **
** document's contents.                                         **
**                                                              **
** A printed copy of this report may be obtained from the GAO   **
** Document Distribution Center.  For further details, please   **
** send an e-mail message to:                                   **
**                                                              **
**                    <info@www.gao.gov>                        **
**                                                              **
** with the message 'info' in the body.                         **
******************************************************************
ai99107 GAO United States General Accounting Office

Report to the Secretary of Defense

August 1999 DOD INFORMATION SECURITY

Serious Weaknesses Continue to Place Defense Operations at Risk

GAO/AIMD-99-107

  GAO/AIMD-99-107

Page 1 GAO/AIMD-99-107 DOD Information Security United States
General Accounting Office

Washington, D. C. 20548 Accounting and Information Management
Division

B-282190 Letter August 26, 1999 The Honorable William S. Cohen The
Secretary of Defense

Dear Mr. Secretary: The Department of Defense (DOD) relies on a
vast and complex information infrastructure to support critical
operations such as designing weapons, identifying and tracking
enemy targets, paying soldiers, mobilizing reservists, and
managing supplies. Indeed, its warfighting capability depends upon
computer- based telecommunications networks and information
systems. In recent years, numerous internal and external
evaluations have identified weaknesses in information security
that could seriously jeopardize DOD's operations and compromise the
confidentiality, integrity, or availability of sensitive
information. This report summarizes the results of our latest
review of information security at DOD. In May 1996, we reported
that external attacks on DOD computer systems were a serious and
growing threat.1 According to DOD officials, attackers had
stolen, modified, and destroyed both data and software. They had
installed "back doors" that circumvented normal system protection
and allowed attackers unauthorized future access. They had shut
down and crashed entire systems and networks.

In September 1996, we issued a report, based on detailed analyses
and testing of general computer controls, that identified
pervasive vulnerabilities in DOD information systems.2 We had
found that authorized users could also exploit the same
vulnerabilities that made external attacks possible to commit
fraud or other improper or malicious acts. In fact,

// 1 Information Security: Computer Attacks at Department of Defense
Pose Increasing Risks (GAO/AIMD-96-84, May 22, 1996). 

// 2 General computer controls are the policies and procedures that affect the
overall security and effectiveness of computer systems and
operations, as opposed to being unique to any specific computer
program, office, or operation. General controls include the
organizational structure, operating procedures, software security
features, and physical protection designed to ensure that (1)
access to computer systems and sensitive data is restricted to
prevent unauthorized changes and disclosure, (2) only approved 
changes are made to computer programs, (3) back-up and recovery 
plans are adequate to continue essential operations in the event of 
an emergency, and (4) computer staff duties are properly segregated 
to reduce the risk of undetected errors or fraud.



knowledgeable insiders with malicious intentions could pose a more
serious threat than outsiders since they may be more aware of
system weaknesses and how to disguise inappropriate actions. Our
report highlighted the lack of a comprehensive information
security program and made numerous recommendations for corrective 
actions.3 Subsequent reviews of individual systems also have 
disclosed serious weaknesses in information security. For example, 
we reported in 1997 that our review of the actuarial application 
supporting DOD's Military Retirement Trust Fund disclosed a lack 
of overall security administration and management governing access 
to Fund data files and other files storing sensitive information, 
such as social security numbers, pay rates, child and spousal abuse 
allegations, and medical test results.4 In another example, two 
cases in which employees embezzled nearly $1 million led to our 
1998 review of Air Force's vendor payment system. We identified a 
number of internal control weaknesses, including information security
weaknesses, which leave the Air Force vulnerable to similar
thefts.5

//3 This report was designated Limited Official Use because of the
sensitive information it contained. 

// 4 Financial Management: Review of the Military Retirement Trust Fund's 
Actuarial Model and Related Computer Controls (GAO/AIMD-97-128, 
September 9, 1997). 

// 5 Financial Management: Improvements Needed in Air Force Vendor
Payment Systems and Controls (GAO/AIMD-98-274, September 28,
1998).


Tests conducted by the Joint Chiefs of Staff during the summer of
1997 demonstrated the continuing vulnerability of DOD and civilian
networks to attack. Since then, DOD has acknowledged that it has
continued to identify organized intrusions, indicating that such
activities are an ongoing problem. Because of the risks that 
inadequate information security poses to DOD operations and the 
integrity of its data, we followed up on our previous reviews of 
DOD's general computer controls.6 Our objective was to provide an 
update on the status of corrective actions DOD has taken to (1) 
address specific weaknesses identified in our 1996 reports, in 
particular the September 1996 report and (2) develop a comprehensive
departmentwide information security program.

// 6 Information Security: Computer Attacks at Department of Defense
Pose Increasing Risks (GAO/AIMD-96-84, May 22, 1996) and the
September 1996 Limited Official Use report.

Results in Brief 

Serious weaknesses in DOD information security continue to provide 
both hackers and hundreds of thousands of authorized users the 
opportunity to modify, steal, inappropriately disclose, and destroy 
sensitive DOD data. These weaknesses impair DOD's ability to (1) 
control physical and electronic access to its systems and data, (2) 
ensure that software running on its systems is properly authorized,
tested, and functioning as intended, (3) limit employees' ability
to perform incompatible functions, and (4) resume operations in
the event of a disaster. As a result, numerous Defense functions,
including weapons and supercomputer research, logistics, finance,
procurement, personnel management, military health, and payroll,
have already been adversely affected by system attacks or fraud.

Our current review found that some corrective actions have been
initiated in response to the recommendations our 1996 reports made
to address pervasive information security weaknesses in DOD.
However, progress in correcting the specific control weaknesses
identified during our previous reviews has been inconsistent across 
the various DOD components involved and weaknesses persist in every 
area of general controls. Accordingly, we reaffirm the recommendations 
made in our 1996 reports.

The status of DOD actions to implement those recommendations is
discussed later in this report. The DOD component activities we
evaluated generally did not have effective processes for
identifying and resolving information security weaknesses.
However, the Defense Information Systems Agency (DISA),7 which
operates the Defense Megacenters (DMC), has established and is
implementing a comprehensive security review process. DISA
developed Standard Technical Implementation Guides (STIG), which 
prescribe clear and detailed standards for configuring its system 
software.8 Also, DISA's Security Readiness Review (SRR) process 
enables it to test DMC compliance with the STIGs and other DISA 
security standards, track the weaknesses identified by the testing, 
and monitor and report on efforts to correct them. Thus far, DISA 
has identified and resolved thousands of security weaknesses. At 
the end of our review, however, DISA was still developing guidance 
for configuring some of its system software and had not yet reviewed
security over all of its systems. Moreover, some ongoing weaknesses 
were improperly reported as having been corrected because DISA has 
not always independently verified in a timely manner the corrective 
actions reported by its DMCs.

// 7 DISA is a major provider of telecommunications and
computing services, supporting the military services and other
Defense agencies on a fee-for-service basis. The Defense
Services and other Defense agencies, however, continue to perform
some data processing outside of the DMCs in data processing
centers that are not subject to DISA's security review process. 

// 8 System software includes operating systems, utility software,
program library systems, file maintenance software, security
software, data communications systems, and database management
systems. One set of system software may be used to support and
control a number of user applications.


To provide a comprehensive, departmentwide information security
program, which our September 1996 report recommended, DOD
announced in January 1998 its plans for a Defense- wide
Information Assurance Program (DIAP)9 under the jurisdiction of
the DOD Chief Information Officer (CIO). In February 1999, DOD's
CIO finalized the Implementation Plan for the DIAP that outlines
organizational structure and responsibilities. The program is
still being staffed; DIAP staff will be responsible for creating a
DIAP concept of operations to address the program's operational
structure and processes.

// 9 DOD defines information assurance as information operations that
protect and defend information and information systems by ensuring
their availability, integrity, authentication, confidentiality,
and nonrepudiation. This includes capabilities to protect against,
detect, and react to attacks.


In December 1998, DOD also implemented the Joint Task Force for
Computer Network Defense, which DOD expects will support the DIAP
by monitoring DOD's computer networks and defending against hacker
attacks and other unauthorized access. DISA's security oversight
program and other models for information security management offer
approaches that DOD could adapt and integrate into its
departmentwide program to address threats to information security
not covered by the Joint Task Force. Because DIAP and task force
efforts are at an early stage of development, their ultimate
effectiveness cannot yet be assessed.

In order that the full potential of DISA's security oversight
program, the DIAP, and other DOD IA initiatives can be realized,
we are recommending that (1) the SRR process be expanded to
include timely and independent verification of the corrective
actions reported by DMCs and (2) the DIAP define how its efforts 
will be coordinated with the Joint Task Force and other related 
initiatives.

In commenting on a draft of this report, DOD officials stated that
they generally concurred with the report and its recommendations.
They said that this report adds credence to efforts to heighten
awareness within the DOD community of the serious risks that
accompany poor security practices in information systems. They
noted that DOD is actively working to correct the deficiencies
cited in the report and they believe it is making progress in
reducing the risks to its information systems.

Background 

The DOD information processing environment is large, complex, and 
decentralized. DOD has over 2.1 million computers, over 10,000 
local area networks, and over 100 long- distance networks. Its 
tens of thousands of automated information systems run on a variety
of systems, including mainframe, mid-tier, client-server, and
personal computer-based systems.

Security over these systems involves a number of functional areas.
These include groups and individuals who use and own these
systems, application developers, data center personnel (such as
systems programmers, computer operators, and security managers),
and others who come in contact with computer resources or data.

The owners of application systems and data are those organizations
or individuals responsible for specifying the level of security
required for their operations and supporting information systems,
determining who is given access to their computer applications,
prioritizing critical application programs to be covered by
disaster recovery plans, and protecting their own system passwords
and equipment. Application developers are responsible for managing
software application program changes, ensuring the integrity of
the application, and designing security controls within these
applications consistent with owner requirements. Data center
personnel are responsible for computer operations, system software
configuration and change management, controls over access to data 
and programs at the system level, and some aspects of disaster 
recovery. Managers of the facilities in which these activities take
place are generally responsible to some extent for physical and
environmental security.

In DOD, responsibility for the security of an individual
application, such as a payroll system or weapon system, and its
related data, is typically shared by several organizations. Any
DOD component may be the owner or user of an application.
Application development may be done in- house by the user's
organization or by a central design activity (CDA) on a 
fee-for-service basis. All of the military services and many 
of the Defense agencies, including the Defense Finance and 
Accounting Service (DFAS) and the Defense Logistics Agency (DLA), 
have CDA components. DISA, through its DMCs, is a major provider 
of data processing services for DOD. However, data processing 
services may be provided by the military services and other
DOD components or by a non-DOD service provider. Any of these DOD
components may be a tenant on an installation owned or managed by
another DOD component or government agency. In DISA's case, for
example, each DMC shares the responsibility for physical security
with the host activity of the installation on which it is located.

In DOD, not all responsibilities are clearly assigned, however.
For example, while the data center is responsible for the security
of the system software and the developer for application security,
neither has explicit responsibility for the security and integrity
of the interfaces between operating systems and applications.

Objectives, Scope, and Methodology

To determine the extent to which specific information security
weaknesses identified in our September 1996 report had been
corrected, we tested the effectiveness of corrective actions
taken. Our testing was carried out in four DMCs, three CDAs, and
two customer (i. e., end- user) activities.10 Our original review
was an assessment of general computer controls, which affect the
overall security and effectiveness of an organization's computer
systems and operations rather than being unique to a particular
computer program, office, or operation. Our tests of corrective
actions were limited to those areas in which we had previously 
documented specific weaknesses. We did not test controls that we 
had previously found to be operating effectively. Our audit 
program was based on our Federal Information System Controls 
Audit Manual.11

//10 We are not identifying the specific activities and installations
in which our testing was conducted because of the sensitive nature 
of our findings. These were generally the same activities in which 
our original testing was conducted, although due to organizational 
changes, the unit responsible for a particular computer control had 
in some cases changed. 

//11 GAO/AIMD-12.19.6, January 1999.


We also evaluated DISA's processes for overseeing security in the
DMCs. We compared the scope and content of their Security
Technical Implementation Guides (STIG) for system software with
each other and with external guidance. We documented their Security
Readiness Review (SRR) process and its history, assessed the security 
of the SRR database, and quantified the results of SRRs performed to
date. We also gathered evidence about the reliability of the SRR 
database by testing selected controls that were reported as SRR 
findings and subsequently reported as fixed.

For assistance in testing corrective actions and evaluating DISA's
processes for overseeing security, we contracted with
PricewaterhouseCoopers LLP. We determined the scope of the
contractor's audit work, monitored its progress, and reviewed the
related workpapers to ensure that the resulting findings were
adequately supported.

To determine the extent to which DOD had developed and implemented
a departmentwide information security program, we examined the
management and the implementation plans for the Defense- wide
Information Assurance Program and monitored Defense's progress
through the end of our fieldwork. We also received briefings on
the new Joint Task Force for Computer Network Defense and
interviewed DOD officials to learn about departmentwide initiatives
related to our recommendations. At each test location, we briefed 
management on the results of our fieldwork at that location. We also
briefed DOD officials on the results of our fieldwork at all 
locations. We requested comments on a draft of this report from 
the Secretary of Defense or his designee. On July 16, officials
of the Infrastructure and Information Assurance Directorate of the
Office of the Secretary of Defense provided us with oral comments
that are discussed in the Agency Comments and Our Evaluation
section of our report. Our work was performed from October 1997
through February 1999 in accordance with generally accepted
government auditing standards.

Limited Progress in Correcting General Control Weaknesses

Our 1996 reports identified pervasive information security
weaknesses in DOD and made recommendations for correcting them.
While some corrective actions had been initiated to address our
recommendations, our current review found that weaknesses
persisted in every area of general controls.

Among the DOD components evaluated, only DISA had begun to
establish a comprehensive process to identify and resolve
information security weaknesses. DISA was issuing technical
guidance to establish minimum standards for configuring system 
software and was implementing systematic entitywide inspections 
to monitor the effectiveness of computer controls. As a result, 
DISA had identified and resolved thousands of control weaknesses.

Control Weaknesses Persist 

In our current review we found that significant DOD information 
security weaknesses in general computer controls persisted for all 
the components evaluated, including DISA. The following sections 
give examples illustrating the types of weaknesses we found in 
access controls, application software development and change 
controls, segregation of duties, system software controls, and 
service continuity controls.

Access Controls 

Access controls limit or detect inappropriate access to computer 
data, programs, facilities, and equipment to protect these resources
against unauthorized modification, disclosure, loss, or impairment.
Access controls include physical protections, such as gates and 
guards, and logical controls, which are built into software to 
authenticate users (through passwords or other means) and to 
restrict their access to certain data, programs, transactions, or 
commands. DOD policy states that access to automated information 
systems should be restricted based on one's need-to-know.

We found, however, that users were granted access to computer
resources that exceeded what they required to carry out their job
responsibilities, including sensitive system privileges for which
they had no need. On one system, systems support personnel had the
ability to change data in the system audit log. On three systems,
we tested the accounts of 12 users having access to a command that
would allow them to substitute an unauthorized data file for a
legitimate file. Seven out of 12 did not have a need to use this
command. We also found user accounts that had certain privileges
including sensitive security administration privileges for which
no evidence of authorization was available. Access authorization
was poorly documented or undocumented for users at every site;
management estimated that on one system more than 20,000 users
were not authorized in writing.

Periodic review of user access privileges and monitoring of
security violations and the use of powerful commands, utilities,
and changes to sensitive files and records (such as user access
profiles) are essential to preventing and detecting unauthorized
activity. However, we found at every location we visited that
there was inadequate periodic review of user access privileges to
ensure that those privileges continued to be appropriate. Also,
while the logging of security violations and access to
sensitive resources had improved, these audit logs were not being
consistently reviewed. Similarly, we found that data processing
customers were not updating users' access levels to reflect
changes in their access requirements or to cancel the access of 
terminated employees. 

Password management, though improved, was still weak in some
areas. Users were not required to change their passwords often
enough and in some cases were never required to change their
passwords. Users were not prevented from using easily guessed 
passwords. These practices increase the risk that passwords will 
be guessed and systems will be compromised. User accountability 
was also weakened by the use of generic (group) user accounts, 
wherein a single account is used by two or more users, contrary 
to DISA standards. In the case of one generic user account having
system privileges, not only was the password known to multiple 
users, but it was neither encrypted in the system nor required 
to be changed periodically.

Application Software Development and Change Controls

Application software development and change controls prevent
unauthorized programs or modifications to programs from being
implemented to ensure that the software functions as intended.
Program change control policies and procedures include review and
approval of application change requests, independent review and
testing of program changes, documentation of program changes, and
formal authorization to implement those changes, along with the
access controls necessary to ensure that these objectives are met.
We found that structured methodologies for designing, developing, and
maintaining applications were inadequate or nonexistent. There was
no requirement for users to document the planning and review of
application changes and to test them to ensure that the system
functioned as intended. Also, application programs were not
adequately documented with a full description of the purpose and
function of each module, which increases the risk that a developer
making program changes will unknowingly subvert new or existing 
application controls. One fundamental technique of program change 
control is the use of two or more computer processing environments
to segregate the test and development versions of application 
programs and data from the production resources (those versions 
approved and currently being used by the data processing customer).
We found that application programmers, users, and computer 
operators had direct access to production resources,
increasing the risk that unauthorized changes to production
programs and data could be made and not detected. On one system,
74 user accounts had privileges enabling them to change program
code without supervisory review and approval. This number had
increased from the 37 users that we had documented in our earlier
review. According to management, only four people should have this 
authority. On another system, nearly 300 programmers could alter 
production programs and data.

Segregation of Duties 

Segregation of duties refers to the policies, procedures, and 
organizational structure that help to ensure that one individual 
cannot independently control all key aspects of a process or 
computer-related operation and thereby conduct unauthorized 
actions without detection. As an example, a computer programmer 
should not be allowed to independently write, test, and approve 
program changes. In the information processing environment, the 
duties and access capabilities of systems programmers, application
programmers, security administrators, and end-users, for example, 
should generally be segregated from one another. Duties in the DOD
computing environment were not adequately segregated. We found that 
personnel were still assigned both systems programming and security
administration duties. These individuals could make unauthorized 
changes to programs and data while using their security privileges
to disable the system's capability to create an audit trail of 
those changes. Thus they could, for example, modify payroll records
or shipping records to generate unauthorized payments or to 
misdirect inventory shipments and suppress the related system audit
data to avoid detection.

System Software 

System software controls limit and monitor access to the powerful 
programs and sensitive files associated with the computer systems 
operation. System software helps control and coordinate the input, 
processing, output, and data storage associated with all of the 
applications that run on the system. Some system software can 
change data and program code without creating an audit trail or 
can be used to modify or delete audit trails.

Improperly configured or poorly maintained system software can be
exploited to circumvent security controls to read, modify, or
delete critical or sensitive data or programs. It can also be used
to gain privileges to conduct unauthorized transactions or to 
circumvent edits or other controls built into application programs.
For these reasons, system software vulnerabilities are a common 
target of hackers, both internal and external to the entity. As a 
result, most entities have a separate set of procedures for 
controlling system software. We found end-users had been given 
unnecessary (and in some cases unauthorized) access to system 
functions, tools, and data. For example, users could read system 
data files containing information useful to hackers. On four systems,
users could view other users' output, which could include sensitive
or confidential information. On one system, end-users had the 
capability to issue commands that would allow them to disrupt all 
processing on that system. As with other groups of users, the 
activities and access privileges of users with sensitive system 
privileges were not adequately monitored.

We also found system software maintenance issues which create
security exposures. For example, we found system libraries for
privileged programs (i. e., programs that are allowed to perform
powerful system functions) that contained the names of nonexistent
programs. By creating a new program with the same name as one of
these nonexistent members, a user could install malicious code
with the authority to make changes to the operating system, the
security software, and user programs or data and to delete audit
logs. We found that one site was running a proprietary mainframe
operating system and other system software products that were
no longer supported by the vendor. Management informed us that
such software was needed to support application programs that had
not yet been upgraded to run on a current version of the operating
system. This site was also running programs that were
undocumented. These practices increase the risk that security
vulnerabilities or other problems will not be detected
or corrected. 

Service Continuity Controls 

Service continuity controls ensure that when unexpected events 
occur, critical operations continue without undue interruption and 
critical and sensitive data are protected. A well-documented plan 
for disaster recovery and continuity of operations, based upon an 
up-to-date risk analysis and periodic testing, is critical to 
ensure that an organization can continue to fulfill its mission 
while responding to natural disasters, accidents, or other major 
and minor interruptions in data processing.

We found mission-related applications and the activities they
support that are at risk because of inadequate planning for
service continuity. Although DISA recommends nightly back-up of
high-activity application data files, some information processing
customers did not require that their application data be backed up
frequently enough to ensure effective mission support after a 
service disruption. This increases the risk that some data cannot 
be restored, particularly as temporary data files may not exist at 
the time the full system back-up is done, which is typically once 
a week. Also, although DISA requires that back-up tapes be stored 
at least 25 miles, and preferably 100 miles, from the processing 
site, we noted that one DMC was storing back- up tapes only 14 
miles from the data center without having obtained a waiver from 
DISA. This increases the risk that both the back-up tapes and the 
data center could be affected by the same emergency. We found that 
disaster recovery plans were incomplete and did not specify the 
order in which the customer's applications (or the programs within 
a particular application) should be restored. This increases the 
risk that relatively trivial functions may be restored before those 
that are most critical to the user's mission. One plan assumed the
availability of hardware which was not on-site and was still in 
the procurement process.

Many DISA customers had not tested their recovery procedures or
had not tested them under the conditions likely to prevail in the
event of a disaster. These weaknesses increase the risk that the
organization may fail in its mission or incur unnecessary expense
as the result of a prolonged service interruption.

Progress in Addressing Security Weaknesses Varied Among DOD
Organizations

Although each of the activities we evaluated had made some
progress in addressing the individual weaknesses identified in our
1996 report, only DISA was implementing a comprehensive process
for identifying, tracking, and resolving weaknesses within its
jurisdiction. While implementation of this process was not yet
complete, DISA had already identified and resolved thousands of
specific control weaknesses.

In 1994, DISA created a task force to assess the security posture
of its DMCs. This task force created an inspection checklist and a
database to capture, track, and analyze its findings. The task
force conducted system reviews and physical/ environmental
reviews, which have evolved into DISA's Security Readiness Review 
(SRR) process. DISA has steadily increased the number of security 
reviews performed. By the end of November 1998, DISA had completed
542 SRRs, generated a total of 14, 860 findings, and reported that
11,418 of these findings had been corrected.

As DISA began implementing its SRR process, it also began drafting
detailed technical guidance for individual systems, known as
Security Technical Implementation Guides (STIG), which specify minimum
standards for managing system software security. STIGs cover
topics such as organizational relationships and responsibilities
and the management processes and technical requirements needed to
ensure hardware integrity, system software integrity, and data-
level integrity. They define the requirements for interfacing the 
various components of system software and include such details as 
specific configuration options to be used, password management, 
testing requirements, and permissible levels of access to system 
resources. Most importantly, all DMC systems are subject
to SRRs and DMC management is accountable for the findings
generated. DISA officials and staff report that correcting SRR
deficiencies is given a high priority because the status of SRR
findings is a part of each DMC director's or commander's readiness
report.

DISA has published STIGs for most of its systems and expects to
have performed SRRs of all its systems before the end of 1999.
Additional action, however, is needed to improve DISA's oversight
of information security. For example, while the DISA inspector
will generally verify any corrective action taken while he or she
is still on-site, subsequent corrective actions
are reported in the SRR database as having adequately addressed
deficiencies even though the actions may not be verified until the
next regularly scheduled inspection, which may be 15 to 36 months
later. We found that this practice has resulted in some
inaccuracies. We tested 55 deficiencies that were accepted as fixed
in the SRR database and determined that about one-fourth had not 
been corrected. For example, several DMCs had reported that their
system software configuration options had been changed to conform 
to DISA requirements, and the SRR database had been updated 
accordingly. However, our testing showed that the options in 
question were not in compliance with DISA standards. We did not 
attempt to determine whether these inconsistencies were the result
of oversights, misrepresentations, or other factors. DISA officials
agreed that more timely, independent verification of corrective actions
is desirable and reported that they were exploring ways to address
this issue.

Other DOD components had not made similar progress in instituting
an effective oversight process. The modest improvements that these
components had made were the result of individual and isolated
command or unit actions rather than comprehensive service, agency,
or department actions.

DOD Has Developed But Not Yet Implemented a Departmentwide
Information Security Program

As stated in our executive guide on information security
management,12 a well-designed and well-managed information
security program with senior-level support is essential for
ensuring that an agency's controls are, and continue to be,
appropriate and effective. The program should establish a process
and assign responsibilities for systematically (1) assessing risk,
(2) developing and implementing effective security policies and
related control techniques, (3) promoting user awareness of
security issues, (4) monitoring the appropriateness and
effectiveness of these policies and techniques, and (5) providing
feedback to managers who may then make needed adjustments. It
should also establish a central management focal point for
information security. This focal point functions as a facilitator 
and a conduit for information. It may also be a central resource 
for activities such as security training. Such a program can 
provide senior officials a means of managing information security 
risks and the related costs rather than just reacting to individual
incidents. 

//12 Information Security Management: Learning From Leading
Organizations (GAO/AIMD-98-68, May 1998).


In 1996, we reported that DOD lacked a departmentwide information 
security program to comprehensively address the general control 
weaknesses we had identified. We made a number of recommendations
related to establishing such a program. DOD agreed with our
recommendations and issued plans for the Defense- wide Information
Assurance Program (DIAP), which is to provide the framework for a
comprehensive information security program. It is too early to
assess when, whether, or how effectively the provisions of the
DIAP management and implementation plans will be implemented and
coordinated with other related efforts or whether the DIAP will
ultimately succeed in ensuring adequate information security 
throughout DOD. 

Earlier Recommendations for Establishing a Departmentwide Information
Security Program

The 10 recommendations in our September 1996 report to the
Secretary of Defense, the DISA Director, and the CIOs of the
military departments and other Defense agencies were aimed at
empowering the DOD CIO to establish a comprehensive,
departmentwide information security program;  ensuring that
security programs of the military departments and Defense agencies 
are consistent with the department program; and periodically 
reporting on progress in improving controls over information security.

DOD concurred with these recommendations and committed to
resolving the issues and implementing the recommendations. The
department has reported that corrective actions are in progress
for each of these recommendations. The full text of the 
recommendations appears in appendix I.

Departmentwide Information Security Program Being Developed

At the time of our current review, DOD was developing but had not
yet implemented a departmentwide security program in response to
the recommendations in our earlier reports. On January 30, 1998,
the Deputy Secretary of Defense approved the Defense- wide
Information Assurance Program (DIAP) and distributed a DIAP
management plan to senior DOD officials. The Implementation Plan
for the DIAP, which was finalized on February 12, 1999, describes 
at a high level the program's goals, objectives, and organizational
structure. DIAP staff will be responsible for creating a DIAP 
concept of operations to address the program's operational 
structure and processes. The program is still being staffed.

The DIAP integrates component information assurance (IA)
activities into a single program under the DOD CIO, combining
centralized oversight with decentralized execution. The DIAP staff
will carry out the planning, programming, budgeting, and review of
all IA activities throughout DOD. All IA investments and
expenditures will be reported as part of the DIAP budget beginning
in fiscal year 2000. DOD components will be responsible for
carrying out their portions of the DIAP annual plan and for
reporting on their activities to the Director of Information
Assurance, who in turn reports to the DOD CIO.

DIAP planning documents, which incorporate at a high level most of
the best practices associated with successful information security
management, indicate that DOD recognizes and is attempting to establish
the departmentwide management structure needed to manage the
complex information security risks associated with its heavy
reliance on interconnected computer systems. For example, because
the DIAP is an integrated program under the DOD CIO, it provides a
central focal point for identifying risks affecting multiple
Defense components and coordinating the selection, funding, and
implementation of appropriate mitigating controls.

The DIAP also establishes a Senior DIAP Steering Group composed of
representatives from the services, Joint Staff, National Security
Agency, and DISA. Thus, it involves senior management officials
responsible for mission- related operations and assets as well as
technical security specialists to help ensure that the related
information security risks are fully understood and that an 
appropriate level of resources is provided to mitigate them.

DIAP plans call for development of performance measures and an
annual IA operational assessment, both prerequisites for effective
feedback and reporting. They also call for an annual review of
DIAP goals and related service and Defense agency plans, which is
important to identify new risks, threats, and countermeasures to
ensure that controls remain appropriate and effective. As DOD
develops operating policies and procedures to support the DIAP, 
it can draw upon the existing information security guidance and 
best practices being used by other organizations, which define 
basic elements needed to provide effective feedback on information 
security controls. For example, our Federal Information System 
Controls Audit Manual defines information system control objectives
and provides a framework for assessing the effectiveness of those controls.
Similarly, DISA's SRR and STIG compliance process provides a model
for testing to determine if controls are functioning as intended,
monitoring compliance, and tracking and reporting weaknesses
identified during testing for resolution and review by senior
management.

In December 1998, a newly-created Joint Task Force for Computer
Network Defense began coordinating and directing the defense of
DOD computer systems and networks against strategic attack. Its
functions include (1) situation monitoring and assessment, (2)
directing DOD actions to stop attacks, contain damage, restore
functionality, and provide feedback to users, (3) coordinating 
DOD defensive actions with other government agencies and private 
organizations as appropriate, (4) participation in joint training 
exercises, and (5) development of contingency plans and techniques.

The Joint Task Force supports the DIAP by providing the monitoring
tools to identify hostile attacks to DOD systems through its
networks. However, the DIAP does not yet adequately address the
vulnerabilities that make such attacks possible or the threats to 
information security that cannot be detected through network 
monitoring. The latter include (1) environmental threats, such as 
natural disasters or accidents, (2) the unauthorized activities 
(such as espionage, sabotage, or embezzlement) of authorized users, 
programmers, or terminated employees who still have system access 
due to lax security management, and (3) data loss or corruption 
following a service interruption, due to poor back-up and 
contingency planning.

DOD believes the DIAP and task force initiatives will address the
computer control weaknesses noted in our previous reports and our
current review. However, it is too early to determine how the
provisions in the DIAP plans will be implemented or how the Joint
Task Force and other operational efforts yet to be developed will
be coordinated with it. Thus, we were unable to assess whether
these efforts will ultimately be successful in ensuring adequate 
information security throughout DOD. We will monitor the 
implementation of the DIAP as part of our oversight of DOD 
information security.

Conclusions 

Departmentwide, DOD has made limited progress in
correcting the general control weaknesses we reported in 1996. As
a result, these weaknesses persist across every area of general
controls. However, DISA has developed technical standards and is
implementing a Security Readiness Review process that provides a
model for information security management throughout its DMCs.
DISA has not fully implemented this information security program
and still needs to address certain shortcomings. Specifically, the
quality of data in its SRR database could be improved through more 
timely independent verification of corrective actions by the 
DMCs or other parties. The DIAP implementation plan provides the 
framework for a departmentwide information security program. 
However, because DOD has not yet implemented DIAP, we cannot yet
determine whether it will ultimately succeed in ensuring adequate
security throughout the department. Close coordination between 
the DIAP, the Joint Task Force, and other operational efforts will 
be crucial to comprehensively addressing DOD's information 
security weaknesses. DISA's program and other models for 
information security management offer approaches that DOD could
adapt and integrate into its departmentwide program.
Recommendations In addition to reaffirming the recommendations in
our 1996 reports, we recommend that, to realize the full potential 
and maximize the effectiveness of DISA's security oversight program,
the DIAP, and other DOD IA initiatives, the Secretary of Defense 
take the following actions.

Direct the DISA Director to expand the Security Readiness Review
process to include timely and independent verification of the
corrective actions reported by DMCs or other responsible parties.

Direct the DOD CIO to ensure that the Defense-wide Information
Assurance Program defines how its efforts will be coordinated with
the Joint Task Force and other related initiatives.

Agency Comments and Our Evaluation

DOD officials generally concurred with the report and our
recommendations, noting that this report adds credence to efforts
to heighten awareness within the DOD community of the serious
risks that accompany poor security practices in information systems.
They stated that the department is actively working to correct the
deficiencies cited in the report and that they believe it is
making progress in reducing the risks to its information systems.
They also noted that the task is large and many corrective actions
are underway, and affirmed that the continued development of the
DIAP and other efforts will strengthen the department's
information security posture.

With regard to our recommendation concerning DISA's verification
of corrective actions, DOD officials acknowledged problems with
the accuracy of reported fixes at Defense Megacenters. They
advised us that DISA has since modified its procedures to include
a specific check of the validity of entries made on previously
documented Security Readiness Reviews. According to DISA, the
revised procedures call for incorrect entries and repeat findings
to be noted as serious concerns to DMC facility directors.

Regarding our recommendation concerning coordination of the DIAP
with the Joint Task Force and related initiatives, DOD officials
affirmed that the DIAP and other initiatives in the department
such as the Joint Task Force for Computer Network Defense (JTF-
CND) will address the computer control weaknesses cited in our
report and recognized that efforts must be coordinated between the
DIAP and those other initiatives. They pointed out that the DIAP
has established close working relationships with the military
services, agencies, Joint Staff, and other elements within DOD,
including the newly established JTF- CND. They noted that an
implementation plan is being prepared that aligns JTF-CND under
the Commander-in-Chief, United States Space Command, and that the
DIAP has participated in the working groups to create this plan.
Lastly, they referred to two other DOD initiatives assessing (1)
the threat to information systems posed by insiders and (2) the
training of DOD information technology employees. They noted that
these studies are expected to result in recommendations related to the training of
system administrators and the controls over their access to
information systems that, when implemented, should yield
significant improvements to the security of DOD information
systems. This report contains recommendations to you. The head of
a federal agency is required by 31 U. S. C. 720 to submit a written
statement on actions taken on these recommendations to the Senate
Committee on Governmental Affairs and the House Committee on
Government Reform within 60 days of the date of this report. You
must also send a written statement to the House and Senate
Committees on Appropriations with the agencies' first request for
appropriations made over 60 days after the date of this report.

We are sending copies of this report to Senator Fred Thompson,
Senator Joseph Lieberman, Representative Floyd Spence,
Representative Ike Skelton, Representative Dan Burton,
Representative Henry A. Waxman, Representative C. W. Bill Young, and Representative John P. Murtha
in their capacities as Chair or Ranking Minority Member of Senate
and House Committees and Subcommittees. We are also sending copies
of this report to Mr. Arthur L. Money, Senior Civilian Official
for the Office of the Assistant Secretary of Defense (Command,
Control, Communications and Intelligence) and DOD Chief
Information Officer, and Lieutenant General David J. Kelley,
Director, Defense Information Systems Agency. Copies will also be
made available to others upon request.

If you or your office have any questions concerning this report,
please contact me or Les Thompson, Assistant Director, at (202)
512-3789. Individuals making key contributions to this report are
listed in appendix II.

Sincerely yours, Robert F. Dacey Director, Consolidated Audit and
Computer Security Issues

-------------------------------------------------------------------

Abbreviations

CDA Central Design Activity 
CIO Chief Information Officer 
DFAS Defense Finance and Accounting Service 
DIAP Defense-wide Information Assurance Program 
DISA Defense Information Systems Agency 
DLA Defense Logistics Agency 
DMC Defense Megacenter 
DOD Department of Defense 
IA information assurance 
JTF-CND Joint Task Force for Computer Network Defense 
SA Security Administor 
SRR Security Readiness Review 
STIG Security Technical Implementation Guide

-------------------------------------------------------------------

Appendix I Recommendations Made in GAO/AIMD-96-144

DOD has reported that corrective actions are in progress for each
of the recommendations below. While none are fully completed, DOD
believes that its corrective actions will address all of our
recommendations,
primarily through the DIAP. As noted in this report, it is too
early to determine how the provisions in the DIAP will be
implemented and, thus, whether these corrective actions will
effectively address our recommendations.

I. We recommend that the Secretary of Defense assign clear
responsibility and accountability within the Office of the
Secretary of Defense, the military services, and the Defense
agencies for ensuring the successful implementation of an
information security program that includes, for example,
departmentwide policies for preventing, detecting, and responding
to hacker attacks on Defense information systems.

II. We further recommend that you direct the DOD CIO to develop and
implement a comprehensive DOD- wide computer security management
program that includes the hacker prevention policies we previously
recommended as well as
establishing a risk- based control program to assess computer
security in DOD computer systems,  developing and implementing
effective security policies and related control techniques, and
reporting to DOD managers on security issues impacting their
information processing systems. 

III. We also recommend that you
direct the Deputy Secretary of Defense to ensure that the duties
established for the military departments' and Defense agencies'
CIOs include reporting on ongoing computer security efforts and
activities to the DOD CIO for review, assessment, and appropriate
action to ensure proper coordination and an integrated information
technology structure within the Department.

IV. Further, you should direct the DOD CIO to review and assess the
specific deficiencies noted and establish a process to address
them. 

V. In addition, we recommend that the DISA Director, the CIOs
of the military departments, and the CIOs of the other Defense
agencies submit their policies and procedures to improve general
computer controls to the DOD CIO for review, assessment,
and appropriate action to ensure a comprehensive security approach
is operational throughout the Department. Such policies and
procedures should  limit computer system access authorizations to
only those who need access to perform their work responsibilities,
and are periodically reviewed to ensure their continued need;
require sensitive data files and critical production programs to
be identified and successful and unsuccessful access to them to be
monitored;
strengthen security software standards in critical areas, such as
by preventing the reuse of passwords and ensuring that security
software is implemented and maintained in accordance with the
standards;
control physical security at computer facilities; and  provide
for completing and testing disaster recovery plans.

VI. To ensure that general computer controls are improved at the
DMCs, we recommend that the DOD CIO direct the DISA Director to
develop and implement a comprehensive computer security program at
the DMCs, consistent with the DOD- wide program, that includes the
elements outlined in this report. These elements encompass
policies and procedures to ensure that access to DMC computer
facilities is appropriately granted and periodically reviewed,
clearly defined roles and responsibilities of DMC employees,
information system security officers, and security managers, and
security oversight at each DMC to monitor, measure, test, and
report on the ongoing effectiveness of computer system, network,
and process controls. 

VII. In addition, we recommend that the CIOs of the military 
departments and the Defense agencies submit plans for coordinating
with DISA to improve computer controls affecting DMC operations to
the DOD CIO for review, assessment, and appropriate actions.
Greater cooperation is necessary, for example, to
determine who is given access to computer systems applications,
identify critical computer systems applications to be covered by
disaster recovery plans, and  ensure that locally designed
software application program changes are in accordance with
prescribed policies and procedures.

VIII. Also, the DISA Director and the CIOs of the military
departments and Defense agencies should provide their plans to the
DOD CIO, for review, assessment, and appropriate action to ensure
that computer system security reviews are performed as part of
future transfers of computer systems to the DMCs.

IX. Further, the DOD CIO should monitor implementation of those
plans. X Finally, to strengthen DOD's computer security program in
a coordinated and timely manner, we recommend that you
direct the DOD CIO to monitor and to periodically report on the
status of the actions taken to improve computer security
throughout DOD and  ensure that the DOD CIO has the necessary
authority to ensure that there are adequate computer security
controls throughout DOD, including the military departments and
Defense agencies.

-------------------------------------------------------------------

Appendix II GAO Contacts and Staff Acknowledgements

GAO Contacts C. Les Thompson, (202) 512- 3789 Robert F. Dacey,
(202) 512- 3317

Acknowledgments In addition to those named above, Sharon Kittrell,
Jean Boltz, Edward Glagola, Linda Sellevaag, Gary Austin, and
Walter Opaska made key contributions to this report.

-------------------------------------------------------------------

Related GAO Products 

Major Management Challenges and Program Risks: Department of Defense
(GAO/OCG-99-4, January 1999).

Information Security: Strengthened Management Needed to Protect
Critical Federal Operations and Assets (GAO/T-AIMD-98-312,
September 23, 1998). 

Financial Management: Improvements Needed in Air Force Vendor 
Payment Systems and Controls (GAO/T-AIMD-98-308, September 28, 1998).

Information Security: Serious Weaknesses Place Critical Federal
Operations and Assets at Risk (GAO/AIMD-98-92, September 23,
1998). 

Defense Computers: Year 2000 Computer Problems Put Navy
Operations at Risk (GAO/AIMD-98-150, June 30, 1998). 

Defense Computers: Army Needs to Greatly Strengthen Its Year 2000 
Program (GAO/AIMD-98-53, May 29, 1998). 

Executive Guide: Information Security Management: Learning From 
Leading Organizations (GAO/AIMD-96-68, May 1998). 

Defense Computers: Year 2000 Computer
Problems Threaten DOD Operations (GAO/AIMD-98-72, April 30, 1998).

Department of Defense: Financial Audits Highlight Continuing
Challenges to Correct Serious Financial Management Problems (GAO/
T- AIMD/ NSIAD- 98- 158, April 16, 1998).

Defense Computers: Air Force Needs to Strengthen Year 2000
Oversight (GAO/AIMD-98-35, January 16, 1998). 

Federal Management Issues (GAO/OCG-98-1R, January 9, 1998). 

Defense IRM: Poor Implementation of Management Controls Has Put 
Migration Strategy at Risk (GAO/AIMD-98-5, October 20, 1997).

Defense Computers: LSSC Needs to Confront Significant Year 2000
Issues (GAO/AIMD-97-149, September 26, 1997).

Financial Management: Review of the Military Retirement Trust
Fund's Actuarial Model and Related Computer Controls (GAO/AIMD-97-
128, September 9, 1997). 

Defense Computers: Improvements to DOD Systems Inventory Needed 
for Year 2000 Effort (GAO/AIMD-97-112, August 13, 1997).

Defense Computers: Issues Confronting DLA in Addressing Year 2000
Problems (GAO/AIMD-97-106, August 12, 1997). 

Defense Computers: DFAS Faces Challenges in Solving the Year 2000 
Problem (GAO/AIMD-97-117, August 11, 1997). 

Defense Financial Management: Immature Software Development 
Processes at Indianapolis Increase Risk (GAO/AIMD-97-41, June 6, 1997). 

Defense IRM: Investments at Risk for DOD Computer Centers 
(GAO/AIMD-97-39, April 4, 1997). 

High-Risk Series: Defense Financial Management (GAO/HR-97-3, February
1, 1997).

High-Risk Series: Information Management and Technology (GAO/HR-
97-9, February 1, 1997).

Financial Management: DOD Inventory of Financial Management
Systems Is Incomplete (GAO/AIMD-97-29, January 31, 1997).

Information Security: Computer Hacker Information Available on the
Internet (GAO/T-AIMD-96-108, June 5, 1996). 

Information Security: Computer Attacks at Department of Defense 
Pose Increasing Risks (GAO/AIMD-96-84, May 22, 1996). 

Information Security: Computer Attacks at Department of Defense 
Pose Increasing Risks (GAO/T-AIMD-96-92, May 22, 1996).

Defense Industrial Security: Weaknesses in U. S. Security
Arrangements With Foreign- Owned Defense Contractors (GAO/NSIAD-
96-64, February 20, 1996).

------------------------------------------------------------------

For information on how to access GAO reports on the INTERNET, send
an e-mail message with info in the body to:

info@www.gao.gov 

or visit GAO's World Wide Web Home Page at:

http://www.gao.gov

United States General Accounting Office Washington, D. C. 20548-
0001