File size: 126,322 Bytes
5dfa941 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 |
<html> <title> - NO COMPUTER SYSTEM LEFT BEHIND: A REVIEW OF THE FEDERAL GOVERNMENT'S D+ INFORMATION SECURITY GRADE</title> <body><pre> [House Hearing, 109 Congress] [From the U.S. Government Publishing Office] NO COMPUTER SYSTEM LEFT BEHIND: A REVIEW OF THE FEDERAL GOVERNMENT'S D+ INFORMATION SECURITY GRADE ======================================================================= HEARING before the COMMITTEE ON GOVERNMENT REFORM HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS FIRST SESSION __________ APRIL 7, 2005 __________ Serial No. 109-13 __________ Printed for the use of the Committee on Government Reform Available via the World Wide Web: http://www.gpo.gov/congress/house http://www.house.gov/reform ______ U.S. GOVERNMENT PRINTING OFFICE 20-562 WASHINGTON : 2005 _____________________________________________________________________________ For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800 Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�090001 COMMITTEE ON GOVERNMENT REFORM TOM DAVIS, Virginia, Chairman CHRISTOPHER SHAYS, Connecticut HENRY A. WAXMAN, California DAN BURTON, Indiana TOM LANTOS, California ILEANA ROS-LEHTINEN, Florida MAJOR R. OWENS, New York JOHN M. McHUGH, New York EDOLPHUS TOWNS, New York JOHN L. MICA, Florida PAUL E. KANJORSKI, Pennsylvania GIL GUTKNECHT, Minnesota CAROLYN B. MALONEY, New York MARK E. SOUDER, Indiana ELIJAH E. CUMMINGS, Maryland STEVEN C. LaTOURETTE, Ohio DENNIS J. KUCINICH, Ohio TODD RUSSELL PLATTS, Pennsylvania DANNY K. DAVIS, Illinois CHRIS CANNON, Utah WM. LACY CLAY, Missouri JOHN J. DUNCAN, Jr., Tennessee DIANE E. WATSON, California CANDICE S. MILLER, Michigan STEPHEN F. LYNCH, Massachusetts MICHAEL R. TURNER, Ohio CHRIS VAN HOLLEN, Maryland DARRELL E. ISSA, California LINDA T. SANCHEZ, California GINNY BROWN-WAITE, Florida C.A. DUTCH RUPPERSBERGER, Maryland JON C. PORTER, Nevada BRIAN HIGGINS, New York KENNY MARCHANT, Texas ELEANOR HOLMES NORTON, District of LYNN A. WESTMORELAND, Georgia Columbia PATRICK T. McHENRY, North Carolina ------ CHARLES W. DENT, Pennsylvania BERNARD SANDERS, Vermont VIRGINIA FOXX, North Carolina (Independent) ------ ------ Melissa Wojciak, Staff Director David Marin, Deputy Staff Director/Communications Director Rob Borden, Parliamentarian Teresa Austin, Chief Clerk Phil Barnett, Minority Chief of Staff/Chief Counsel C O N T E N T S ---------- Page Hearing held on April 7, 2005.................................... 1 Statement of: Crandlemire, Bruce N., Assistant Inspector General for Audit, U.S. Agency for International Development; John Streufert, Acting Chief Information Officer, U.S. Agency for International Development, accompanied by Mark Norman, USAID OIG; Melinda Dempsey, USAID OIG; Philip M. Heneghan, USAID; Frank Deffer, Assistant Inspector General for Information Technology, U.S. Department of Homeland Security; Steve Cooper, Chief Information Officer, U.S. Department of Homeland Security, accompanied by Edward G. Coleman, DHS OIG; Ted Alves, Assistant Inspector General for IT and Financial Management, U.S. Department of Transportation; Daniel Matthews, Chief Information Officer, U.S. Department of Transportation, accompanied by Rebecca Leng, DOT OIG; Ed Densmore, DOT OIG; Nate Custer, DOT OIG; Vicki Lord, DOT OCIO; and Dr. Dan Mehan, CIO, FAA.......... 71 Alves, Ted............................................... 105 Cooper, Steve............................................ 99 Crandlemire, Bruce N..................................... 71 Deffer, Frank............................................ 89 Matthews, Daniel......................................... 124 Streufert, John.......................................... 79 Wilshusen, Greg, Director, Information Security Issues, U.S. Government Accountability Office; and Karen S. Evans, Administrator, Office of E-Government and Information Technology, U.S. Office of Management and Budget........... 22 Evans, Karen S........................................... 52 Wilshusen, Greg.......................................... 22 Letters, statements, etc., submitted for the record by: Alves, Ted, Assistant Inspector General for IT and Financial Management, U.S. Department of Transportation, prepared statement of............................................... 107 Cooper, Steve, Chief Information Officer, U.S. Department of Homeland Security, prepared statement of................... 102 Crandlemire, Bruce N., Assistant Inspector General for Audit, U.S. Agency for International Development, prepared statement of............................................... 74 Cummings, Hon. Elijah E., a Representative in Congress from the State of Maryland, prepared statement of............... 17 Davis, Chairman Tom, a Representative in Congress from the State of Virginia, prepared statement of................... 4 Deffer, Frank, Assistant Inspector General for Information Technology, U.S. Department of Homeland Security, prepared statement of............................................... 91 Evans, Karen S., Administrator, Office of E-Government and Information Technology, U.S. Office of Management and Budget, prepared statement of.............................. 54 Matthews, Daniel, Chief Information Officer, U.S. Department of Transportation, prepared statement of................... 126 Ruppersberger, Hon. C.A. Dutch, a Representative in Congress from the State of Maryland, prepared statement of.......... 12 Streufert, John, Acting Chief Information Officer, U.S. Agency for International Development, prepared statement of 81 Wilshusen, Greg, Director, Information Security Issues, U.S. Government Accountability Office, prepared statement of.... 24 NO COMPUTER SYSTEM LEFT BEHIND: A REVIEW OF THE FEDERAL GOVERNMENT'S D+ INFORMATION SECURITY GRADE ---------- THURSDAY, APRIL 7, 2005 House of Representatives, Committee on Government Reform, Washington, DC. The committee met, pursuant to notice, at 10 a.m., in room 2154, Rayburn House Office Building, Hon. Tom Davis (chairman of the committee) presiding. Present: Representatives Davis, Duncan, Cummings, Ruppersberger, and Norton. Staff present: Ellen Brown, legislative director and senior policy counsel; Robert Borden, counsel/parliamentarian; Rob White, press secretary; Victoria Proctor, senior professional staff member; Jamie Hjort, professional staff member; Chaz Phillips, policy counsel; Teresa Austin, chief clerk; Sarah D'Orsie, deputy clerk; Kristin Amerling, minority deputy chief counsel; Karen Lightfoot, minority communications director/ senior policy advisor; Nancy Scola, minority professional staff member; Earley Green, minority chief clerk; and Jean Gosa, minority assistant clerk. Chairman Tom Davis. Good morning. The committee will come to order. I would like to welcome everyone to today's hearing on implementation of FISMA, the Federal Information Security Management Act of 2002. We rely heavily on information technology and the Internet to support our economy, our national security and government operations. For instance, e-commerce is more popular than ever; Christmas 2004 saw record high consumer demapped on retail Web sites. IT systems are used to operate and protect our critical infrastructures. And in the Federal Government, electronic government initiatives create efficiencies, save taxpayers time and money, and help eliminate redundant processes. Given the interconnectivity of systems, all it takes is one weak link to break the chain. All users, whether they are at home or at school or at work, need to understand the impact of weak security and the measures that should be taken to prevent cyber attacks. Everyone must protect his or her cyberspace, and of course, that includes the government. Therefore, it is critical that the Federal Government adequately protect its systems to ensure the continuity of operations, and to maintain public trust. This is particularly true of agencies such as the Internal Revenue Service, the Social Security Administration and the Department of Veterans Affairs that maintain citizens' personal information in their systems. Recent failures by the Bank of America and Choice Point have focused the spotlight on identity theft. Successful FISMA implementation is important because a similar event could occur in the government. Like the private sector, agencies are not immune to the loss of personal information. Threats to government systems could result in identity theft and subsequent financial damage and frustration, as well as diminished trust in government IT capabilities and electronic government programs. Every day Federal information systems are subjected to probes or attacks from outside sources. Cyber attacks are evolving and becoming more sophisticated. Therefore, a government information security management program must be comprehensive, yet flexible enough to adapt to the changing cyber threat environment. It is a matter of good management and good business practice, but it is also a matter of national security. FISMA provides that structure by requiring that each agency create a comprehensive risk-based approach to agency- wide information security management. OMB performs an important role in the information security management process by encouraging agencies to adopt a new approach to security. In the past, information security was often seen as an afterthought, more of a crisis response than a management tool. OMB is helping to alter that perspective. It holds the agencies responsible for protecting Federal systems through business case evaluations so that agencies can better fulfill their missions. OMB requires agencies to address their security deficiencies before they are permitted to spend money on IT upgrades or new IT projects. I support this action because it forces agencies to concentrate on security before adding new layers of systems to their architecture and potentially complicating their security concerns. I'm also pleased that OMB has identified a sixth line of business, cyber security. Laws like FISMA and the Clinger-Cohen amendment require every agency to think about and invest in information security. However, each agency does it differently. The reason FISMA grades show the Federal Government still has a long way to go when it comes to information security. As with the other five lines of business, the goal of the cyber security line of businesses is to use business principles and best practices to identify common solutions for business processes and/or technology-based shared services for government agencies. The intended result is better, more efficient and consistent security across the Federal Government for the same amount of dollars, if not less. And at the end of the day, it's not how much money you spend, though, it's how well you spend it. To help us gauge the agencies information security progress, FISMA requires the CIOs and IGs to submit reports to Congress and OMB. The committee enlists GAO's technical assistance to prepare the annual scorecard. This year the government made a slight improvement, receiving a D+. The overall government score is two points above last year, but needless to say, this isn't impressive. Progress is slow. Our objective today is to find out how the government can improve, and why some agencies can show remarkable improvement while others appear to flounder. We will hear from the IGs and CIOs of two agencies that improved their scores this year, Department of Transportation and the U.S. Agency for International Development. We will also hear from the IG and the CIO of the Department of Homeland Security, a poor performer again this year. I think it is worth noting that DHS has cyber security responsibilities for the Nation, and must work with the private sector regularly on these issues. Given this role, DHS needs to have its house in order and should become a security leader among agencies. What is holding them up? Well, the DHS witnesses will discuss the unique challenges that they face in a large and relatively new agency, and what actions they are taking to improve their information security, giving us a better understanding of their difficulties. In addition, we're concerned about how well the CIO and IG offices communicate about issues such as their interpretations of the OMB reporting requirements. Disagreements on interpretation may impact their respective reports and make it difficult for us to get an accurate picture of the agency's information security progress. This also raises questions about the clarity of the guidance, and whether agencies respond to OMB about the guidance during the comment period so their comments and concerns are adequately addressed in the final version. We will examine whether the IGs need a standardized information security audit framework similar to that used for financial management systems. Also, we need to address whether agencies need additional guidance, procedures or resources to improve their information security and fully comply with FISMA. Panel one witnesses from GAO and OMB will focus on information security from the government-wide perspective. Panel two is comprised of agency representatives and will focus on the agency-level perspective on implementation of FISMA. We'll hear from the IGs and CIOs at USAID, DHS, and the Department of Transportation. GAO will join panel two for the question-and-answer period. [The prepared statement of Chairman Tom Davis follows:] [GRAPHIC] [TIFF OMITTED] T0562.001 [GRAPHIC] [TIFF OMITTED] T0562.002 [GRAPHIC] [TIFF OMITTED] T0562.003 [GRAPHIC] [TIFF OMITTED] T0562.004 [GRAPHIC] [TIFF OMITTED] T0562.005 [GRAPHIC] [TIFF OMITTED] T0562.006 Chairman Tom Davis. I now recognize our distinguished ranking member, Mr. Waxman, for his opening statement. Mr. Ruppersberger. I'm not Mr. Waxman, I'm a little bit larger than Mr. Waxman. Chairman Tom Davis. Well, when he comes, we will recognize him. In the meantime, we're very pleased to recognize from Baltimore City, Mr. Ruppersberger, who I will be happy to recognize. Mr. Ruppersberger. Well, first, thank you for calling this hearing today on OMB's report to Congress on the Federal Information Security Management Act. According to the report, the U.S. Agency for International Development and the Department of Transportation received the highest grades of all 24 agencies reviewed. I hope that during today's hearing, we will be able to pull out some best practicing and tangible suggestions from those agencies as to how the other 22 can improve their grades. It is disappointing and unacceptable that our government agencies' overall grade is a D+, however, I'm encouraged by the few successes that will be discussed here today. The F grade for the Department of Homeland Security is totally unacceptable because of the high stakes involved and their mission to protect our national security. Last week, the President's Commission on the Intelligence Capabilities of the United States issued their report regarding WMDs. In the report's postscript the Commission identified security, counterintelligence, and information assurance as crucial issues in the intelligence community and the Director of National Intelligence in the next few years to come. The Commission acknowledges that they only scratched the surface of the problem, and the Commission recommends early action to define new strategies for managing security in the 21st century, security that includes information assurance, which is why we're all here today. This recommendation from the Commission will be a beneficial step in the process for the Department of Homeland Security and other security offices to improve their infrastructure security and their information and cyber security efforts. The good news is that the Justice Department improved the most, going from an F last year to a B- this year. Currently, as graded, the FBI is evaluated within the overall grade given to Justice. Based on the FBI's mission regarding national security interests, I believe they should be graded separately from the Department of Justice. Again, according to the President's Commission, further reforms are also necessary in the FBI's information technology infrastructure which remains a persistent obstacle for successful execution of the FBI's national security mission. If we look at the problem as a national security issue in addition to a general information security issue, I think we will be able to come together to find solutions that will work across all agencies. I know there is always a tradeoff between the cost of implementing a security measure and the potential risks if we do not. I feel that projecting our citizens and the government from information security breaches is worth the cost that will be incurred to set up appropriate security measures. I am concerned about all of these issues, but I think if we get past the grades and use this hearing and OMB's report as a guide, I think we will be able to quickly improve information security government-wide. We're here today to point out a problem and to see what we can do to fix it. These failing grades are unacceptable. We need to learn from those agencies who are doing well so that we can improve individual agency's scores and the government-wide score. Thank you, Mr. Chairman. [The prepared statement of Hon. C.A. Dutch Ruppersberger follows:] [GRAPHIC] [TIFF OMITTED] T0562.007 [GRAPHIC] [TIFF OMITTED] T0562.008 [GRAPHIC] [TIFF OMITTED] T0562.009 Chairman Tom Davis. Thank you very much. I do not see Mr. Waxman, even though he is in my script. The gentleman from Maryland, any opening statement? Mr. Cummings. Yes, thank you very much. Mr. Chairman, I, too, thank you for calling this important hearing on the effectiveness of the Federal Government's ongoing attempt to strengthen the security and reliability of its information and information systems. Decades ago, the necessity of such a hearing would have been questionable as information technology and the Internet were not as prevalent nor as indispensable in the Federal Government as they are today. In the 21st century, one need not look very far to see how ambiguous information technology and the Internet have become in the day-to-day operations of the Federal Government. Communications now travel as fast and as far as the Internet allows. The electronic processing of information allows delivery of services to function with unprecedented ease and accuracy. The sharing of information intergovernmentally and across sectors can permit the Federal Government to operate with renewed effectiveness. However, with all the advantages that accompany the Federal Government's information technology capabilities, there still exist critical areas of concern. The terms ``computer virus,'' ``worm'' and ``hacker'' are now part of the modern day lexicon for good reason. Given the sensitivity of personal and confidential data found in Federal information systems in agencies such as the Internal Revenue Service and the Department of Defense, the potential exists for cyber criminal, terrorist or foreign nation to wreak havoc. The American people are acutely aware that such vulnerabilities could not only result in identity theft and a loss of privacy, but also endanger our economy and undermine our national security. Due to these concerns, information security has become a top governmental priority. To that end, Congress passed the Federal Information Security Management Act [FISMA], in 2002. This legislation established a comprehensive framework to safeguard the Federal Government's information and information systems. Agencies are mandated to implement an information security program, which includes performing risk assessments, accounting for utilized information systems, and developing procedures to ensure the accessibility and continuity of information. Agencies must also furnish the Office of Management and Budget with an annual report on the effectiveness of their program. These agency reports form the basis of the Government Reform Committee's Federal computer security report card. Specifically, the FISMA report for 2004 acknowledges some improvements and perennial challenges in this area. It states that agencies have made substantial progress in the certification and accreditation of systems, the incorporation of built-in security costs, the annual testing of system controls, the development of contingency plans to ensure operational continuity, and the implementation of security configuration requirements. This progress is commendable, however, given that the 2004 government-wide grade for information security is a D+, information technology is too early to celebrate. Critically important agencies such as the Department of Homeland Security, the Department of Health and Human Services and the Department of Veteran Affairs all received Fs. I would argue no one here would be satisfied if their child brought home these grades from school. How can we afford to have a lower standard for the Federal Government? The American people demand excellence, and Cs, Ds and Fs in securing the Federal Government's information just won't do. Today's hearing will serve as an avenue to identify what needs to occur to assist Federal agencies in realizing the goals of FISMA. I hope the witnesses will provide insight to help Congress determine whether agencies require additional guidance in order to meet FISMA requirements, the responsibilities of agency Inspectors General in this process, and the need to possibly provide increased flexibility in assessing agency compliance with FISMA mandates. With that, Mr. Chairman, I again thank you for calling the hearing, and I yield back. [The prepared statement of Hon. Elijah E. Cummings follows:] [GRAPHIC] [TIFF OMITTED] T0562.010 [GRAPHIC] [TIFF OMITTED] T0562.011 [GRAPHIC] [TIFF OMITTED] T0562.012 [GRAPHIC] [TIFF OMITTED] T0562.013 [GRAPHIC] [TIFF OMITTED] T0562.014 Chairman Tom Davis. Well, thank you very much. For our first panel we have Greg Wilshusen, who is the Director of Information Security Issues, at the Government Accountability Office, who is no stranger to this committee. And we have Karen Evans, who is the Administrator of the Office of E-Government and Information Technology at the Office of Management and Budget. I'm not sure if this is your first time in a full committee, you have done a lot in the subcommittee, but we welcome you, we're happy to hear from you, and we appreciate the job that you are doing. You know it is our policy to swear witnesses in, so would you rise and raise your right hands. [Witnesses sworn.] Chairman Tom Davis. Thank you very much. STATEMENTS OF GREG WILSHUSEN, DIRECTOR, INFORMATION SECURITY ISSUES, U.S. GOVERNMENT ACCOUNTABILITY OFFICE; AND KAREN S. EVANS, ADMINISTRATOR, OFFICE OF E-GOVERNMENT AND INFORMATION TECHNOLOGY, U.S. OFFICE OF MANAGEMENT AND BUDGET STATEMENT OF GREG WILSHUSEN Mr. Wilshusen. Mr. Chairman, and members of the committee, I am pleased to be here today to discuss Federal efforts to implement requirements of the Federal Information Security Management Act of 2002 [FISMA]. This act requires each agency to develop, document, and implement an agency-wide information security program that provides security for the information and information systems that support the operations and assets of the agency, including those provided and/or managed by another agency or contractor. Agency programs are to include eight components, such as periodic assessment of risks and periodic testing and evaluation of controls. FISMA also requires OMB, Federal agencies and Inspectors General [IGs], to report each year on efforts to implement these programs. Mr. Chairman, my bottom-line message today is that continued efforts are needed to sustain progress made by the agencies in implementing the requirements of FISMA. In my testimony today, I will note areas where agencies have made significant progress and those areas where challenges remain. In addition, I will discuss opportunities for improving the annual FISMA reporting process. Our reviews of information security controls at Federal agencies have found that significant information security weaknesses continue to place a broad array of Federal operations and assets at risk of misuse and disruption. As a result, we continue to designate Federal information security as a government-wide high risk area in our recent update to GAO's high-risk series. In its fiscal year 2004 report to the Congress, OMB noted that the 24 major Federal agencies continued to make significant progress in implementing key information security requirements. For example, OMB reported that the percentage of Federal information systems that have been certified and accredited rose 15 points to 77 percent. Systems certification and accreditation is a process by which agency officials authorize systems to operate. It is to include a security of the management, operational and technical security controls in the system. However, OMB, the agencies, and IGs also reported several areas where implementing effective information security practices remains a challenge. For example, seven IGs assessed the quality of their agency's certification and accreditation processes as poor. As a result, agency reported performance data may not accurately reflect the status of the agency's efforts to implement this requirement. As another example, 43 percent of Federal systems did not have a tested contingency plan. These plans provide specific instructions for restoring critical systems, business processes, and information in the event of a disruption of service. The testing of contingency plans is essential to determine whether the plans will function as intended. Without testing, agencies can have only minimal assurance that they will be able to recover mission-critical systems and processes in the event of an interruption. Opportunities exist to improve the annual FISMA reporting process. For example, in the absence of an independent verification of agency-reported data, having a senior agency official attest to the accuracy of data could provide additional assurance. In addition, performance measurement data do not indicate the relevant importance or risk of the systems for which FISMA requirements have been met. Reporting performance data by system risk would provide better information about whether agencies are prioritizing their information security efforts according to risk. Finally, developing and adopting a commonly accepted framework for conducting the annual IG reviews mandated by FISMA could help to ensure consistency and usefulness of these reviews. Mr. Chairman, this concludes my opening statement. I will be happy to answer any questions you or the members of the committee may have. [The prepared statement of Mr. Wilshusen follows:] [GRAPHIC] [TIFF OMITTED] T0562.015 [GRAPHIC] [TIFF OMITTED] T0562.016 [GRAPHIC] [TIFF OMITTED] T0562.017 [GRAPHIC] [TIFF OMITTED] T0562.018 [GRAPHIC] [TIFF OMITTED] T0562.019 [GRAPHIC] [TIFF OMITTED] T0562.020 [GRAPHIC] [TIFF OMITTED] T0562.021 [GRAPHIC] [TIFF OMITTED] T0562.022 [GRAPHIC] [TIFF OMITTED] T0562.023 [GRAPHIC] [TIFF OMITTED] T0562.024 [GRAPHIC] [TIFF OMITTED] T0562.025 [GRAPHIC] [TIFF OMITTED] T0562.026 [GRAPHIC] [TIFF OMITTED] T0562.027 [GRAPHIC] [TIFF OMITTED] T0562.028 [GRAPHIC] [TIFF OMITTED] T0562.029 [GRAPHIC] [TIFF OMITTED] T0562.030 [GRAPHIC] [TIFF OMITTED] T0562.031 [GRAPHIC] [TIFF OMITTED] T0562.032 [GRAPHIC] [TIFF OMITTED] T0562.033 [GRAPHIC] [TIFF OMITTED] T0562.034 [GRAPHIC] [TIFF OMITTED] T0562.035 [GRAPHIC] [TIFF OMITTED] T0562.036 [GRAPHIC] [TIFF OMITTED] T0562.037 [GRAPHIC] [TIFF OMITTED] T0562.038 [GRAPHIC] [TIFF OMITTED] T0562.039 [GRAPHIC] [TIFF OMITTED] T0562.040 [GRAPHIC] [TIFF OMITTED] T0562.041 [GRAPHIC] [TIFF OMITTED] T0562.042 Chairman Tom Davis. Thank you. We do have a number of questions. Ms. Evans, thanks for being with us. STATEMENT OF KAREN S. EVANS Ms. Evans. Good morning, Mr. Chairman, and members of the committee. Thank you for inviting me to speak about the status of the Federal Government's efforts to safeguard our information and systems. In March 2005 OMB issued our second annual report on implementing the Federal Information Security Management Act [FISMA]. We continue to believe FISMA provides a sound foundation for improving and maintaining a strong Federal information technology security program. In short, FISMA is working. Results are apparent. Agencies and Inspectors General are becoming more acclimated to its requirements, and new technical guidelines from the National Institute of Standards and Technology are coming online to promote further progress. We see no need at this time to revise it in any significant way, in fact, substantial revision could delay additional progress. Across the Federal Government, most agencies have shown substantial progress in improving their information security programs. In addition, for the first time agencies reported the degree to which they've implemented security configurations for operating systems and software applications. We found that all agencies have begun developing and implementing security configuration policies for at least some of their operating systems. While progress has been made, deficiencies in agency security procedures and practices remain. Two common deficiencies noted by the agency's Inspector Generals include weaknesses in agency-wide plans of actions and milestones, and the lack of quality in some of the agencies' certification and accreditation processes. In addition, we have identified other areas of concern; they include overall inconsistency in agency and government- wide FISMA implementation, self and IG evaluations. Potentially unnecessary duplication of effort and resources across the government, ensuring adequate security of contractor-provided services, and a transition to Internet protocol version 6. While we believe FISMA itself, along with the implementing guidance from OMB, NIST, and the national security authorities are sufficiently comprehensive and detailed to address these concerns at a policy level. Consistent implementation is difficult and requires considerable expertise and resources at the agency. I would like to answer directly one of the questions asked in your invitation letter, whether there is a need for the Inspector General auditing framework similar to that used in financial audits. We have found the IG's analysis extremely valuable in gaining additional insight into the agency's IT security programs and operations. Much of the analysis in our annual report comes from the IG's findings, but at the same time, like agency CIOs and operational program officials, IGs have varying capacities in the areas of resource available and security expertise. And across the IG community, there are differing methodologies and perspectives on what comprises a sound security program, including the proper way to implement FISMA. Therefore, to the extent that an IG framework would promote greater consistency, we would support it; but we do note a few concerns; first and foremost, we strongly believe that the work of the IG should, to the maximum extent practical, be integrated with and not separate from agency IT security programs; and second, we're concerned with the adoption of a strict and specific review requirement for FISMA purposes if they would, in any way, limit the essential interaction needed between IGs and CIOs. In addition to ongoing discussions to promote consistency in oversight and reporting, we have asked the IGs to participate in the newly formed IT security line of business. We expect this line of business will not only lead to a de facto IG and CIO reporting framework, but more importantly, a stronger Federal Government-wide IT security program. While the task force performs its work, OMB will continue to use our existing oversight mechanisms to improve agency and government-wide IT security performance. Information technology security is one of the No. 1 critical components that agencies must implement in order to achieve green for the e-government initiative of the President's management agenda. If the security criteria are not successfully met, agencies cannot move forward regardless of their performance against the other criteria. In conclusion, over the past year agencies have made significant progress in closing the Federal Government information technology security performance gaps. I would like to acknowledge the significant work of the agencies and the IGs in conducting the annual reviews and evaluations. While notable progress in resolving IT security, weaknesses have been made, problems continue, and new threats and vulnerabilites continue to materialize. To address these challenges OMB will continue to work with the agencies, GAO and Congress to promote appropriate risk-based and cost-effective IT security programs, policies and procedures to adequately secure our operations and assets. But again, we believe FISMA is more than adequate in its current form to support all the needed improvement efforts. I would be glad to take any questions at this time. [The prepared statement of Ms. Evans follows:] [GRAPHIC] [TIFF OMITTED] T0562.043 [GRAPHIC] [TIFF OMITTED] T0562.044 [GRAPHIC] [TIFF OMITTED] T0562.045 [GRAPHIC] [TIFF OMITTED] T0562.046 [GRAPHIC] [TIFF OMITTED] T0562.047 [GRAPHIC] [TIFF OMITTED] T0562.048 [GRAPHIC] [TIFF OMITTED] T0562.049 [GRAPHIC] [TIFF OMITTED] T0562.050 Chairman Tom Davis. Well, thank you both. Ms. Evans, what changes or improvements is your office proposing for the 2005 FISMA guidance? And do you plan to issue new updated guidance regarding your circular A-130? Ms. Evans. We are working right now with the IG community and NIST, CNSS and GAO to revise the reporting requirements. It's going to be similar to last year. We are going to focus this year more on performance metrics, and we are we going to include a new reporting requirement this year dealing with privacy of the information that the agencies are collecting. Chairman Tom Davis. Well, some agencies have expressed concern that the term ``system'' is not well defined; for instance, how should an agency classify a state system that contains Federal data? Does OMB plan to address this in the new guidance? Ms. Evans. The definition of a system--and I want to answer this question both from my past experience as an agency CIO, and now as the policy official. The reason why I believe that we have allowed the definition to be the way that it is is that it provides maximum flexibility. So as agencies would potentially view this as ambiguous, we view it from a policy perspective as giving the agencies flexibility that they need to be able to determine and analyze what risk is appropriate for assets within their control that they have that they are responsible for. So there is an ambiguous nature to the definition of system, but we look at it as it allows the flexibility for the agency to define that so that they can then go forward and implement the management policies and procedures they need in order to deal with that. You could do something very small and say one piece--there could be an application on one piece that has enormous risk that it would impose if it was connected to a network; you may determine that should be called a system, and go through the full certification and accreditation for that. And a system could be as huge as a network, where the whole department's network, that can constitute a system because there are certain rules of engagement that you would want to have, rules of behavior on that system before you would go forward and allow other resources to be connected to it. So we don't necessarily want to go down and be so proscriptive in our definitions as to restrict the ability of the agency to be able to go forward and determine what is the best posture for them. Chairman Tom Davis. But you could have agencies defining it differently, basically. Ms. Evans. They may, and that is why the evaluation that is being done by the IG, the independent evaluation coming in, looks at how they apply that definition, how they have a methodology within their department to see if the thought process that they put behind it to determine it is sound to address the risk. Chairman Tom Davis. OK. Mr. Wilshusen, what do agencies have to do to get information security removed from the GAO high-risk list? This is, as you know, the list was expanded to include cyber security--well, cyber critical infrastructure protection. Information security has been on the list since 1997. Can you briefly discuss what you think needs to be done to get this off the high-risk list? Mr. Wilshusen. Well, first of all, what they need to do-- and where we have consistently found on our review--is to implement at each agency an effective agency-wide information security program, such as those principles and requirements embodied in FISMA. And we have found that many of the agencies have not done that. This in turn has allowed and has resulted in many of their systems being insecure. Chairman Tom Davis. Now why don't they do that? Is it lack of money, they've got so many priorities at this point this is just one, without additional resources, that they're reluctant to do? Mr. Wilshusen. It is probably a couple of issues. Certainly the emphasis and level of attention since the passage of FISMA has helped and has improved both awareness and accountability of the highest levels of each of the agencies, and that has been a positive thing. But in many cases it's primarily management issues, even though security has technical aspects to it. Many of the findings and issues that we identify are the result of management issues where certain requirements are just not being implemented. Chairman Tom Davis. OK. Thank you very much. I'm going to have some more questions, but Mr. Ruppersberger is going to get a turn here. Mr. Ruppersberger. Well, after looking at the reports and the grades, I see that some agencies have improved. Is there any effort to have a departmental roundtable to share best practices? I mean, what we are really here for today is to try to get us to a level where we are going to be a lot more efficient, and we have to find a way to do this. And it seems to me, when you have agencies that are doing well and agencies that aren't doing well, let's look at it and share information. Could either one of you address that issue? Ms. Evans. Yes, sir, I would be glad to. There is actually two efforts underway. One the chairman already noted, which is the cyber security line of business. This is an interagency government-wide task force that OMB has brought together under the leadership of the Department of Homeland Security as well as it is being co-chaired by NSA. And what we are doing there is looking at all of the issues. There are four particular areas that we are looking at, like training, like management practices of framework, those types of activities which get to the heart of your question, what is working, and what can we take that is working within the agencies and move it out government-wide? The one thing that when we set up this task force is, because of the way FISMA is set up and the way that a cyber security program should work, a good IT program should work within a department is you still have to look at the risk. Each department may have a different level of risk, so you can't necessarily think that one size would fit all. But that is what the security line of business is looking at. Also, on the CIO council, the Department of Justice Vance Hitch, is our cyber security liaison; he works very closely with our Best Practices Committee on topics, and topics such as security have always been on the forefront to bring together the appropriate groups so that we can share best practices. And then also, there is a newly named forum that we are--the CIO council is co-chairing with Congressman Davis' staff, which is the Chief Information Security Officers Forum. So we are trying to bring it together at multiple levels within an organization, and across the government as a whole, so that practices can be identified---- Mr. Ruppersberger. Let me ask you this question: So much of whatever we do in management, managing large organizations, whatever, is accountability, and also giving the resources to the people that we want to perform the mission. How about the issue of maybe a government-wide audit standard? Do you think that would help in this situation? It seems that we need a standard for all of our agencies. Now we have different missions and different areas that we move into. What do you think of that issue? Ms. Evans. Well, I believe, through the President's management agenda, that we have added specific criteria into the score card under e-government, so we are holding the agencies accountable for their performance. Mr. Ruppersberger. But these failing grades are just not acceptable. Ms. Evans. I believe that the progress and the way that we are measuring progress--we have the same goals in mind, both the committee as well as the administration. How we are measuring progress may be a little bit different based on what the rating factors are based on what the committee has. You are specifically asking me about an auditing standard, and FISMA specifically makes a difference between audit and evaluation. And we really think that it's more of an evaluation because this really needs to be a collaborative effort within the entire department, because as you are talking about it, it is a management issue as well. If it turns into an audit situation, our concern is is that there won't be as much exchange, that it is more an evaluation---- Mr. Ruppersberger. That's a good point. I'm near the end of my 5 minutes, I want to keep moving down another area. I am very concerned about the issue of the failing grade with Homeland Security, and I guess it is your turn, Mr. Wilshusen. Why do you feel at this point that Department of Homeland Security has a failing grade? What can we do to move that to another level to get them a lot more proficient in this subject matter today? Mr. Wilshusen. Well, first of all, Homeland Security does-- and I guess you will talk to the CIO and IG on the next panel as well, but they have had a number of challenges that they need to overcome just in the creation of the department to---- Mr. Ruppersberger. No question. Mr. Wilshusen. And that has been pretty much a key factor in some of the challenges that they face. However, at the same time, only just recently have they established key positions within that department in terms of having a chief information security officer, and they have identified key individuals to be responsible for information security. But it will take quite a bit of an effort for them to kind of meld different systems to make sure there is appropriate accountability, and the alignment of the information security program at the department level with different operating entities. Right now there is apparently quite a bit of autonomy between the two. Mr. Ruppersberger. And we can develop that in the next panel also, I see my time is up. Chairman Tom Davis. Ms. Norton. Ms. Norton. Thank you, Mr. Chairman. I'm sorry I was detained and I did not hear the entire testimony, but what concerns me is the unevenness among the agencies. Mr. Ruppersberger asked about homeland security and there may be some reason why they haven't gotten most of their act together, but some of these agencies you would expect to do better, you would expect the Department of State to do better, you would expect the Nuclear Regulatory Agency not to go down. And I note that the agencies look like they are in charge of this entire process. They are required to take the steps to do the inventory of their systems. And apparently in the survey, 70 percent of them said they wanted greater guidance in meeting the requirements. The report cards signify nothing, if not the need for greater guidance. I'm wondering if too much of this is left to agencies who have no expertise here either in choosing consultants in security aspects of computer systems; in fact, no agency really does have that expertise. I'm wondering if simply saying to the agencies, do this, has been sufficient, particularly when they themselves say they want greater guidance in meeting the requirements. And I suppose the obvious question is, do you agree, and where would such guidance come from? Are any steps being taken to offer greater guidance, given the rather pathetic reports that are indicated in the Federal computer security report card? Ms. Evans. First off, what we are trying to do from an administration perspective is avoid being very, very proscriptive in the policy because what we want to avoid is people just going down and cranking through--mechanically cranking through and getting checkmarks because you really want the practice to be engrained, and we were talking about management practices. So in order to meet what we are hearing from the agencies about additional guidance, we did take that to heart, and that is why the cyber security line of business was announced. They are looking at very specific areas, and we are bringing in the expertise in order to complement the team that has been put together government-wide. There will be recommendations that come out of that task force, specifically about how to identify problems, how to move forward, how to make sure that we have consistent and measurable types of statistics, how to do good certification and accreditation, and how to achieve the things that they are being measured upon, because I do agree with you, you just can't say, here are the requirements, go out and do it, and not provide the help and assistance that they need, especially when they are asking for it. So the products that will come out of the cyber security line of business we are very hopeful will address the issue of giving further guidance, without issuing new policies. Ms. Norton. I don't understand what you mean about policy-- being proscriptive as to policy. As I understand it, they want greater guidance in meeting the requirements and a clarification of FISMA's assessment guidelines. I don't see where there is policy proscription involved in that. Mr. Wilshusen. One of the sources that the agencies can look to is NIST. Since FISMA was enacted, it placed specifically a responsibility to NIST in preparing and providing guidance and requirements to agencies and implementing the various aspects of FISMA. Over the last several--2 years, NIST has come out with guidance, and indeed they are going to be coming out with some additional guidance in different areas going forward. Ms. Norton. Well, they can look to that, and they could have looked to that all along, I take it. Mr. Wilshusen. Over the last couple of years they have issued new guidance. Ms. Norton. Well, all I can say is if the agency--if this large percentage of the agencies that is, a super majority say we need greater guidance, it does seem to me that whatever is in place is insufficient, and that the responsibility of the administration centrally is to assure that they get that guidance so that these pathetic grades do not come before the committee again. Thank you very much, Mr. Chairman. Chairman Tom Davis. Thank you very much. The gentleman from Tennessee. Mr. Duncan. Well, thank you, Mr. Chairman. I remember when we passed the one agriculture bill, farm bill a few years ago, 2 or 3 years ago, the Wall Street Journal had an editorial--and the bill was called the Farm Security Act--and it said any time we have the word ``security'' in a bill, we ought to give it 4 times the scrutiny because they were putting the word ``security'' in every bill, and we were going to great, great expense, and not getting a lot of bang for the buck, so to speak. And then I have also read and heard that every computer system is obsolete the day it's taken out of the box now because the technology is moving so fast. So the concerns I have--and I know Governor Gilmore from Virginia, who chaired the President's Commission on Security and Terrorism, he said-- in his cover letter to the President, he said we must resist the urge to try to achieve total and complete computer because he said it's not attainable, and if we aren't careful, we will drain our resources from other things that are achievable. So I guess the two concerns I have is, No. 1, the cost of some of these things, because what I read repeatedly, I remember the FBI came up with a computer system that we spent hundreds of millions on, and then they said it was a disaster after we had paid for it. So what do we do on the cost of some of these things? Are we looking at those costs and what we are getting for our money so we don't just go ridiculously overboard? And second, are we settling for a Mercedes instead of constantly seeking to get Rolls Royces in regard to these systems? You've always got these companies that want to sell you more and better and newer, and I'm just wondering are we using a little common sense in regard to some of these things? Mr. Wilshusen. Well, certainly you are absolutely right, there is no way to provide absolute assurance that you are going to prevent any particular security infractions or violations and the like. You can never give 100 percent assurance that you are going to be able to thwart all security threats. What you have to do, and what FISMA requires, is that you have a risk-based program and process in which you assess the risk to your systems, and then come up with cost-effective measures to protect against those particular risks. And certainly, that is one of the key underpinnings of any information security program is having it based on risk. Mr. Duncan. All right. Yes, ma'am. Ms. Evans. As far as your question about evaluating the cost based on the cyber security program, every agency is required, as they bring forth their IT investments, to ensure that the cyber security aspect, the risk associated with implementing that system, is addressed, and the costs are included in the cost of that business case coming forward. So they have to look at how to secure the system against the benefits that they are going to achieve for implementing that system to ensure that there is an adequate return on investment as they go forward. So the business case process does get to your other concern about ensuring that cost is being adequately addressed as they go forward. Mr. Duncan. Well, I just don't want to see us go ridiculously overboard on the costs, or in any other direction, and have to buy new computer systems at hundreds of millions or even billions of dollars worth of cost just because somebody comes up with a little better system the next year than we had the year before. I mean, we just can't afford to keep doing that. And then have us read and hear at hearings and read in the paper that systems that some department or agency bought 1 year, as soon as it's taken--as soon as it's put on line, it's not what it was promised to be. So I just hope you will take those considerations--those concerns into consideration. Thank you very much, Mr. Chairman. Chairman Tom Davis. Thank you very much. Let me do a couple of followups. The annual scorecard reflects that many of the larger agencies have--consistently are poor performers, it may be because of the complexity of their system. Has OMB identified a trend here? Ms. Evans. We have gone through and looked at the issues associated with the larger agencies. I think it does get back to some of the other high level issues that have been raised by the committee themselves, which is proper attention from management and ensuring that the priorities are established within the Department to be able to move forward. And a lot of it has to do with the leadership aspect of giving the proper attention to the program. So the way that we are trying to address that, again, is back to the accountability issue, putting the proper tools in place, working with the agencies, but using the President's management agenda to hold the cabinet secretaries accountable for their performance in this area. Chairman Tom Davis. And CIOs could be great, but if the cabinet secretaries aren't paying attention, or the managers, it makes it a lot tougher, doesn't it? Ms. Evans. Right. So we are trying to make sure--the administration is trying to make sure--and is making sure through the President's management agenda--that the cyber security aspect of anything that they do is brought to the level of the attention of the Deputy Secretary and the Secretary, who are responsible for the overall programs of their department. Chairman Tom Davis. Let me just talk about the certification and accreditation, this C and A process, so to speak. I know that one of OMB's objectives in its plan of action is having all the systems C and A'd. But many IGs are reported on a very inconsistent quality of agencies C and A process. If the number of certified and accredited systems is increased, but there is a question about the quality of the processes, should we question the value of that information? And I will ask Mr. Wilshusen to also respond. Ms. Evans. Well, I was going to say the shorter answer is yes, you should question the quality of that based on the IG's finding; and that gets back to making sure that we provide better guidance where the agencies are asking for that, and working with the IG community and working with the CIOs as to having a good credible certification and accreditation program so that it does insert the discipline of always constantly looking at the risk. Mr. Wilshusen. And I would agree, you certainly do need to question those statistics. You know, just looking at what the agencies have reported in terms of 77 percent of all the systems have been certified and accredited, but one of the key aspects of that is to have a testing contingency plan that you need in order to be certified and accredited, and yet the agencies are also reporting that only 57 percent of their systems have testing contingency plans. So just that, in and of itself, shows that there is some question about the reliability of that data. Chairman Tom Davis. We are going to hear Daniel Matthews, who is the DOT's CIO, suggest in his testimony eliminating timing differences between the IG and the agency reports in order to create a common point in time for measuring the status of an agency's IT security program. I can see the merit of that change; I would appreciate any comments either of you might have on that. Mr. Wilshusen. OK. In terms of having an as-of date, what that would typically allow would allow the IGs to be able to perhaps verify the information that the agencies are reporting on their report cards in their performance measures, if that is the goal of having such an as-of date. Similar to like on the financial statement report where we have the end of the fiscal year, and then the IGs have another 45 days to make the report on it. But other than that, you know, I'm not sure what the benefit would be. Chairman Tom Davis. All right. Ms. Evans. I was going to say, I concur with that. And we are just--we would proceed with caution on an as-of date because we want to make sure that interaction between the IGs and the CIOs for their programs are ongoing, even while they are still doing this annual reporting as well. So there is nothing wrong with getting an as-of date in order to have consistency for reporting, as long as the other goals are met. Chairman Tom Davis. OK. Thank you very much. Mr. Ruppersberger. Mr. Ruppersberger. I just have one question of you, Ms. Evans. The Federal Information Security Management Act extends a requirement from the Paperwork Reduction Act that agencies develop detailed inventories of their systems, and this seems to be a requirement that agencies have a struggle with. One official from the Department of Energy recently remarked that unless that agency overhaul gets decentralized structure, poor assessment under FISMA were guaranteed for years to come. Do you think that there are ways that FISMA's inventory requirement could be changed to address such concerns, without compromising security? Ms. Evans. That is an issue that we are attempting to address with the change in the scorecard criteria as well. Chairman Davis brought up the fact that we are saying all systems need be to certified and accredited. At the heart of that requirement is getting to how agencies are identifying their inventory. What we intend, and the issue that we brought forward to the Interagency Task Force is to get a best practice or lessons learned from the agencies that are scoring really well on how they got a handle on their inventory process, and be able to apply that out to the agency. If at the end of that task force effort that is not possible, then we will look at other alternatives and make recommendations or changes to address the inventory issue. Mr. Ruppersberger. OK. And for 2004, three agencies did not submit independent IG reports to OMB for their annual report. Can you explain why agencies are not complying with the IG independent evaluation, and if they're not, what recommendations will you have so that we make sure they do? Mr. Wilshusen. Well, one I think was in the case where they--I think that was from the previous year, when DOD and VA did not submit their report. Mr. Ruppersberger. And that is not an issue now? Mr. Wilshusen. Not as much this year, I don't think. Mr. Ruppersberger. Well, you say not as much though; if it's not, let's talk about---- Mr. Wilshusen. OK. I'm sorry, right. No, I don't think that was a major issue. Mr. Ruppersberger. For any of the agencies. Mr. Wilshusen. That's correct. Mr. Ruppersberger. OK. That's good news then. Chairman Tom Davis. Anyone else with questions? Anything you would like to add to clarify anything? Ms. Evans. Well, the only thing, sir, I would like to add is that we appreciate the focus of the committee on this issue because, as you know, it is a continuing priority for the administration in that we want to continue to make sure that cyber security is at the forefront of everything that we do. You have to have this going forward and manage the risk as we continue to take more and more information and move more and more--and deploy more and more in technology. So thank you for your oversight. Chairman Tom Davis. And thanks for what you're doing. I'll just say, all you need is a bad adverse cyber event and everybody is going to be all over this thing and asking the questions that we're asking now, why wasn't this done. And I'm not sure who the fall guy will be, but it ain't gonna be me. And the difficulty in the private sector in many ways are ahead of us because they always are looking at the downside, they have to look at that. In government, many times the managers will take the risk that it won't happen on my watch, and they will go ahead with some of their other priorities; and yet we know we're talking so people out there--for their reasons are trying get in. So we appreciate your efforts on this, and the CIO's efforts. I think a lot of this depends on how close our CIOs are working with the agency heads at the end of the day. The other thing is, I think ultimately these FISMA report cards are going to have to be tied to funding because sometimes that's the only thing people understand, you can preach, you can give them boxes to check, but if you tie it to funding, that really gets their attention, and that may have to be the next step if we continue to see the occurrences we do with some of these report cards. We're going to hear from some very good CIOs in the next panel that have just very difficult jobs. These are difficult jobs in some of these agencies where you are putting a lot of their elements together, some of them that have been not working well for a long time, but we'll get to that. Anything you want to add? Mr. Wilshusen. Right. And I would just like to also express my appreciation for these oversight hearings because this certainly does help to hold the agencies accountable for implementing information security, and also with light comes heat, and heat usually brings action. And hopefully the increase of attention that this committee brings will help to improve that as well---- Chairman Tom Davis. And a lot of times we're just oversight; in this case we have jurisdiction as well. The FISMA came out of this committee. We do share oversight responsibilities with the Commerce Committee and with the Homeland Security Committee on which I serve. And that's good, I think we want everybody looking at this. I want to see more focus on this from more committees and more questions answered, that's what gets agency heads' attention. But Ms. Evans, we appreciate your efforts on this. Sometimes you're the voice out there in the wilderness crying, but I know you have--your bosses are behind what you're doing and everything as well, and we want to make sure you have the tools to get the job done. Thank you very much. We will take about a 2-minute recess and set up for the next panel. [Recess.] Chairman Tom Davis. We are now going to move to our second panel, and it is a distinguished panel indeed. We appreciate having everybody back. Mr. Wilshusen, who is here to stay on to answer questions but doesn't need to be sworn in again. We have Bruce Crandlemire, who is the Assistant Inspector General for Audit, U.S. Agency for International Development. John Streufert, the Acting Chief Information Officer of the U.S. Agency for International Development. Mr. Frank Deffer, who is the Assistant Inspector General for Information Technology, Department of Homeland Security. Steve Cooper, no stranger to this committee, the Chief Information Officer, Department of Homeland Security. Ted Alves, the Assistant Inspector General for IT and Financial Management, Department of Transportation. Daniel Matthews, the Chief Information Officer, Department of Transportation. It is our policy that we swear all the witnesses in, so if you could just rise and raise your right hands. Can we identify the folks in the back who will be answering questions, too? Mr. Wilshusen. Ms. Melinda Dempsey, USAID. Mark Norman, who is the Audit Manager who has all the detail knowledge. Chairman Tom Davis. Great. Thank you. Mr. Crandlemire. Phil Heneghan, the Information Systems Security Officer, USAID. Mr. Deffer. Edward Coleman, my Security Director. Chairman Tom Davis. Excellent. Mr. Alves. Rebecca Leng, Deputy Assistant Director. Mr. Matthews. This is Ed Densmore, Director of IT Security, Department of Transportation, and Dr. Dan Mehan who is the CIO of the Federal Aviation. Chairman Tom Davis. You have enough help there, don't you? And how about in the back? I just need to make sure the clerk gets everybody down for the record. OK. Thank you. [Witnesses sworn.] Chairman Tom Davis. Thank you all very much for being here. We've got a 5-minute rule we try to follow. The goal is to get out of here about noon, so it will be 5 minutes apiece. So that leaves us time for questions and we'll be fine. Your entire statement is in the record, so it will be based on that. Mr. Crandlemire, we will start with you, and thank you for being with us today. STATEMENTS OF BRUCE N. CRANDLEMIRE, ASSISTANT INSPECTOR GENERAL FOR AUDIT, U.S. AGENCY FOR INTERNATIONAL DEVELOPMENT; JOHN STREUFERT, ACTING CHIEF INFORMATION OFFICER, U.S. AGENCY FOR INTERNATIONAL DEVELOPMENT, ACCOMPANIED BY MARK NORMAN, USAID OIG; MELINDA DEMPSEY, USAID OIG; PHILIP M. HENEGHAN, USAID; FRANK DEFFER, ASSISTANT INSPECTOR GENERAL FOR INFORMATION TECHNOLOGY, U.S. DEPARTMENT OF HOMELAND SECURITY; STEVE COOPER, CHIEF INFORMATION OFFICER, U.S. DEPARTMENT OF HOMELAND SECURITY, ACCOMPANIED BY EDWARD G. COLEMAN, DHS OIG; TED ALVES, ASSISTANT INSPECTOR GENERAL FOR IT AND FINANCIAL MANAGEMENT, U.S. DEPARTMENT OF TRANSPORTATION; DANIEL MATTHEWS, CHIEF INFORMATION OFFICER, U.S. DEPARTMENT OF TRANSPORTATION, ACCOMPANIED BY REBECCA LENG, DOT OIG; ED DENSMORE, DOT OIG; NATE CUSTER, DOT OIG; VICKI LORD, DOT OCIO; AND DR. DAN MEHAN, CIO, FAA STATEMENT OF BRUCE N. CRANDLEMIRE Mr. Crandlemire. Thank you, Mr. Chairman, and other committee members, for the opportunity to provide testimony for the U.S. Agency for International Development's compliance with FISMA. As you requested, my testimony will focus on the state of information security at USAID and the methodology with which we used to perform our audit in 2004. In addition, I will discuss the need for standardized FISMA auditing framework and possibly what guidance would be needed for agencies to fully comply with FISMA. USAID has made many positive strides over the last several years in addressing information security weaknesses. In particular, USAID has made several improvements in response to audits performed by my office and in turn substantially improved its computer security program. In 1997, the Office of Inspector General identified information security as a material weakness at USAID; USAID information technology officials agreed with our conclusion and included it in USAID's annual report as required by FMFIA. At that time, USAID did not have an organizational structure that clearly delegated information security responsibilities, policies that provided for an effective information security program, or key management processes to ensure that security requirements were met. These material weaknesses remained outstanding for several years until fiscal year 2004, when USAID concluded, and we agreed, that information security was no longer a material weakness at the agency. In the recent 2 years, the most significant changes are an appointment of an information security officer and the implementation of a centralized information security framework. Under this framework, USAID centrally manages its Windows 2000 domain servers, firewalls, and virus scan software for most of USAID's networks; instituted a process to assess information system security for the purchase of capital assets; and is continually updating its information security policies and procedures. The agency has also identified several technological changes to improve its computer security. For example, they deployed Windows 2000, which has allowed the agency to lock down and configure security settings and incorporate many security improvements in comparisons with Windows 98. They have installed operating network sensors to detect unauthorized attempts to access our network. They run daily scans of its worldwide network to proactively identify potential vulnerabilities. They have also implemented a tips of the day program, which is an automated security awareness program that provides reminders to all system network users each day as a prerequisite to sign into the network. Through these systemwide information technology and network changes, information security and information security awareness at USAID locations around the world have been significantly increased. Although USAID has made substantial progress in improving security, information security weaknesses still remain. As reported in our 2004 FISMA audit report, the agency had not developed a disaster recovery program for its three major systems and had not tested the disaster recovery programs in two other systems. The OIG methodology for assessing USAID information security into FISMA was to conduct an audit as opposed to an evaluation. For fiscal year 2004, our audit field work was conducted from August 19th to October 6th and involved over 600 hours. In addition, as part of our financial statement audit, we incorporated about 2,800 staff hours as part of our general control work. This work complemented our FISMA work. To perform the audit, we interviewed USAID officials to discuss their answers to the OMB questionnaire, and then we tested the support for the answers. For each of USAID's 49 answers to the questionnaire, we determined whether the agency's answer was supported by source documentation. I am going to move now to the need for an Inspector General auditing framework for information security. In our opinion, since the OIG input to the FISMA process is used to upgrade security among civilian agencies, there is an implicit assumption that there must be a defined common set of attributes to facilitate meaningful comparisons of independent evaluation or audits performed by each IG. Further, the establishment of these attributes or common security auditing framework should be developed on a collaborative basis among the IG community, OMB, and the Government Accountability Office. This framework also should address the resources needed to carry out the development and implementation of the framework along with congressional support for such an initiative. I have just a couple comments on the existing process. I think the agencies and the IGs need more time to prepare or more time to respond to the annual FISMA questionnaire. Since 2002, the time between the issuance of the guidance until the time we actually start--we actually have to report in has gotten less. In 2002, it was 76 days, and this last year it was only 44 days. We need more time so we can more efficiently use our audit resources. That concludes my statement. [The prepared statement of Mr. Crandlemire follows:] [GRAPHIC] [TIFF OMITTED] T0562.051 [GRAPHIC] [TIFF OMITTED] T0562.052 [GRAPHIC] [TIFF OMITTED] T0562.053 [GRAPHIC] [TIFF OMITTED] T0562.054 [GRAPHIC] [TIFF OMITTED] T0562.055 Chairman Tom Davis. Thank you very much. Mr. Streufert, thanks for being with us. STATEMENT OF JOHN STREUFERT Mr. Streufert. Thank you, Mr. Chairman, and members of the committee. I want to thank you for the opportunity to testify on the status of our FISMA implementation and our security program. We submitted detailed information in response to your questions. What I would like to do in my oral remarks is address the 10 reasons that helped us improve our IT scores during the past period. No. 10, our industry partnerships. USAID has teamed with industry both in services and in our tools to increase performance. There has been a commitment to continuous improvement that has now spread over a 2-year period. No. 9, managing risk. Our agency information system security officer defined risk as critical. We want to be compliant with the rules but make sure that compliance does not overshadow our responsibility to attend to threats and impact on our business results. No. 8, central administration. USAID IT security sensitive settings have been drawn from 80 countries and 20 time zones to be administered centrally at AID headquarters. This would not have happened without executive support at all levels. We have one organization and one approach when it comes to security. Continuous awareness. As Bruce mentioned, we have a product called tips of the day implemented worldwide where 135,000 instances of training and awareness came into effect. Our awareness also includes the followup on every action item we have of a finding of a security improvement. Item 6, rules of behavior. The agency has defined that the use of the network and our systems is a privilege and not a right. Though our employees have overwhelmingly supported IT security for the imperative it is, a handful of employees who have violated IT rules of behavior have been submitted for disciplinary action and, where warranted, recommended for removal for the reasons of that improper conduct. Continuous measurement. USAID has 15,000 devices connected to it worldwide, 5,000 software tools and packages, 8 major applications and 3 what we call general support systems against which our disciplines are applied. These devices are centrally checked worldwide 10 times a month for among 33,000 possible IT security weaknesses using the same tool that protects worldwide international credit card transactions. We felt that the most sophisticated tool was in fact important for our purposes. Management accountability, to refer to an item one of the members drew attention to. We give the boss of our 90 technical managers worldwide a grade of A to F once a month, because it is their business at risk in addition to ours collectively. Regions and bureaus who represent these 90 technical managers and their bosses receive grades A through F for all their reporting units, which has created a competition for excellence. Our managers have performed this work in harm's way, Afghanistan, Iraq, and other hardship posts, and among operating environments where power and other circumstances such as interrupted telecommunication lines have made it difficult. Notwithstanding these difficulties and including setting up for tsunami relief, we have been able to implement a security program and found significant benefits for it. Item No. 3, correlation of threats. We have found it essential to install sensors throughout our networks to capture those critical events and submit them to a statistical correlation so that we may find whether systematic attacks in fact are occurring which otherwise would be hidden from visual inspection. Item No. 2, continuous audit review. We have forged over the past 7 years a partnership with our Inspector General who has in fact audited every significant IT initiative of our organization for the past 7 years. We have come to learn that the harshest criticism from our auditors and others, GAO and externally, is a source for building on strength, and we have chosen to respond to those items of improvement in just that way. Last and perhaps most importantly, our Administrator Andrew Natsios defined IT security as critical to success of the agency. He has defined the need to improve management systems across the board, and information technology was one of those areas of improvement. In each of the cases where a critical issue was facing the agency in the area of IT security, when we carried it forward to him we received his full support. We believe the correct decisions were made, which in fact has been critical to the success of our organization and our security effort. Thank you very much. [The prepared statement of Mr. Streufert follows:] [GRAPHIC] [TIFF OMITTED] T0562.056 [GRAPHIC] [TIFF OMITTED] T0562.057 [GRAPHIC] [TIFF OMITTED] T0562.058 [GRAPHIC] [TIFF OMITTED] T0562.059 [GRAPHIC] [TIFF OMITTED] T0562.060 [GRAPHIC] [TIFF OMITTED] T0562.061 [GRAPHIC] [TIFF OMITTED] T0562.062 [GRAPHIC] [TIFF OMITTED] T0562.063 Chairman Tom Davis. Thank you very much. Mr. Deffer. STATEMENT OF FRANK DEFFER Mr. Deffer. Thank you, Mr. Chairman, and members of the committee, for the opportunity to be here today to discuss the status of FISMA implementation in the Department of Homeland Security. Mr. Chairman, I would note at the outset that we in the Inspector General's office have developed an effective working relationship with the DHS CIO and his staff in order to facilitate FISMA compliance at DHS. As we reported last year, DHS has made significant progress in developing and implementing its information security program at the headquarters level. For example, DHS developed the necessary plans such as the information security program management plan to provide the foundation for an agencywide program. Based on our review of those plans, DHS has established an adequate structure, blueprint, and process to implement and manage its program. Also, the Department has developed an adequate process to report security weaknesses in its plan of action and milestones, or POA&M, and has adopted an enterprise management tool, trusted agent FISMA, to collect and track data related to all POA&M activities. Even with these efforts, however, there are a number of factors that are hindering further progress. Specifically, one of the impediments to implementing DHS's program is that the CIO is not a member of the department's senior management team. Therefore, the CIO does not have the authority to strategically manage agencywide IT programs, systems, or investments. Furthermore, there is no formal reporting relationship between the DHS CIO and the component CIOs or between the DHS CISO and the department security managers. Also, DHS does not have an accurate and complete system inventory. An initial attempt at developing an inventory in 2003 did not provide an accurate picture of DHS's information systems. In September 2004, DHS began a second effort using an outside contractor to establish a system inventory. Finally, while DHS has developed an adequate process to report security weaknesses in its POA&M, DHS components have not established verification processes to ensure that all IT security weaknesses are included. Overall, DHS is on the right track to create and maintain an effective program. However, the Department and its components still have much work to do to become fully FISMA compliant. Mr. Chairman, as you know, annual information security evaluations began 4 years ago with the Government Information Security Reform Act [GISRA]. And I would say that, after being involved in four of these efforts, two at the State Department OIG, and using a different approach each time, it is becoming clear that a more standard approach is needed, perhaps similar to that used in financial audits. This standard framework would ensure--help ensure that all IGs review and report on the same information across all agencies. Currently, each IG performs its FISMA evaluation based on its interpretation of FISMA and OMB guidance. A standard audit framework should allow OMB and Congress to more effectively and objectively determine the status of information security across the entire Federal Government. Finally, let me say a few words about what additional guidance or procedures are needed to help improve FISMA compliance. OMB issues annual guidance to agencies and IGs to promote consistent reporting across government and to ensure that agencies comply with FISMA. But this guidance needs to be clearer. For example, organizational components in DHS have struggled with the definition of a system for FISMA reporting. This has hindered DHS's ability to develop a reliable inventory. Another area of concern is how security of systems is measured by the FISMA metrics. OMB asks the agencies and IGs for the number of systems that have been reviewed, certified, and accredited, but treats all systems the same. That is, systems are not differentiated between routine or mission critical. For example, an agency may have certified and accredited 80 percent of its systems, but it could still be seriously at risk if its mission critical systems are those that have not been certified and accredited. Mr. Chairman, this concludes my prepared statement. I appreciate your time and attention, and welcome any questions from you or members of the committee. [The prepared statement of Mr. Deffer follows:] [GRAPHIC] [TIFF OMITTED] T0562.064 [GRAPHIC] [TIFF OMITTED] T0562.065 [GRAPHIC] [TIFF OMITTED] T0562.066 [GRAPHIC] [TIFF OMITTED] T0562.067 [GRAPHIC] [TIFF OMITTED] T0562.068 [GRAPHIC] [TIFF OMITTED] T0562.069 [GRAPHIC] [TIFF OMITTED] T0562.070 [GRAPHIC] [TIFF OMITTED] T0562.071 Chairman Tom Davis. Thank you very much. Mr. Cooper, I understand that you announced today, at least from reading the trade press, that you are leaving your post. Mr. Cooper. I did. Chairman Tom Davis. I just want to say--well, I hope this isn't your last time before the committee; we may bring you back as a consultant, but we appreciate the job that you have done. Mr. Cooper. Thank you. Chairman Tom Davis. You have been steadfast in coming before us and offering your ideas, and we consider you a valuable asset to the committee. Thanks for being with us. STATEMENT OF STEVE COOPER Mr. Cooper. Thank you, Mr. Chairman, and members of the committee. It is my pleasure to appear before the committee again, and I wish to thank the chairman and the members for providing me the opportunity to update you on our efforts and progress in integrating and securing information systems within the Department of Homeland Security. I would like to begin by acknowledging the important role that our Inspector General plays in the Department. We have established an extremely effective and collaborative partnership with our Inspector General, and especially with respect to the development and operations of information technologies and support of the critical missions of the Department. The IG has been an important and independent voice as the Department formulates a strategy for building a robust and effective information security program. Mr. Deffer has provided what I believe to be an accurate and detailed assessment of our progress to date and rather than repeat what has been already said I would like to focus my remarks on the future. The DHS Information Security Program is structured around compliance with FISMA as well as OMB and NIST guidance. I want to stress that we are not proud of our failing grade. We have done much, and much needs to be done. Specifically, we have implemented and continue to implement a number of security performance metrics to address the issues represented by the FISMA grade. I fully understand that the success of the Department is dependent upon our ability to protect sensitive information used to secure the homeland, and to this end, the Department's Information Security Program has been designed to provide a secure and trusted computing environment based upon sound risk management principles and program planning. The development of a formal trust model within this program will eliminate institutional barriers that regularly divide organizations and will enable disparate agencies to more effectively share information within this common trusted framework. We have implemented a digital dashboard that provides us for the first time with the status of security performance based upon computed FISMA metrics, and we have implemented a security performance scorecard. Three key Information Security Program initiatives under way for over a year now are beginning to provide tangible results. As these three efforts converge, together they will pave the way for real and measurable security improvements in the near future. These include, first, completing a comprehensive baseline inventory for defining accreditation boundaries and assigning responsibilities for security controls for appropriate program officials throughout the Department; second, fielding a robust set of automated enterprise security management tools to optimize our security processes; and, third, implementing a comprehensive and repeatable set of metrics for holding program officials accountable. The baseline systems inventory project now under way has already identified a significant number of legacy systems that were not previously identified in our initial systems inventory that we did during the standup of the Department. At one of the organizational elements, this most recent system inventory project has now identified 106 information systems programs compared to the 5 that were previously identified at standup. In response to this legacy issue, the Department is developing a comprehensive remediation plan for completing all the required certification and accreditations by the end of fiscal year 2006. Related to these actions, we have implemented a department plan of action and milestones process and an enterprised system to manage that plan of action. Evidence that DHS is successfully institutionalizing this process is demonstrated by the fact that our initial fiscal year 2003 program and milestones contained less than 100 line items, meaning task activities that we identified that we needed to do, while our current plan now contains several thousand line items and activities. Furthermore, we have implemented a certification and accreditation tool that will ensure C&A equality and map that certification and accreditation testing to our established policies. The C&A and remediation plan will include a prioritized list of systems to be certified based upon the system's security impact level, which means the systems with higher security impact levels will be the first systems that we will accredit if not already accredited. This remediation plan will identify a variety of funding alternatives for completing all certifications and accreditations, and our new automated security management tools are already designed to streamline this process. Use of this tool has now been mandated for all activity initiated after April 10th. This aggressive remediation effort will provide a sound baseline of secure systems with appropriate controls in place. However, we must continue to improve our security posture throughout the life cycle of each and every system or application in use in the Department. For this reason, we are continuing to refine the program so that we will remain relevant for the future. Program enhancements currently under way include developing a communications plan for our information security program, to include a Web-based information security portal that will improve the availability of information security data to all DHS employees, including those who do not have access to DHS Online; and, publishing an updated Information Security Program strategic plan outlining a revised vision for the future of the program based on lessons learned over the past 2 years. Finally, to sustain a viable and healthy information systems program and security program, I know that we must have strong support throughout the Department. Through the DHS Chief Information Officers' Council, I will work with each member to ensure that we not only continue to improve our security posture through periodic program reviews, but that we also implement new and improved measures wherever appropriate. Thank you, and I look forward to your questions. [The prepared statement of Mr. Cooper follows:] [GRAPHIC] [TIFF OMITTED] T0562.072 [GRAPHIC] [TIFF OMITTED] T0562.073 [GRAPHIC] [TIFF OMITTED] T0562.074 Chairman Tom Davis. Thank you very much. Mr. Alves. STATEMENT OF TED ALVES Mr. Alves. Thank you. Thank you, Mr. Chairman, and members of the committee for the opportunity to testify on the progress the Department of Transportation has made and the challenges it faces implementing FISMA. This committee has been a driving force behind improvements made over the last several years in protecting Federal information and information systems. I also want to take this opportunity to compliment OMB, NIST, and GAO for the leadership roles they have played in this effort. With an annual IT budget of about $2.7 billion, the Transportation Department maintains over 480 systems to carry out the Department's mission. For example, the Department operates financial systems that process over $35 billion in grants to States and local governments, and the Federal Aviation Administration relies on about 100 systems to provide safe and efficient air traffic control 24 hours a day. As you requested, I will discuss the progress Transportation has made and the challenges it faces to strengthen information security practices, the need for a framework to guide Inspector General FISMA audits, and the approach we take to audit computer security issues. The commitment to improve information security begins at the top, and we attribute much of the Department's progress over the last 2 years to the support provided by Secretary Mineta. In early 2003, the Secretary appointed a Chief Information Officer and significantly strengthened his roles and responsibilities. Since then, the CIO has played a much more prominent role in managing IT issues in all DOT component agencies. Key improvements the Department has made include the following four areas. First, the CIO invigorated the Investment Review Board, which now considers security issues when reviewing the major systems. Second, the Department enhanced its ability to protect systems from internal and external attacks by, among other things, establishing an incident response center to prevent, detect, and analyze intrusions from the Internet. Third, the Department increased the number of certified and accredited systems from 33 percent to over 90 percent by dedicating resources to do the reviews and by closely monitoring progress. And fourth, the Department significantly strengthened background checks on contractor personnel. Notwithstanding this progress, DOT still faces challenges to secure its systems. These include: The Department needs to enhance security over air traffic control systems. We have reported that security deficiencies affect en route computer systems which control high altitude traffic. Because the issues are sensitive, we can only cover two issues today. First, FAA certified that en route systems were secure, but the review was limited to a developmental system. FAA has agreed to review operational systems deployed at the 20 en route centers. Second, FAA agreed to identify a contingency plan to restore air service in the event of a prolonged en route center disruption. We recently expressed concern about FAA's progress correcting these deficiencies to the FAA Administrator, the Office of the Secretary, and the CIO, and we are working closely with those officials to ensure continued progress. The Department needs to improve the security certification process. We also found some deficiencies in the quality of certification reviews, including inadequate risk assessments, lack of evidence that tests had been performed, and in one case a test item failed when we retested it. The Department also needs to continue its focus on emerging threats. The fact that you raised the question of whether a framework is needed to help standardize IG FISMA reports suggests that the current framework does not fully meet oversight requirements. This issue is being addressed by the President's Council on Integrity and Efficiency, a group of Presidentially appointed IGs, but they have not yet reached a consensus. We think a broader discussion involving the key players, congressional staff, OMB, GAO, and the IG community could help forge a consensus among all interested parties. The IG community would benefit from better understanding how our FISMA reports are used by oversight organizations; oversight organizations would benefit from understanding the challenges the IG community faces addressing computer security issues at agencies with very different system risks and missions. Regarding our approach to meet FISMA requirements, each year we do detailed tests on a subset of systems to answer OMB's specific questions such as the number of systems with contingency plans. We also perform computer security audits focused on specific systems of security issues. We use all of this work to reach conclusions about the status of DOT's Information Security Program when preparing our annual FISMA report. Mr. Chairman, this concludes my oral testimony. I would be happy to answer any questions. [The prepared statement of Mr. Alves follows:] [GRAPHIC] [TIFF OMITTED] T0562.075 [GRAPHIC] [TIFF OMITTED] T0562.076 [GRAPHIC] [TIFF OMITTED] T0562.077 [GRAPHIC] [TIFF OMITTED] T0562.078 [GRAPHIC] [TIFF OMITTED] T0562.079 [GRAPHIC] [TIFF OMITTED] T0562.080 [GRAPHIC] [TIFF OMITTED] T0562.081 [GRAPHIC] [TIFF OMITTED] T0562.082 [GRAPHIC] [TIFF OMITTED] T0562.083 [GRAPHIC] [TIFF OMITTED] T0562.084 [GRAPHIC] [TIFF OMITTED] T0562.085 [GRAPHIC] [TIFF OMITTED] T0562.086 [GRAPHIC] [TIFF OMITTED] T0562.087 [GRAPHIC] [TIFF OMITTED] T0562.088 [GRAPHIC] [TIFF OMITTED] T0562.089 [GRAPHIC] [TIFF OMITTED] T0562.090 [GRAPHIC] [TIFF OMITTED] T0562.091 Chairman Tom Davis. Thank you very much. Mr. Matthews, last but not least here. STATEMENT OF DANIEL MATTHEWS Mr. Matthews. Thank you, Mr. Chairman, and members of the committee. I thank you for the opportunity to appear here today to discuss the Department of Transportation's implementation of the Federal Information Security Management Act of 2002 [FISMA]. I serve as the Department's CIO, and I also currently serve as the vice chair of the CIO Council. The DOT Office of the Chief Information Officer has operational responsibility for the departmental network and communications infrastructure as well as providing shared services for the Office of the Secretary and the operating administrations currently engaged in the Department's information technology services consolidation. FISMA compliance at DOT is moving from the intensity of the past year's implementation activities to a more operational mode. Our system inventory is mature, our certification and accreditation methodology is defined, and we have begun oversight of the remediation of weaknesses identified over the course of the last 2 years. Additionally, we have been in the process of making assessments of the Department's ongoing security posture. Securing the IT assets of the Department of Transportation is a critical responsibility that falls to the CIO's office. In striving to secure those assets, many people from various areas must pull together. The strides the Department has made over the past year occurred in large measure because of the support of Secretary Norman Y. Mineta. His leadership and guidance combined with each and every modal administrator's commitment are critical to the Department's success. We are pleased to have achieved an A-minus rating on the FISMA scorecard, and we note that DOT relied on teamwork across the agency, the establishment, refinement, and validation of our system inventory, good communications, comprehensive training, and the support of the Inspector General throughout the year. This last point is critical. With our Inspector General, who is engaged, involved, and informed throughout the process, DOT makes sure that it approaches FISMA requirements appropriately and the end products and results are supportable. The teamwork for FISMA compliance was established through the acceptance of a single departmentwide methodology in lieu of individual approaches established by each operating administration. That methodology allowed us to focus and work collectively on a single plan in which all participants had confidence. This gave us the benefit of synergy, an end greater than the sum of its individual parts. If we endeavor to proceed using agency unique approaches, some agencies may have been successful and some may have faltered. With the support of an industry-recognized security subject matter expert from Titan Corp., along with agencywide buy-in and acceptance, DOT was able to reduce overall certification and accreditation schedules, manpower requirements and costs. More importantly, DOT was able to ensure accuracy, consistency, and completeness of each accreditation package. The strides made over the last year to comply with FISMA requirements were impressive. DOT has accredited over 90 percent of all operational IT systems, established a program to ensure security as part of every system's development life cycle, significantly reduced vulnerabilities of public facing systems, and improved training and communications at all levels of the organization. Moving forward, DOT is using metrics to gauge FISMA's implementation and compliance throughout the Department. This point is important. DOT recognizes that plans of actions and milestones, POA&Ms, are established from the certification and accreditation process required by FISMA and are reviewed by the Inspector General. DOT uses these POA&Ms as a mechanism to ensure we mitigate the risks and remediate vulnerabilities identified during the CNA process knowing full well that the actions taken prescribed in the POA&M will specifically improve DOT's overall security posture. To address the steps DOT is taking to further strengthen IT security, we are coordinating and cooperating with DHS on cyber exercises, we are addressing the critical need for enterprise- wide vulnerability management, we are implementing baseline security configuration standards for critical software, and we are consolidating IT services. More needs to be done. The FAA's National Air Space System is part of the national critical infrastructure program. I am working directly with the FAA senior leadership and the Inspector General to ensure FAA secures and protects the important NAS systems and telecommunications infrastructure. Ensuring the FAA constructs are measurable plans of actions in conjunction with its POA&Ms, audit reports, and IG findings, with follow through to complete its commitments is fundamental to DOT's ability to maintain current FISMA scorecard ratings. I have included in my statement some specific observations and suggestions for creation of an ``as of date'' and believe that existing FISMA guidance is adequate but have some additional comments. I look forward to answering your questions. And, again, I thank you for this opportunity. [The prepared statement of Mr. Matthews follows:] [GRAPHIC] [TIFF OMITTED] T0562.100 [GRAPHIC] [TIFF OMITTED] T0562.101 [GRAPHIC] [TIFF OMITTED] T0562.102 [GRAPHIC] [TIFF OMITTED] T0562.103 [GRAPHIC] [TIFF OMITTED] T0562.104 [GRAPHIC] [TIFF OMITTED] T0562.105 Chairman Tom Davis. Thank you very much. I think a recurrent theme both with DOT and USAID is that you are getting support at the top, that this comes--it is not just generated from the CO, it is top down, it is holding people accountable. Great stories. I hope we can learn from that. Mr. Cooper, let me start with you because your department is great but it is down. I don't hold you accountable. You are one of the best CIOs in the business, and we are sorry to see you going. But I wonder if we could talk about, you also, as you could see from some of the early comments from our members, the area everybody wants to focus on. Homeland security is a hot topic. It is an area where the systems need to be up. It is a very difficult job given the type of systems you inherited when we merged the departments. I think we can--that is a given; this was a very, very, very tough job. But we are a long way from where we need to be. We are seeing improvement, and I appreciate your opening statement. What are the major obstacles you would put together that Homeland Security faces uniquely versus some of the other agencies that make it so difficult? Mr. Cooper. OK. Let me try to answer that question directly, very specifically and very candidly. Chairman Tom Davis. This is the last bite I get at you. Mr. Cooper. No, that is all right. I am happy to come back. And let me also try to put it within the context of the FISMA scorecard, because I think this will be extremely helpful, I hope, to the committee as well as to members of the audience and interested parties and my colleagues. The first thing that we face as the Department of Homeland Security is the fact that we have inherited a huge amount from our legacy environments. Now, that translates to the inventory in the FISMA scorecard. This is not a defense. We are not where we need to be. But the scoring in the scorecard, we get minus 10 points against our total score until we can actually certify that we have inventoried 95 percent of the systems and applications that are in the Department. And here's what we're learning and here's what we found. Meaning no disrespect to my colleagues on the panel, DOT has identified 480, I think Dan said 480 significant applications or the ones that they have identified and accredited. And, again, no offense to AID, but I think you guys have nine. We have over 3,600. So there's a simple fact, it's a numbers game. All right? We move from 34 percent of that initial 3,600 to 68 percent. Now, the scorecard doesn't reflect the progress. 68 percent I admit is still a failing grade. But we know what we need to do, we are working with our IG, we have demonstrated that our certification and accreditation process is sound. We need to stay the course and apply it. We have committed to completing 100 percent certification and accreditation by fiscal year 2006. Another major area. Configuration management addresses the different parts and pieces in the FISMA scorecard. Now, what that translates to is how many different operating systems or platforms or environments does the Department have? We have everything that's listed in the scorecard. But I--and I am the one that can be held accountable. I made a tactical and conscious decision that we were not going to put significant effort into the configuration management aspect of all of the listed platforms for the following reason: We are also undergoing a major IT infrastructure transformation program. We are consolidating those operating platforms and the operating systems and the associated applications, and we are eliminating some of those. Therefore, I made a decision that said don't put any energy into publishing guidelines within the Department in our Information Security Program around configuration management for those platforms and operating systems that we are going to retire. I am the person, I am accountable. But it reflects in our score because we then don't--we legitimately don't have anything in that area. Another thing, final thing we did very quickly. The training of all DHS employees in information assurance and information security management is an extremely high value activity. It scores very few points on the scorecard. But we consciously made a decision, again. We have trained almost 100 percent of all of our employees across the Department. That's 180,000 people, and we accomplished that in the past 2 fiscal years. So those are very specific examples in the framework of the scorecard that I think help reveal some of the complexities that we're facing but also significant progress. Chairman Tom Davis. What are the most difficult parts of all the disparate systems that you have? You know, what are the most dysfunctional or most vulnerable areas that you have at DHS? Mr. Cooper. That's a tough question in that I'm not sure I want to put any parts of the Department on the spot. Chairman Tom Davis. Well, but you inherited legacy systems and some of these. Like we know, the old INS system just wasn't working. Now, we've got new--I mean, this is something that this committee has talked about and everything else. I am not trying to go out to tell terrorists where we are vulnerable or something. But within those confines you have some old legacy systems that you haven't been able to move forward on as quickly as others and stuff like that. Give me a priority list, in other words. Mr. Cooper. OK. I'm going to share at least the part that we've identified. Chairman Tom Davis. You're leaving now. I can't do anything. Mr. Cooper. That's true. Chairman Tom Davis. You are under oath, too. Mr. Cooper. They can fire me early, I guess. Chairman Tom Davis. But we will hire you. We will pick you up if you need it. Mr. Cooper. Here's what we found. And, again, please understand, I offer this in a very constructive way. It's not meant to be critical. Chairman Tom Davis. Absolutely. Mr. Cooper. One of the areas that we have found a little bit more challenged is in some of the legacy INS, Immigration and Naturalization Services, and Citizenship and Immigration Services, as those two entities exist now. But in fact those were more or less, I won't say truly combined, but they were all under the auspices of an organizational structure inside the Department of Justice that pretty much operated from the same or similar platforms. Now, we have broken them apart, so to speak. But in breaking them apart, we actually don't have all of the IT infrastructure and skills and personnel and everything fully in place yet. Now, again, plans are in place, we are making good progress, but it remains a challenge because we just don't have quite enough of the resources in the timeframe we would like to have to finish a lot of the certification and accreditation, some of the securing activities that we need to do. Our Customs and Border Protection environment has actually made very, very good progress in a lot of areas, and what we are doing is drawing upon the positive skills and the positive performance in CBP to now reach over and assist ICE and CIS. So we figured out ways that we can actually leverage where we have good stuff going on and address some of the challenge areas. Chairman Tom Davis. How many incidents--well, we don't really get the level of incident reporting. Am I right? We don't get the incident reporting that we'd like to get that we feel is accurate. Is that fair? Mr. Wilshusen. Well, OMB reported that in their 2004 report on FISMA that they felt that the reporting was sporadic from the different agencies, and they had questions and concerns about that. Chairman Tom Davis. Well, let me just go with each agency and ask the CIO or IG or which office; but start with AID. Are you getting a lot of incidents of penetrations every year, and do you test yourself? Do you hire people who come in and try to penetrate? That was inarticulate, but I think you understand. Mr. Streufert. We're initiating some internal testing, and we're constantly monitoring for intrusions, and I think that the most constructive part of that is that we are tracking precisely those patterns and trying to assess who's at us. So, from an internal purpose, we are doing well. Chairman Tom Davis. Is that reported up the food chain in terms of who we think is going after you? Mr. Streufert. We make every effort that we possibly can, and the comments that we collect internally on this topic are some of the descriptions that come out from elsewhere at varying degrees of descriptions, some general, some specific. And so we think an area of potential improvement is having a matching of a good taxonomy externally against what we are actually seeing, and we think that this will improve over time. Chairman Tom Davis. Let me ask Homeland Security. What are you seeing in that area? I don't want you to give away the store, but---- Mr. Cooper. No. First of all, we see hundreds of thousands of attempts on an annual basis. We actually identified 214 incidents. We reported 100 percent of the 214 both to the IG and up through US-CERT that passes over to OMB. Chairman Tom Davis. Do you have a good idea of who the people are that are trying to get in? Mr. Cooper. Yes, we do, partly because of the link into the intel environment and everything. So, yes, we do. We believe this is an area and it actually is represented in our scorecard where we are in very good shape. Chairman Tom Davis. And it helps you also target your resources when you know who is coming after you. Doesn't it? Mr. Cooper. Absolutely. Chairman Tom Davis. And how about Transportation? Mr. Matthews. Mr. Chairman, last year we had over 3,000 incidents and reported them. We do track individuals, Web sites, IP addresses that are coming toward the Department as well as other information. We routinely---- Chairman Tom Davis. One of them gets through and really gets into the system, they could run you amuck. Couldn't they? They could really destroy you? Mr. Matthews. Absolutely, no doubt, if somebody penetrates the shield, indeed they can run amuck. You know, TOPOFF III is currently going on, and when I'm sitting watching what we're doing in TOPOFF III I'm constantly reminded that if someone did a concerted effort and went after the communications of the Federal Government, its ability to respond could be impacted. Chairman Tom Davis. And it helps. I mean, I think it's reassuring to us to know that at least you have a pretty good idea of who is after you. Mr. Matthews. Yes. Chairman Tom Davis. And that helps you, doesn't it, in terms of where you spend your resources? It may or may not help your report card, but it helps you in terms of where you spend your resources? Mr. Matthews. Absolutely 100 percent. We work hand in glove with the IG to do the forensics and pursue and prosecute those individuals as well. Chairman Tom Davis. Mr. Alves, do you agree with that? Mr. Alves. Yes, I do. The Department of Transportation has made really significant progress in this area over the last couple of years, and whenever there is an intrusion they let us know immediately. We do some of the penetration testing ourselves. Chairman Tom Davis. Some of them are yours. Mr. Alves. To test the system and make sure that it's secure. Chairman Tom Davis. And Mr. Cooper, let me just ask you. The fact that you have an idea in most of these cases, I gather, who is coming, allows you to expend resources in those areas, maybe to the detriment of other areas but at least it allows you to give appropriate prioritization, and that ought to give the committee some assurance that you're on top of it. Mr. Cooper. Yes, sir. In this case, we do. And in this case, because of the capability within the Department, we work very closely with our Homeland Security Operations Centers, we work very closely with our Intelligence Analysis and Infrastructure Protection Directorate, and actually share. All of the key members of my team are cleared to the highest levels, and so we actually use a lot of the classified information to help us address risks, threats, and vulnerabilities. Chairman Tom Davis. OK. You feel--well, we'll have another conversation later. But thank you again. My 10 minutes is up. Mr. Ruppersberger. Mr. Ruppersberger. OK. Mr. Deffer, in your testimony you mentioned that FISMA does not differentiate between routine or mission critical systems. Mr. Deffer. Correct. Mr. Ruppersberger. And you continue to say that the agency might still be at risk if its security, a vast majority of its systems yet is left vulnerable, the most mission critical ones. Can you explain how your department has balanced meeting its FISMA obligations with protecting its most critical systems? Mr. Deffer. Well, I think the Department has sort of-- they've made an effort to get their systems certified and accredited. I don't know if they've--Mr. Cooper talked about this, trying to get them on a risk based methodology to certify and accredit those systems that are high priority. But the numbers don't tell us which systems that have been certified and accredited are really that important. We don't know whether--has their network been certified and accredited? I don't know. But, you know, their training management system FLETC may have been certified and accredited, and that's a good thing, but it's probably not as important as the network or other critical applications. Mr. Cooper. If I may kind of clarify. We have made a very conscious and deliberate decision to go after our mission critical systems first. So we are taking a risk-based prioritization approach to what we accredit. The good news that I can share with the committee is that the 68 percent that are now accredited include almost every one of our major mission critical systems, and we are getting to some that doesn't mean they're not important but lesser impact or risk by not accrediting them right away. That is the approach we're taking. Mr. Ruppersberger. I would like more, a little bit more about the questions that the chairman asked you, and I was going to ask you more questions but you answered some of them. One of the questions was, when do you expect that the Department of Homeland Security will come up to where they need to be? And you mentioned that your goal was 2006. Do you feel that you are on time for that goal at this point? Mr. Cooper. Yes, we do. Mr. Ruppersberger. And what is it, the end of the year, beginning of the year? Where are we? Mr. Cooper. By the end of fiscal year 2006 we expect to complete almost 100 percent of those items represented by the scorecard. Now, here's what is going to happen though, and we will see whether or not I'm a good prognosticator. Unfortunately, the way that we are going at this and the way that the scoring works in the scorecard, I think what we are going to do is we are going to jump. We may indeed be--I'm hoping we will get to a D in fiscal year 2005. I am being very candid here. Because we lose 10 points off of our total score because of this 95 percent requirement for inventory. And we will not complete 95 percent of our full inventory by the end of fiscal year 2005. We are going to be very, very close, but I am not sure we'll trip it. We are going to basically lose 20 points of our score because of the configuration management approach that I explained to you. If you deduct those 30 points from the score and we do everything else, that's 70, which puts us at 70 percent, which may creep us into a D. What I think is going to happen is we are probably going to be, I hope, at a D; and then in 2006, as we complete all this stuff, we are going to jump significantly up. So you are going to kind of see, unfortunately, not much in the score, and then we will be there. Mr. Ruppersberger. There is no question the Department of Homeland Security has a lot of administrative issues that they have to deal with, you know, inheriting all these different agencies, you know, pulling them together, the funding issues. I mean, it's a very difficult job, as you know, and I understand that. Do you feel that the system that's being used now and the standards for grading are just more of a bureaucratic type of system of holding people accountable based on Homeland Security and all the issues you have, do you think it's fair? And what would you do to change that system based on where you are now and to get to the end game? Because it's not--the grade is a standard, but bottom line, we want to get to where you can provide the best national security for our country. Mr. Cooper. Exactly. Bob West, who is our Chief Information Security Officer, and I believe very strongly that the criteria are very sound. We have no issue with the criteria. Now, Bob and I both will grumble to you and complain about the negative points that kind of in this last go-round were assessed, but we understand them and we'll live with them. What becomes most important I think is how a department like the Department of Homeland Security kind of prioritizes and applies these criteria. And you've heard, I've explained the approach that we took, I've explained a little bit of why. I believe very strongly that if the committee will allow us to stay the course, and with support of our new Secretary and Deputy Secretary, the Department of Homeland Security will indeed arrive rather quickly, although it may be fiscal year 2006, at precisely where the intent of the committee and the scorecard and FISMA represent. Mr. Ruppersberger. Do you feel that you have the money or the resources to deal with the problem. Mr. Deffer. I think applied in a prioritized approach, yes. Now any time--again, you know, I may get beaten up, it's OK, the worst they can do is fire me. Any time we have additional funding and resource we can move faster. But we believe that within the funding and resource that we have, we absolutely are on track to succeed. Mr. Ruppersberger. I don't know if you can answer the question--I may go back to Mr. Wilshusen, who is still at the panel. I am concerned a little bit about what is happening with respect to Justice, and especially FBI within Justice. We know some of the issues, that FBI is having a hard time in their technology area. And it seems to me we have other groups--we talked about this in the first panel, I know CIA and NSA are doing very well. And we cannot afford to have our FBI that is so important to our national security, especially domestic security, not be where they need to be. Can you discuss some of these issues--well, I'm going to ask you the question basically. You said that Immigration was under Justice, and now they also have some issues that you are dealing with because they are now under Homeland Security. I'm concerned that we need to really refocus and prioritize in those arenas, especially FBI. You are doing Immigration. But how can, with the problems that the FBI is having, how can we now have a grading system where the Justice Department went from I think a D or an F to a B+ or B-? Could you explain that? Mr. Deffer. Well, I can offer a couple of thoughts. I'm not sure I can actually explain it. But one of the things that works to---- Mr. Ruppersberger. And I'm going to ask you to answer this, too, Mr. Wilshusen. Mr. Deffer. One of the things that works to any department's advantage is if you have less things to do and less things to accredit and certify, then within the same resource base you can accomplish a lot more. Justice lost, if you will, a significant portion of what represented the legacy systems that weren't accredited at one point in time. We inherited them all. So I think that they---- Mr. Ruppersberger. Good news for them, bad news for you, right? Mr. Deffer. Exactly. And that's one sense. Now the other thing that I would offer--and again, the right person to really talk to is Zal Azmi, who is the CIO at the FBI, an extremely competent professional. Zal and I have talked a couple different times about information assurance, some of the challenges that we are sharing in exchanging information and working together, our respective agencies. I believe that under Zal they do have the proper talent and approach, I can't really speak to the timing. Mr. Ruppersberger. Do you know if they are getting the resources to do the job, based on your conversations about it? Mr. Deffer. Zal and I have talked about a number of vacancies, key vacancies that Zal is working on to fill. I think that as he fills those he will be able to pick up speed. Mr. Ruppersberger. I think that is a very high priority, I would think. Do you want to address that issue, also, Mr. Wilshusen? Mr. Wilshusen. Sure. The key thing in terms of FBI and DOJ having an increased score this year was basically because of what they had reported on their FISMA report to OMB and to Congress. That score was based upon an analysis of what they had reported. Mr. Ruppersberger. Are you aware of the problems with respect to the FBI? Mr. Wilshusen. I am aware with regard to issues related to DCF a Trilogy---- Mr. Ruppersberger. Their technology issue. Mr. Wilshusen [continuing]. That they had developed that or were in the process of developing it, and it has since been terminated. At least the operational pilots have been terminated. Mr. Ruppersberger. Do you feel they have a plan to move forward in what needs to be done to be brought up to speed? Mr. Wilshusen. I don't know that because we haven't looked at that, but we have received a request to take a look at that. Mr. Ruppersberger. We sure don't want to criticize the FBI. What we want to do is give the FBI all the resources they need to fix this problem. And again it seems to me--and we alluded to this in the first panel--when you have systems that work-- and again, I can say this, I'm on the House Select Intelligence Committee, I know NSA's systems are doing well. We need to make sure we pull together, find out what is working and not working, and move forward. If it's a resource problem, we have to fix it. If it's a money problem, we have to fix it. My time is up. Thank you for being here today. Chairman Tom Davis. Well, we've kept you a long time. We appreciate everything. Anybody want to add anything, add in anything they said along the way? I think it has been very helpful to the committee as we move forward. I want to just thank every one of you for being here. I want to congratulate both AID and Transportation on your improvements this year. I think you've talked about this is really a team effort, it is not the CIO. Mr. Cooper, thank you. It has been a good explanation for us. We wish you the best of luck as you move forward and appreciate the job you have done. Thank you very much. The hearing is adjourned. [Whereupon, at 12:03 p.m., the committee was adjourned.] [Additional information submitted for the hearing record follows:] [GRAPHIC] [TIFF OMITTED] T0562.106 [GRAPHIC] [TIFF OMITTED] T0562.107 <all> </pre></body></html> |