[Dataloss] Data breaches raise more questions about computer security law
security curmudgeon
jericho at attrition.org
Tue Jun 13 15:27:23 EDT 2006
Courtesy WK/ISN:
---------- Forwarded message ----------
http://www.govexec.com/dailyfed/0606/06126p1.htm
By Daniel Pulliam
dpulliam at govexec.com
June 12, 2006
Recently reported breaches compromising sensitive data held by four
agencies have officials looking at ways to improve federal information
security laws.
Security experts and former government officials started pointing fingers
at alleged weaknesses in the 2002 Federal Information Security Act earlier
this year. In recent interviews, some said they believe that the incidents
could lead to changes in the law.
Alan Paller, director of research at the SANS Institute in Bethesda, Md.,
a nonprofit cybersecurity research organization, called the compromise of
personnel records of 1,500 Energy Department employees revealed last week,
combined with last month's theft of personal data on 26.5 million people
from a Veterans Affairs Department employee's home, "an indictment of
FISMA."
In two unrelated incidents, laptop computers containing the personal
information -- including Social Security numbers, birthdates and names --
of about 200 employees at the Social Security Administration and the
Internal Revenue Service were lost recently.
FISMA requires agencies to identity and categorize risks to their
information technology systems and then implement security controls based
on those risks.
Paller said agencies are using their technology security funds to pay
independent contractors to write FISMA-required reports as part of the
certification and accreditation process, leaving little money for
implementing actual security measures. A certification and accreditation
process is necessary, but it should be continuous and automated, Paller
said.
"There was a thought that to check security, you had to check with people
and talk to people, but because most attacks are done by systems, you need
systems to check the security," Paller said. "The VA spent tens of
millions of dollars certifying and accrediting these systems, and they are
not secure."
A VA spokesman said that the agency received $77 million for information
security in fiscal 2006 and $78 million has been proposed for fiscal 2007.
Paller and Bruce Brody, vice president for information security at the
Reston, Va-based market research firm INPUT and associate deputy assistant
secretary for cyber and information security at the VA from 2001 to 2004,
have been critical of FISMA in the past, and both met with staffers from
the House Government Reform Committee recently to discuss possible changes
to the law.
Brody, who also served as chief information security officer at the Energy
Department until December 2005, said that the Energy security breach
occurred during his tenure at the agency, but within the National Nuclear
Security Administration, which is autonomous from the department under the
National Nuclear Security Act.
Paller said he believes that effective reform is possible, but Brody said
the policy and legislative communities are unlikely to get the changes
right unless information security practitioners are involved.
Clay Johnson, the Office of Management and Budget's deputy director for
management, said last week OMB has 95 percent of the laws and policies it
needs to hold agencies accountable for locking down their information
systems, but "extra teeth" may be needed. He did not specifically refer to
FISMA.
Johnson said in testimony before the House Government Reform Committee
that the administration believes it generally has good policies and laws
for protecting data, but is "prepared to take more action as necessary."
In a request for comment on the matter, OMB gave no indication that
changes to FISMA are being considered.
OMB spokeswoman Andrea Wuebker said that FISMA was established to ensure
that agencies meet consistent standards for security requirements for
information systems. Agencies are responsible for ensuring that they are
FISMA compliant and that their employees are trained to work with tough
security measures, Wuebker said.
"Sound standards and policies are in place, and OMB works with agencies to
make sure practices match these policies," Wuebker said.
More information about the Dataloss
mailing list