51.4 F
Washington D.C.
Thursday, April 25, 2024

GAO: Agencies Performing Well on Cybersecurity

Federal agencies and critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information. The security of these systems and data is vital to public confidence and national security, prosperity, and well-being.

The Government Accountability Office (GAO) first designated information security as a government-wide high-risk area in 1997. This was expanded to include the protection of critical cyber infrastructure in 2003 and protecting the privacy of personally identifiable information in 2015.

In December 2015, the President signed the Cybersecurity Information Sharing Act of 2015 into law to encourage the sharing of cyber threat information between the public and private sectors. The act included a provision for GAO to review actions taken by the federal government to remove personal information from cyber threat indicators when shared among federal and nonfederal entities. GAO determined the extent to which seven federal agencies designated by the act developed government-wide policies, procedures, and guidelines for the removal of personal information from cyber threat indicators, pursuant to the act’s provisions and fair information practice principles. To do so, GAO gathered and analyzed the policies, procedures, and guideline developed under the act and compared them to eight requirements in the act related to the removal of personal information.

The GAO investigation revealed that seven designated agencies–the Departments of Homeland Security, Justice, Defense, Commerce, Energy, and the Treasury, and the Office of the Director of National Intelligence–developed government-wide policies, procedures, and guidelines to assist federal and nonfederal entities in their efforts to receive and share cybersecurity information. These policies, procedures, and guidelines met the eight provisions of the Cybersecurity Information Sharing Act of 2015 (hereafter referred to as the act) on removal of personal information from cyber threat indicators and defensive measures.

As defined in the act, cyber threat indicators include threat-related information such as methods of defeating or causing users to unwittingly enable the defeat of security controls and methods of exploiting cybersecurity vulnerabilities. Defensive measures include any actions, devices, procedures, techniques, or other means that detect, prevent, or mitigate a known or suspected cybersecurity threat or vulnerability.

More specifically, GAO found the government-wide policies, procedures, and guidelines collectively met the act’s provisions by:

  • outlining ways in which federal entities are to share classified and unclassified cyber threat indicators and defensive measures in a way that mitigates adverse effects;
  • defining roles and responsibilities of federal and nonfederal entities when sharing information, in areas such as notification of an error or protection against unauthorized access; and
  • providing details on the process for submitting, receiving, handling, and disseminating cyber threat indicators and defensive measures.

As required by the act, these artifacts also addressed eight fair information practice principles, as applicable, that are the widely accepted framework to be used in the evaluation and consideration of systems, processes, or programs that affect individual privacy. Specifically, the government-wide guidelines do so by establishing or considering the fair information practice principles as the primary guiding principles for all federal entity activities related to the receipt, retention, use, and dissemination of cyber threat indicators, as authorized by the act.

Last month, GAO announced it was looking to reorganize resources in order to expand its cybersecurity auditing capabilities. GAO will increase its cybersecurity oversight capabilities in 2019 to meet its growing impact on federal management.

As part of the move, GAO’s IT team will be rebranded as the IT & Cybersecurity team, and a separate science and technology team will be established. GAO will use additional resources to assess new technologies and inform Congress of their potential impacts, as well as exploring more innovative audit methods using analytics.

The changes are expected to take place in the early part of 2019.

Read the full report at GAO

author avatar
Kylie Bielby
Kylie Bielby has more than 20 years' experience in reporting and editing a wide range of security topics, covering geopolitical and policy analysis to international and country-specific trends and events. Before joining GTSC's Homeland Security Today staff, she was an editor and contributor for Jane's, and a columnist and managing editor for security and counter-terror publications.
Kylie Bielby
Kylie Bielby
Kylie Bielby has more than 20 years' experience in reporting and editing a wide range of security topics, covering geopolitical and policy analysis to international and country-specific trends and events. Before joining GTSC's Homeland Security Today staff, she was an editor and contributor for Jane's, and a columnist and managing editor for security and counter-terror publications.

Related Articles

Latest Articles