Audit Chides Department Of Homeland Security's WAN - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

08:39 PM

Audit Chides Department Of Homeland Security's WAN

Among other problems, DHS has not clearly outlined baseline security controls or rules of use on the interconnected systems to prevent unauthorized transactions on the WAN, auditors said.

The Department of Homeland Security's wide area network risks service disruptions and losing data because of a high volume of security problems, according to a recent audit.

The Office of the Inspector General found that DHS had 65 million security event messages from February through April 2005, and 6.5 million were tagged as possible misuse of computers to access pornography Web sites.

The overall figure represents an increase of more then a 400 percent from the year before, but the number of porn warnings could be due to legitimate law enforcement investigations, DHS information officers told the OIG in an audit released at the end of 2005. That's difficult to determine because of the way the network is monitored.

Despite rules requiring DHS to monitor the network, which serves 22 organizations under its umbrella, DHS turned responsibility for monitoring over to U.S. Customs and Border Protection with no formal agreement about how they should collaborate, according to the audit posted online in January.

The department has not clearly outlined baseline security controls or rules of use on the interconnected systems to prevent unauthorized transactions on the WAN. Without those controls, DHS cannot remove a problematic group from the network or require that risky computer use be performed through a dial-up connection or other method to reduce risk, auditors noted.

According to the audit, DHS needs to improve its incident response capabilities, choose more effective means of collecting, analyzing and reporting data and build communication between various groups like legal, human resources and external groups. It should also appoint an information security manager for the WAN, create a security operations center for the network and sign interconnection service agreements for systems connected to the network.

Finally, it needs to draft security plans, institute certification and accreditation requirements, perform risk assessments, add equipment for traffic analysis and comply with its own investment policies. DHS hasn't received all of the approvals it needs for its network. That means it "risks spending on investments which may not directly support or further its mission."

In a response, Scott Charbo, chief information officer for DHS, agreed that most improvements suggested in the audit are needed. He said some would be completed when DHS finishes constructing a networks in December.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
Register for InformationWeek Newsletters
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll