Risk
7/1/2010
09:46 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

FEMA Cybersecurity Fix Could Take Years

Auditors find dozens of security problems with the Federal Emergency Management Agency's financial systems.

The Federal Emergency Management Agency has serious security problems with its financial management systems that will likely take several years to fix, according to an audit by accounting firm KPMG done on behalf of Department of Homeland Security's inspector general.

KPMG's audit uncovered dozens of problems -- 58 in all -- that it says "collectively limit FEMA's ability to ensure critical financial and operational data were maintained in such a manner to ensure confidentiality, integrity, and availability."

KPMG did note that FEMA took steps during fiscal 2009 to correct weaknesses found a year earlier, such as backing up its financial system, improving user account management for its financial systems, and improving documentation around the National Flood Insurance Program, which provides insurance assistance to citizens living in flood zones.

However, 22 of the problems KPMG found were holdovers from the previous year, and some of them seem to show a disregard for federal cybersecurity requirements.

For example, two of FEMA's financial systems, the Grants and Training Integrated Financial Management Information System and the Payment and Reporting System, were not certified and accredited before moving into production and were operating without authorization. They had no cybersecurity pros assigned to them, and weren't included in FEMA's systems inventory.

More broadly, KPMG found that systems were developed without proper oversight and direction to contractors; development and approval of some required project documentation; or continual involvement of FEMA's CIO. "Many of these deficiencies originate from policy and system development activities that did not incorporate strong security controls from the outset," the report says.

In addition, vulnerabilities found and corrective actions taken regarding the National Emergency Information System weren't reported and tracked, the certification and accreditation for FEMA's networks didn't include the LAN on which FEMA's primary financial apps reside, and the certification and accreditation for parts of a flood insurance system was expired.

FEMA also had access control problems. KPMG found password, patch management, and security configuration problems on servers supporting financial and support systems. User account control was another problem, as accounts weren't reviewed for appropriateness, weren't disabled or removed promptly after employees were fired, and weren't documented properly upon being handed out. Strong passwords weren't enforced on several systems, including access to FEMA's LAN.

"The deficiencies identified in FEMA's access controls increase the risk that employees and contractors may have access to a system that is outside the realm of their job responsibilities or that a separated individual could use the account to alter the data contained within the application or database without being detected," the report says.

Though she was singled out by the report, FEMA CIO Jean Etzel concurred with all of KPMG's recommendations. "The CIO is resolute in directing these audit recommendations to be effectively implemented in a timely manner," she wrote, noting that a governance board would hold weekly status meetings to review progress toward that goal.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.