Risk
9/13/2010
12:10 PM
Connect Directly
RSS
E-Mail
50%
50%

GAO Finds Agencies Lax On Data Protection

Departments that deal with highly sensitive information need better safeguards to secure it against contract workers, finds Government Accountability Office.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
Some federal agencies that deal with highly sensitive data are not adequately protecting it from contract workers, a new Government Accountability Office (GAO) report found.

The Departments of Defense (DoD), Homeland Security (DHS), and Health and Human Services (HHS) have some guidance and contract provisions in place for what data contractors can access while working at the federal government. However, they have not established appropriate safeguards to keep contract workers away from information they should not have access to, such as employees' personal, proprietary business, and agency-sensitive information, according to the report, released Friday.

The agencies also don't specify contractor responsibilities for prompt notification to the agency if unauthorized disclosure of information or misuse occurs, according to the report.

The Federal Acquisition Regulation (FAR) provides rules for how the government acquires goods and services -- including contract employees -- but it is lacking in these particular areas in terms of access to data, according to the report.

While the DoD, DHS, and HHS -- agencies that very often deal with classified and highly sensitive information -- have supplemented FAR with their own rules and regulations for contractors, they have not gone far enough to protect data, the GAO found.

Insider access to sensitive data on federal computer networks is a chief security concern of federal agencies, as data breaches often occur when someone with access to the network steals or misuses data, or loses a computer on which sensitive data is stored.

According to the report, there are currently pending regulatory changes to FAR to develop a standard approach to protect sensitive information from contractors.

However, FAR still does not cover two critical data-protection scenarios -- the use of nondisclosure agreements to protect sensitive data that contract workers access and the establishment of requirements for contractors to let agencies know when they've accessed such information.

The GAO is recommending that the Office of Federal Procurement Policy administrator work with the FAR Council to oversee changes in the guidelines to address this lack of safeguards.

Agency acquisition policy, IT security, and privacy officials; CIOs; and other affected parties also should be part of the process that adds regulations to FAR, according to the report.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.