Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Feds Issue Government Teleworker Security Guidelines

OMB rules apply to departments, agencies that must secure access to wireless networks and IT systems when employees work remotely.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
Protection of external IT systems and safeguarding wireless and other telecommunications capabilities that federal teleworkers use are among security guidelines the Office of Management and Budget (OMB) has stipulated as part of the Obama administration's telework policy.

In a memo this week, the OMB released the guidelines to support activity made possible by the Federal Telework Act of 2010, signed in December by President Obama to codify an activity the federal government already was engaged in and beginning to embrace on a wider scale. The memo was directed at the heads of executive departments and agencies.

"Telework ... provides federal employees the ability to continue working during inclement weather, emergencies, or situations that may disrupt normal operations," OMB Director Jacob Lew wrote in the memo. "However, telework is only as effective as the technologies used to support it, which is why it is critical for agencies to take immediate action to ensure that their employees are properly equipped.

The two-page memo on security guidelines are a complement to a 41-page document of overall teleworking guidelines the OMB released in April to inform departments and agencies how to manage employees who are eligible for telework and choose to do so. That document put the task of coming up with security guidelines in the hands of the Department of Homeland Security and the National Institute of Standards and Technology (NIST).

Indeed, as part of the guidelines spelled out in the memo, agencies and departments also must comply with the requirements of the Federal Information Security Management Act of 2002, better known as FISMA, for which NIST develops standards and guidelines.

In addition to securing wired and wireless networks teleworkers might use while performing their federal duties, agencies also must address several other issues to ensure teleworkers are performing their tasks securely.

Agencies and departments must control access to agency information and IT systems while employees telework, and also protect agency information--including personally identifiable information--and IT systems, according to the memo.

Other guidelines they must follow include limiting the introduction of vulnerabilities and preventing inappropriate use of official time or resources that violate federal policies regarding the viewing of pornography--including child pornography--while at work.

To ensure the implementation of these policies, agency CIOS must appoint a technical point of contact to the DHS, according to the OMB.

Black Hat USA 2011 presents a unique opportunity for members of the security industry to gather and discuss the latest in cutting-edge research. It happens July 30-Aug. 4 in Las Vegas. Find out more and register.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).