Information Security: Federal Deposit Insurance Corporation Needs
to Improve Its Program (31-AUG-06, GAO-06-620). 		 
                                                                 
The Federal Deposit Insurance Corporation (FDIC) has a demanding 
responsibility enforcing banking laws, regulating financial	 
institutions, and protecting depositors. The corporation relies  
extensively on computerized systems to support and carry out its 
financial and mission-related operations. As part of the audit of
the calendar year 2005 financial statements, GAO assessed (1) the
progress FDIC has made in correcting or mitigating information	 
security weaknesses previously reported and (2) the effectiveness
of the corporation's information system controls to protect the  
confidentiality, integrity, and availability of its key financial
information and information systems.				 
-------------------------Indexing Terms------------------------- 
REPORTNUM:   GAO-06-620 					        
    ACCNO:   A60025						        
  TITLE:     Information Security: Federal Deposit Insurance	      
Corporation Needs to Improve Its Program			 
     DATE:   08/31/2006 
  SUBJECT:   Access control					 
	     Financial statement audits 			 
	     Information security				 
	     Information systems				 
	     Internal controls					 
	     Physical security					 
	     System vulnerabilities				 
	     Systems evaluation 				 
	     Systems management 				 
	     Bank Insurance Fund				 
	     Savings Association Insurance Fund 		 
	     FSLIC Resolution Fund				 

******************************************************************
** This file contains an ASCII representation of the text of a  **
** GAO Product.                                                 **
**                                                              **
** No attempt has been made to display graphic images, although **
** figure captions are reproduced.  Tables are included, but    **
** may not resemble those in the printed version.               **
**                                                              **
** Please see the PDF (Portable Document Format) file, when     **
** available, for a complete electronic file of the printed     **
** document's contents.                                         **
**                                                              **
******************************************************************
GAO-06-620

     

     * Report to the Board of Directors, Federal Deposit Insurance
       Corporation
          * August 2006
     * INFORMATION SECURITY
          * Federal Deposit Insurance Corporation Needs to Improve Its
            Program
     * Contents
          * Results in Brief
          * Background
               * FDIC Is a Key Protector of Bank and Thrift Depositors
          * Objectives, Scope, and Methodology
          * FDIC Has Made Progress Correcting Previously Reported Weaknesses
          * Control Weaknesses Place Financial and Sensitive Data at Risk
               * Access Controls Were Not Always Effective
                    * User Accounts and Passwords
                    * Access Rights and Permissions
                    * Network Services
                    * Configuration Assurance
                    * Audit and Monitoring of Security-Related Events
                    * Physical Security
               * Weaknesses in Other Information System Controls Increase
                 Risk
                    * Segregation of Duties
                    * Application Change Controls
               * Information Security Program Is Not Yet Fully Implemented
                    * Policies and Procedures
                    * Security Plans
                    * Security Training
                    * Remedial Actions
                    * Continuity of Operations
          * Conclusions
          * Recommendations for Executive Action
          * Agency Comments and Our Evaluation
     * Comments from the Federal Deposit Insurance Corporation
     * GAO Contact and Staff Acknowledgments
     * PDF6-Ordering Information.pdf
          * Order by Mail or Phone

Report to the Board of Directors, Federal Deposit Insurance Corporation

August 2006

INFORMATION SECURITY

Federal Deposit Insurance Corporation Needs to Improve Its Program

Contents

August 31, 2006 Letter

To the Board of Directors Federal Deposit Insurance Corporation

The Federal Deposit Insurance Corporation (FDIC) has a demanding
responsibility enforcing banking laws, regulating banking institutions,
and protecting depositors. In enforcing banking laws, it plays an
important role in maintaining public confidence in the nation's financial
system. The corporation relies extensively on computerized systems to
support and carry out its financial and mission-related operations.

Effective information security controls1 affect the integrity,
confidentiality, and availability of sensitive information-such as
personnel and regulatory information-maintained by FDIC. These controls
are essential to ensure that financial information is adequately protected
from inadvertent or deliberate misuse, fraudulent use, improper
disclosure, or destruction.

As part of our audit of the calendar year 2005 financial statements for
FDIC's Bank Insurance Fund, the Savings Association Insurance Fund, and
the Federal Savings and Loan Insurance Corporation (FSLIC) Resolution
Fund,2 we assessed (1) the progress FDIC has made in correcting or
mitigating remaining information system control weaknesses reported as
unresolved at the time of our prior review in 20043 and (2) the
effectiveness of the corporation's information system controls for
protecting the confidentiality, integrity, and availability of its
information and information systems.

We performed our review at FDIC headquarters in Washington, D.C., and its
computer facility in Arlington, Virginia, from September 2005 through
February 2006. Our review was performed in accordance with generally
accepted government auditing standards.

Results in Brief

FDIC has made progress in correcting previously reported weaknesses.
Specifically, the corporation has corrected or mitigated 18 of the 24
weaknesses that we previously reported as unresolved at the time of our
last review. Among actions FDIC has taken include developing and
implementing procedures to comply with its computer file naming convention
standards and developing and implementing automated procedures for
limiting access to sensitive information.

Nevertheless, the corporation has not consistently implemented information
security controls to properly protect the confidentiality, integrity, and
availability of its financial and sensitive information and information
systems. In addition to the six previously reported weaknesses that remain
uncorrected, other newly identified information security weaknesses exist.
For example, FDIC did not consistently implement controls intended to
prevent, limit, or detect access to its critical financial and sensitive
systems and information. Weaknesses in access controls exist related to
(1) user accounts and passwords, (2) access rights and permissions, (3)
network services, (4) configuration assurance, (5) audit and monitoring of
security-related events, and (6) physical security. In addition,
weaknesses existed in other information security controls designed to
prevent assigning incompatible duties among multiple individuals or groups
and prevent unauthorized changes to application programs. A key reason for
these weaknesses is that FDIC had not fully implemented components of its
information security program. The collective severity of these weaknesses
was such that we reported information system control weaknesses to be a
reportable condition in our report on the FDIC funds' 2005 financial
statements4 since it increased the risk of unauthorized modification and
disclosure of critical FDIC financial and sensitive personnel information,
disruption of critical operations, and loss of assets.

We are recommending that the FDIC Chairman take actions to fully implement
key components of the corporation's information security program.

We are making additional recommendations in a separate report designated
for "Limited Official Use Only."  5 These recommendations address actions
needed to correct specific information security weaknesses related to
access controls and other information systems controls.

In providing written comments on a draft of this report (which are
reprinted in app. I), FDIC's Deputy to the Chairman and Chief Financial
Officer stated that FDIC concurred with one of our recommendations,
partially concurred with three, and did not concur with one. FDIC also
disagreed with our assessment that its information system control
weaknesses were sufficient to constitute a reportable condition.

The Deputy stated that FDIC agreed with our recommendation that it include
security plans or requirements for nonmajor applications into the plans
for general support systems. However, FDIC questioned the need for it to
assess the security plans for its payroll service provider because the
provider is federally certified and audited, and therefore such effort on
its part would be duplicative. We agree with the FDIC position and have
revised the report accordingly.

For the three recommendations for which FDIC's concurrence was partial,
the Deputy generally agreed with the thrust of the recommendations but
took issue with details of our analysis or described why the corporation
was already compliant. With regard to one recommendation, FDIC did not
agree with aspects of our assessment of compliance with information
security policies and procedures, providing two examples of factors
mitigating the weaknesses we described. Although we agree that FDIC has
taken steps that may mitigate these weaknesses, we believe that the
weaknesses continue to increase the security risks that the corporation
faces. With regard to two recommendations regarding security training and
continuity of operations planning, the Deputy stated that FDIC believed
that it was already in compliance with these recommendations because of
actions taken since the completion of our field work. Although we have not
evaluated these actions, if they have been implemented appropriately FDIC
will have satisfied our recommendations.

FDIC did not concur with our recommendation that it report weaknesses as
closed in remedial action plans only when corrective actions are taken.
According to the Deputy, FDIC disagreed with the assessment on which this
recommendation was based; that is, that FDIC did not effectively implement
or accurately report the status of remedial actions. According to FDIC,
our finding was based on a single instance and was not valid for the
program that was in place through most of 2005. However, we disagree with
FDIC's characterization that our observation was based on a single
instance. FDIC had reported 38 control weaknesses associated with its New
Financial Environment (FDIC's modernized financial system) as closed
before it had tested or validated them. Similar instances of weaknesses
closed without test or validation occurred in a remediation plan resulting
from a second security test and evaluation of this system. In addition, we
do not agree that our finding was not valid for the program that was in
place through most of 2005, because the remediation plans on which it is
based were dated November and December 2005 and were still active at that
time. Thus, we continue to believe that FDIC implemented a flawed process
which could mislead management to think that risks had been lowered when
in fact they had not.

Finally, FDIC disagreed with our assessment that its information system
control weaknesses were sufficient to be a reportable condition for the
FDIC funds' 2005 financial statements. In the corporation's view, the risk
impact and magnitude of the vulnerability were not sufficient to earn this
assessment; FDIC is nonetheless pursuing completion of actions to address
information security weaknesses. We continue to believe that the problems
identified in this report amounted to a reportable condition because they
increased the risk of unauthorized modification and disclosure of critical
FDIC financial information and sensitive personnel information, disruption
of critical operations, and loss of assets.

Background

Information security is a critical consideration for any organization that
depends on information systems and computer networks to carry out its
mission or business. It is especially important for government agencies
where maintaining the public's trust is essential. The dramatic expansion
in computer interconnectivity and the rapid increase in the use of the
Internet are changing the way our government, the nation, and much of the
world communicate and conduct business. Without proper safeguards, systems
are unprotected from individuals and groups with malicious intent to
intrude and use the access to obtain sensitive information, commit fraud,
disrupt operations, or launch attacks against other computer systems and
networks. These concerns are well-founded for a number of reasons,
including the dramatic increase in reports of security incidents, the ease
of obtaining and using hacking tools, the steady advance in the
sophistication and effectiveness of attack technology, and the dire
warnings of new and more destructive attacks to come.

Computer-supported federal operations are likewise at risk. Our previous
reports, and those of agency inspectors general, describe persistent
information security weaknesses that place a variety of federal operations
at risk of disruption, fraud, and inappropriate disclosure. We have
designated information security as a governmentwide high-risk area since
19976-a designation that remains today.7

Recognizing the importance of securing the information systems of federal
agencies, Congress enacted the Federal Information Security Management Act
of 2002 (FISMA) to strengthen the security of information and systems
within federal agencies.8 FISMA requires each agency to develop, document,
and implement an agencywide information security program to provide
information security for the information and systems that support the
operations and assets of the agency, using a risk-based approach to
information security management.

FDIC Is a Key Protector of Bank and Thrift Depositors

Congress created FDIC in 19339 to restore and maintain public confidence
in the nation's banking system. The Financial Institutions Reform,
Recovery, and Enforcement Act of 1989 sought to reform, recapitalize, and
consolidate the federal deposit insurance system.10 The act created the
Bank Insurance Fund and the Savings Association Insurance Fund, both of

which are responsible for protecting insured bank and thrift depositors.11
It also abolished the FSLIC and created the FSLIC Resolution Fund to
complete the affairs of the former FSLIC and liquidate the assets and
liabilities transferred from the former Resolution Trust Corporation.
Further, the act designated the corporation as the administrator of these
funds. As part of this function, it has an examination and supervision
program to monitor the safety of deposits held in member institutions.

FDIC insures deposits in excess of $7 trillion for about 8,800
institutions. Together, the funds administered by FDIC have about $53
billion in assets. FDIC had a budget of about $1.1 billion for calendar
year 2005 to support its activities in managing the funds. For that year,
it processed almost 21 million financial transactions.

The corporation relies extensively on computerized systems to support its
financial operations and store the sensitive information it collects. Its
local and wide area networks interconnect these systems. To support its
financial management functions, the corporation relies on several
financial systems to process and track financial transactions that include
premiums paid by its member institutions and disbursements made to support
operations. In addition, FDIC uses other systems that maintain personnel
information for its employees, examination data for financial
institutions, and legal information on closed institutions. At the time of
our review, there were about 6,100 users on its systems.

In our report on the results of our audit of the FDIC funds' financial
statements for 2003 and 2004,12 we noted that FDIC's implementation of a
new financial system would significantly change its information systems
environment and the related information systems controls necessary for
their effective operation and that, consequently, continued commitment to
an effective information security program would be essential to ensure
that the corporation's financial and sensitive information would be
adequately protected in the new environment.

To support the corporation's financial management functions in 2005, FDIC
implemented its new financial system in May 2005. The new financial system
is composed of 26 separate applications that either replaced or modified
previous applications to support the New Financial Environment (NFE). In
addition to changing financial systems, FDIC has undergone organizational
changes in the last year that include the reorganization of the Division
of Information Technology. This division oversees the development and
operation of the corporation's computer systems and software. It maintains
the corporation's communications network and provides the expertise
necessary for developing new information management systems needed by the
FDIC's bank examiners, researchers, legal case managers, and finance
officers.

According to FISMA, the Chairman of FDIC is responsible for, among other
things, (1) providing information security protections commensurate with
the risk and magnitude of the harm resulting from unauthorized access,
use, disclosure, disruption, modification, or destruction of the agency's
information systems and information; (2) ensuring that senior agency
officials provide information security for the information and information
systems that support the operations and assets under their control; and
(3) delegating to the agency's Chief Information Officer the authority to
ensure compliance with the requirements imposed on the agency under FISMA.
The corporation's Chief Information Officer is responsible for developing
and maintaining a departmentwide information security program and for
developing and maintaining information security policies, procedures, and
control techniques that address all applicable requirements.

Objectives, Scope, and Methodology

The objectives of our review were to assess (1) the progress FDIC has made
in correcting or mitigating remaining information system control
weaknesses reported as unresolved at the time of our prior review in
200413 and (2) the effectiveness of the corporation's information system
controls for protecting the confidentiality, integrity, and availability
of computerized data. An integral part of our objectives was to support
the 2005 financial audit by assessing, as of December 31, 2005, the degree
of security and controls over systems that support the generation of the
FDIC funds' financial statements.

Our scope and methodology was based on our Federal Information System
Controls Audit Manual,14 which contains guidance for reviewing information
system controls that affect the confidentiality, integrity, and
availability of computerized data. Focusing on FDIC's financial systems
and associated infrastructure, we evaluated the effectiveness of
information security controls that are intended to

o prevent, limit, and detect access to computer resources (data, programs,
and systems), thereby protecting these resources against unauthorized
disclosure, modification, and use;

o provide physical protection of computer facilities and resources from
unauthorized use, espionage, sabotage, damage, and theft;

o prevent the exploitation of vulnerabilities;

o prevent the introduction of unauthorized changes to application or
system software; and

o ensure that work responsibilities for computer functions are segregated
so that one individual does not perform or control all key aspects of
computer-related operations and, thereby, have the ability to conduct
unauthorized actions or gain unauthorized access to assets or records
without detection.

In addition, we evaluated aspects of FDIC's information security program.
This program includes assessing risk; developing and implementing
policies, procedures, and security plans; promoting security awareness and
providing specialized training for those with significant security
responsibilities; testing and evaluating the effectiveness of controls;
planning, implementing, evaluating, and documenting remedial actions to
address information security deficiencies; detecting, reporting, and
responding to security incidents; and ensuring the continuity of
operations.

To evaluate FDIC's information security controls and program, we
identified and examined pertinent FDIC security policies, procedures,
guidance, security plans, and relevant reports provided during field work.
In addition, we conducted tests and observations of controls in operation
and reviewed corrective actions taken by the corporation to address
vulnerabilities identified during our previous review.15 We also discussed
with key security representatives, system administrators, and management
officials whether information system controls were in place, adequately
designed, and operating effectively.

We performed our review at FDIC headquarters in Washington, D.C., and its
computer facility in Arlington, Virginia, from September 2005 through
February 2006. Our review was performed in accordance with generally
accepted government auditing standards.

FDIC Has Made Progress Correcting Previously Reported Weaknesses

FDIC has taken steps to address security control weaknesses. The
corporation has corrected or mitigated 18 of the 24 weaknesses that we
previously reported as unresolved. For example, the corporation has

o established and implemented procedures to ensure that dataset naming
conventions comply with FDIC standards;

o developed and implemented automated procedures to ensure that access to
sensitive production data is limited; and

o documented the appropriate controls of system interconnections, sharing
information between applications, and rules concerning the behavior of
users within each application between the Department of Agriculture's
National Finance Center and FDIC.

While the corporation has made progress in strengthening its information
security controls, it is still in the process of completing actions to
correct or mitigate the remaining six previously reported weaknesses.
These weaknesses include not adequately securing personal firewall
settings on laptop computers, using live data for testing, and not
ensuring that only authorized application software changes are
implemented. Failure to resolve these issues could leave the corporation's
sensitive data vulnerable to unauthorized access and manipulation.

Control Weaknesses Place Financial and Sensitive Data at Risk

FDIC has not effectively implemented information security controls to
properly protect the confidentiality, integrity, and availability of its
financial and sensitive information and information systems. In addition
to the 6 previously reported weaknesses that remain uncorrected, we
identified 20 new information security weaknesses during this review. Most
of the identified weaknesses pertain to access controls. A primary reason
for these weaknesses is that FDIC has not yet fully implemented its
information security program. As a result, weaknesses in controls over its
financial and sensitive data increase the risk of unauthorized disclosure,
modification, or loss of data. Because of these heightened risks, we
concluded that the weaknesses we identified constituted a reportable
condition with respect to FDIC's information systems security for 2005.

Access Controls Were Not Always Effective

Protecting the resources that support critical operations from
unauthorized access is a basic management objective for any organization.
Organizations accomplish this objective by designing and implementing
controls that are intended to prevent, limit, and detect unauthorized
access to computing resources, programs, and information. Access controls
include (1) user accounts and passwords, (2) access rights and
permissions, (3) network services, (4) configuration assurance, (5) audit
and monitoring of security-related events, and (6) physical security.
Inadequate access controls diminish the reliability of computerized
information, and they increase the risk of unauthorized disclosure,
modification, and loss of sensitive information and of disruption of
service.

User Accounts and Passwords

A computer system must be able to identify and differentiate among users
so that activities on the system can be linked to specific individuals.
When an organization assigns unique user accounts to specific users, the
system distinguishes one user from another-a process called
identification. The system must also establish the validity of a user's
claimed identity through some means of authentication, such as a password,
that is known only to its owner. The combination of identification and
authentication, such as user account/password combinations, provides the
basis for establishing individual accountability and for controlling
access to the system. Accordingly, agencies implement procedures to, among
other things, (1) modify vendor-supplied default authenticators during
information system installation and (2) create, use, and remove user
accounts.

FDIC has not adequately controlled user accounts and passwords to ensure
that only authorized individuals are granted access to its systems and
data. For example, the corporation did not change vendor-supplied
administrator accounts and passwords or remove inactive user accounts. In
2002 and 2003, we reported the existence of these weaknesses and in 2004
reported that FDIC had corrected them.16 The reemergence of these
weaknesses demonstrates that FDIC had not implemented disciplined
processes for ensuring that such issues do not recur. As a result, there
is increased risk that unauthorized users could gain valid user
identification and password combinations to claim a user identity and then
use that identity to gain access to corporation systems.

Access Rights and Permissions

A basic underlying principle for secure computer systems and data is the
concept of least privilege, which means that users are granted only those
access rights and permissions needed to perform their official duties.
User rights are allowable actions that can be assigned to users or groups.
File and directory permissions are rules associated with a particular file
or directory; they regulate which users can access the file or directory
and in what manner. Organizations establish access rights and permissions
to restrict legitimate users' access to only those programs and files that
they need to do their work. Assignment of rights and permissions must be
carefully considered to avoid giving users unnecessary access to sensitive
files and directories, especially to protect personal information
maintained in systems of records. Further, the Privacy Act of 197417
requires federal agencies to limit the collection, disclosure, and use of
personal information maintained in systems of records and to establish
reasonable safeguards over those records.

FDIC sometimes permitted excessive access to the computer systems that
support its critical financial and regulatory operations. For example, the
corporation inadvertently granted excessive access to insurance and
research data that could result in the inappropriate modification or
deletion of this data. FDIC also permitted each user on its networks to
have access to sensitive Privacy Act-protected information including
names, addresses, and Social Security numbers of individuals corresponding
with the corporation. The FDIC Office of Inspector General recently
reported on the misuse of sensitive employee information, including Social
Security numbers, resulting in fraud.18 We recently testified that, once a
Social Security number is obtained fraudulently, it can then be used to
create a false identity for financial misuse, assume another individual's
identity, or to fraudulently obtain credit.19 As a result, there is
increased risk that FDIC's sensitive data and personally identifiable
information may be compromised.

Network Services

Networks are a series of interconnected devices and software that allow
individuals to share data and computer programs. Because sensitive
programs and data are stored on network servers or transmitted along
networks, effectively securing networks is essential to protecting
computing resources and data from unauthorized access, manipulation, and
use. Remote access controls should restrict access to networks from
sources external to the network. Controls should also limit the use of
systems from sources internal to the network to authorized users for
authorized purposes. Organizations secure their networks, in part, by
installing and configuring network devices that permit authorized network
service requests and deny unauthorized requests and by limiting the
services that are available on the network.

FDIC did not sufficiently control certain network services. It did not
securely configure Internet-accessible remote access services to its
network resources. For example, the remote access configuration did not
support the government advanced encryption standard and certificates used
for authentication did not require passwords and could be stored as
insecure files. FDIC permitted the use of unencrypted network protocols on
its UNIX systems, thereby increasing the risk of unauthorized disclosure
of sensitive information, including valid user passwords. As a result,
increased risk exists that a malicious user could gain unauthorized access
to network resources.

Configuration Assurance

To protect an organization's information, it is important to ensure that
only authorized configurations are placed in operation. This process,
known as configuration assurance, is accomplished by verifying the
correctness of the security settings on hosts, applications, and networks,
and maintaining operations in a secure fashion.

FDIC did not consistently implement secure configurations of various
computing devices. Specifically, the corporation did not securely
configure a key production database server, desktop workstations, and
handheld personal digital assistants. For example, it deployed
workstations with outdated versions of third party application software.
It also configured an application server and laptop computers to permit or
enable the use of unnecessary applications or vulnerable services,
including wireless technologies. As a result, increased risk exists that a
malicious user could exploit the insecure configurations to gain
unauthorized access to these devices and the information they contain.

Audit and Monitoring of Security-Related Events

To establish individual accountability, monitor compliance with security
policies, and investigate security violations, it is crucial to determine
what, when, and by whom specific actions are taken on a system.
Organizations accomplish this by implementing system or security software
that provides an audit trail, or logs of system activity, they can use to
determine the source of a transaction or attempted transaction and to
monitor users' activities. The way in which organizations configure system
or security software determines the nature and extent of information that
can be provided by the audit trail. To be effective, organizations should
configure their software to collect and maintain audit trails that are
sufficient to track security- and audit-related events.

FDIC did not sufficiently log and monitor key security- and audit- related
events. For example, it did not monitor all accesses between systems for
mainframe environments and FDIC did not review all changes to security
administrator accounts. The corporation also did not prepare key security
reports such as the failed logon attempt report and financial transaction
audit logs that were critical to monitoring financial activities.
Moreover, one database supporting a financial application did not have
auditing enabled for changes to sensitive tables or actions taken by
administrators. As a result, increased risk exists that unauthorized or
inappropriate system activity may not be detected.

Physical Security

Physical security controls are important for protecting computer
facilities and resources from espionage, sabotage, damage, and theft.
These controls involve restricting physical access to computer resources,
usually by limiting access to the buildings and rooms in which the
resources are housed and periodically reviewing access granted to ensure
that it continues to be appropriate based on criteria established for
granting such access. At FDIC, physical access control measures such as
guards, badges, and alarms, used alone or in combination, are vital to
safeguarding critical financial and sensitive information and computer
operations from internal and external threats.

The corporation has taken steps to improve its physical security and
access to its data center; nevertheless, weaknesses similar to those
reported in previous audits have recurred.20 A recently implemented
consolidated physical access system did not allow the corporation to
effectively track and review physical access activity to the data center.
Moreover, the corporation did not adequately maintain documentation on
approved access request forms. For example, 40 percent of the data center
access request approvals reviewed were not current. As a result, the
corporation increased the risk of inappropriate access to sensitive areas.

Weaknesses in Other Information System Controls Increase Risk

In addition to access controls, other important controls should be in
place to ensure the security and reliability of an organization's
information. These controls include policies, procedures, and control
techniques to (1) appropriately segregate incompatible duties and (2)
prevent unauthorized changes to application software. Weaknesses in these
areas could increase the risk of unauthorized use, disclosure,
modification, or loss of FDIC's financial and sensitive information.

Segregation of Duties

Segregation of duties refers to the policies, procedures, and
organizational structure that help to ensure that no single individual can
independently control all key aspects of a process or computer-related
operation and thereby gain unauthorized access to assets or records. Often
segregation of duties is achieved by dividing responsibilities among two
or more individuals or organizational groups. This division of
responsibilities diminishes the likelihood that errors and wrongful acts
will go undetected because the activities of one individual or group will
serve as a check on the activities of another individual or group.
Inadequate segregation of duties increases the risk that erroneous or
fraudulent transactions could be processed and improper program changes
could be implemented.

FDIC did not always assure appropriate segregation of incompatible duties.
It granted NFE accounts payable users inappropriate access to perform
incompatible functions, such as the ability to both initiate and authorize
the same transactions. Another individual performed multiple incompatible
functions that included serving as an NFE security administrator,
performing financial operations functions such as updating financial
records and reports, and testing NFE monitoring programs. As a result,
increased risk exists that erroneous or fraudulent transactions could be
processed without detection.

Application Change Controls

It is important to ensure that only authorized and fully tested
application programs are placed in operation. To ensure that changes to
application programs are necessary, work as intended, and do not result in
the loss of data or program integrity, such changes should be documented,
authorized, tested, and independently reviewed. In addition, test
procedures should be established to ensure that only authorized changes
are made to the application's program code.

As reported in calendar year 2004, and once again recurring this year, the
corporation did not consistently implement effective application change
controls. FDIC has not fully developed procedures to ensure that only
authorized changes were made to the production version of application code
for all applications. As a result, the risk of unauthorized, untested, or
inaccurate application modifications is increased and could result in
unauthorized users gaining access to key financial or sensitive
information.

Information Security Program Is Not Yet Fully Implemented

FDIC has made progress in developing and implementing its FISMA-mandated
information security program.21 For example, the corporation has
established a memorandum of agreement and an interagency security
agreement with a critical service provider, and it has implemented a
program for periodically testing and evaluating the effectiveness of its
information security policies, procedures, and practices.

However, a key reason for the weaknesses in FDIC's information system
controls is that the corporation has not fully implemented elements of its
information security program.

Among other things, FISMA requires agencies to develop, document, and
implement the following:

o policies and procedures that cost-effectively reduce risks and ensure
compliance with applicable requirements;

o plans for providing adequate information security for networks,
facilities, and systems or groups of information systems;

o security awareness training to inform personnel-including contractors
and other users of the agency's information systems-of information
security risks and responsibilities of personnel in complying with agency
policies and procedures;

o a process for planning, implementing, evaluating, and documenting
remedial actions to address any deficiencies in their information security
policies, procedures, or practices; and

o plans and procedures to ensure continuity of operations for information
systems that support the operations and assets of the agency.

A fully implemented security program is critical to providing FDIC with a
solid foundation for resolving existing information security problems and
continuously managing information security risks.

Policies and Procedures

A key element in implementing an effective information security program is
to develop and implement risk-based policies, procedures, and controls
that provide security over an agency's computing environment. Developing
and documenting security policies are important because these are the
primary mechanisms by which management communicates its views and
requirements; they also serve as the basis for adopting specific
procedures and technical controls. In addition, agencies need to take the
actions necessary to effectively implement or execute these procedures and
controls. If properly implemented, they can help to reduce the risk that
could come from unauthorized access or disruption of services.

FDIC has documented various policies for establishing effective
information security controls; however, the corporation has not
consistently implemented them. For example, policies requiring the
monitoring and review of critical security events related to the mainframe
computer or certain financial transactions were not always followed. The
corporation also did not effectively implement policies regarding physical
access, business impact analyses, sensitive Privacy Act-protected data,
wireless configurations, or user account management. As a result, FDIC has
less assurance that its systems and information are sufficiently
protected.

Security Plans

The objective of system security planning is to improve the protection of
information technology resources. A system security plan provides an
overview of the system's security requirements and describes the controls
that are in place-or planned-to meet those requirements. Office of
Management and Budget (OMB) guidance directs agencies to develop and
implement system security plans for major applications22 and for general
support systems23 and also directs that these plans address policies and
procedures for providing management, operational, and technical controls.
National Institute of Standards and Technology (NIST) guidelines state
that, when nonmajor applications are bundled with a general support
system, the security requirements for each of the nonmajor applications
should be included in the general support system's security plan. Further,
agencies are responsible for ensuring that appropriate security controls
are in place for the information or application, as well as the systems on
which they reside. If an agency's information is processed on another
organization's general support system, the agency needs to ensure that
adequate protection is provided for its information, including making an
assessment of the sponsoring system's security plan.

In the security plans we reviewed, FDIC generally included elements such
as security controls currently in place, or planned, the name of the
individual responsible for the security of the system, and a description
of the system and its interconnected environment. However, we identified
instances where security plans were incomplete. For example, FDIC did not
integrate the security plans or requirements for certain nonmajor
applications into the security plan for the general support system. Two of
FDIC's nonmajor applications, the corporation's human resources and time
and attendance systems, are not included in FDIC general support systems
security plans. As a result, FDIC cannot ensure that appropriate controls
are in place to protect its systems and critical information.

Security Training

Computer intrusions and security breakdowns often occur because computer
users fail to take appropriate security measures. For this reason, it is
vital that employees and contractors who use computer resources in their
day-to-day operations be made aware of the importance and sensitivity of
the information they manage, as well as the business and legal reasons for
maintaining its confidentiality, integrity, and availability. FISMA
requires that each agency provide security awareness training to inform
personnel, including contractors and other users of information systems
that support the operations and assets of the agency, of the information
security risks associated with their activities and their responsibilities
in complying with agency policies and procedures designed to reduce these
risks. In addition, individuals with significant responsibilities for
information security should receive specialized training with respect to
their responsibilities.

The corporation uses a Web-based security awareness training application
and requires that all network users (employees and contractors) take the
training. The application tracks users that complete the awareness
training and those that do not. Users that do not take the training within
required time frames are denied access to the FDIC systems. On the other
hand, individuals with significant security responsibilities did not
consistently receive specialized training. For example, the corporation's
FISMA report for fiscal year 2005 stated that only 58 percent of such
employees had received specialized training. Until FDIC ensures that each
of these employees receives appropriate security training, security lapses
are more likely to occur.

Remedial Actions

The development and implementation of remedial action plans are key
components of an effective information security program. These plans
assist agencies in identifying, assessing, prioritizing, and monitoring
the progress in correcting security weaknesses that are found in
information systems. FISMA says that agencies must develop a process for
planning, implementing, evaluating, and documenting remedial actions to
address deficiencies in the information security policies, procedures, and
practices of the agency. According to OMB guidance, agencies should take
timely and effective action to correct deficiencies that they have
identified through a variety of information sources. To accomplish this,
remedial actions should be developed and implemented for each deficiency,
and progress for each should be tracked.

FDIC has developed a process for planning and implementing remedial
actions that includes the necessary elements for addressing deficiencies
in information security. Indeed, we determined that FDIC has corrected 18
of the 24 deficiencies we reported as unresolved at the time of our last
review. However, we found that, in some instances, FDIC did not
effectively implement or accurately report the status of its remedial
actions. For example, the corporation closed weaknesses identified by its
security test and evaluation process without ensuring that adequate
security controls were in place to resolve the weaknesses. To illustrate,
it closed remedial actions for 29 logical access, 3 segregation of duties,
and 6 audit log control weaknesses in the New Financial Environment (NFE)
without fully testing compliance with stated security requirements. In
this instance, FDIC reported the weaknesses as resolved and remedial
action as complete when it established a plan to address the weaknesses,
not when the corrective controls were actually implemented. In addition,
tests were not performed to verify that the vulnerability was addressed by
the plan's implementation. Further, the Chief Information Officer stated
that, in granting NFE interim authorities to operate, the closing of high
priority items related to auditing, without adequately resolving the
vulnerability, resulted in a residual risk to the operations and assets of
the corporation that is not fully acceptable. Without a mature remediation
process, the corporation cannot ensure that the organization's weaknesses
are mitigated to reduce risks.

Continuity of Operations

Continuity of operations controls should be designed to ensure that, when
unexpected events occur, essential operations continue without
interruption or can be promptly resumed, and critical and sensitive data
are protected. These controls include environmental controls and
procedures designed to protect information resources and minimize the risk
of unplanned interruptions, along with a well-tested plan to recover
critical operations should interruptions occur. NIST recommends that a
formal business impact analysis be performed to allow management to better
understand and measure the financial and nonfinancial risks associated
with the potential loss of any mission-critical system. Corporation policy
requires that a business impact analysis be conducted as frequently as
changing conditions mandate, but that a review of the analysis should be
conducted no less than annually. This analysis is an essential step in the
process to develop and test contingency plans since the impact analysis
establishes the risks associated with disruption and helps prioritize the
recovery process. If service continuity controls are inadequate, even
relatively minor interruptions can result in lost or incorrectly processed
data, which can cause financial losses, expensive recovery efforts, and
financial or management information to be inaccurate or incomplete.

FDIC did not update its business impact analysis to reflect the
significant changes resulting from the implementation of the New Financial
Environment; consequently, the continuity plans and testing do not reflect
the current environment. We previously reported a similar business impact
analysis weakness in the corporation's information security controls.24
Although FDIC performed a limited disaster recovery test for the New
Financial Environment, the April 2005 test was conducted prior to
implementation of the new production system. Further, at the time of our
review, the corporation had not tested the new production environment.
Without a current business impact analysis for the new system and the
successful restoration of the new production environment, the corporation
cannot ensure that NFE will be recovered in a timely manner in the event
of a disaster.

Conclusions

While FDIC has made progress in addressing our previous recommendations,
information security weaknesses continue to impair the corporation's
ability to ensure the confidentiality, integrity, and availability of
financial and other sensitive data. The severity of these weaknesses was
such that we reported information system control weaknesses to be a
reportable condition in our 2005 financial audit report25 since financial
and sensitive information are at increased risk of unauthorized access,
modification, and/or disclosure, possibly without detection. Until FDIC
fully implements key security control elements that include enhanced
access permissions, system monitoring, physical access, and continuity of
operations, its facilities and computing resources and the information
that is processed, stored, and transmitted on its systems will remain
vulnerable to unauthorized access, modification, or destruction.

Recommendations for Executive Action

To help fully implement the corporation's information security program, we
recommend that the FDIC Chairman take the following five actions:

o consistently implement the corporation's documented policies and
procedures related to information security,

o include security plans or requirements for nonmajor applications into
the plans for general support systems,

o provide specialized training to individuals with significant security
responsibilities,

o report weaknesses as closed in remedial action plans only when
corrective actions have been completed, and

o update continuity of operations plans and test them for the New
Financial Environment.

We are also making recommendations in a separate report designated for
"Limited Official Use Only."  26 These recommendations address actions
needed to correct specific information security weaknesses related to
access and other information system controls.

Agency Comments and Our Evaluation

We received written comments on a draft of this report from FDIC's Deputy
to the Chairman and Chief Financial Officer (these are reprinted in app.
I). In these comments, the Deputy acknowledged the benefit of the
recommendations made as a part of this year's audit and provided examples
of actions that FDIC has taken with regard to security. The Deputy stated
that FDIC concurred with one of our recommendations, partially concurred
with three, and did not concur with one. He also stated that FDIC
disagreed with our assessment that its information system control
weaknesses were sufficient to constitute a reportable condition.

According to the Deputy, FDIC agreed with our recommendation that it
include security plans or requirements for nonmajor applications into the
plans for general support system and stated that it had added these
applications into such security plans. However, the Deputy questioned the
need for the corporation to assess the security plans for its payroll
service provider (the National Finance Center), as we had stated in a
draft of this report. FDIC considers that such effort on its part would be
duplicative, because its payroll service provider is federally certified
and audited by the Department of Agriculture's Inspector General, and FDIC
reviews the IG assessments. In addition, the Deputy stated that the
corporation has secured the appropriate agreements required for
interconnections of systems, as required by NIST. We agree with the FDIC
position and have revised the report accordingly.

With regard to our recommendation that FDIC consistently implement the
corporation's documented policies and procedures related to information
security, FDIC partially concurred. The corporation agreed with some
aspects of our analysis and took remedial action, such as removing certain
inactive accounts from computers, in conformance with corporation policy.
However, FDIC did not agree with other aspects of our assessment. For
example, we identified a machine in FDIC's security testing lab as not
compliant. According to the Deputy, the risk from this vulnerability was
fully mitigated because the machine was not a production computer, and
software was implemented to prevent simultaneous connection to the
production network and to wireless computing network. We disagree that
these conditions fully mitigate the risk posed by this vulnerability: in
certain circumstances, one vulnerable machine on a network could be used
to gain access to related networks and compromise the confidentiality,
integrity, and availability of information and information systems as a
whole. Even with mitigating controls, such vulnerability increases risk.

With regard to our recommendation that FDIC provide specialized training
to individuals with significant security responsibilities, FDIC partially
concurred. The corporation acknowledged that a "small subset" of employees
with significant security responsibilities did not attend the originally
scheduled specialized training; however, according to the Deputy, these
employees have since attended training or were provided with training
materials. Accordingly, FDIC believes that it is now in compliance with
this recommendation. As stated in our report, FDIC reported that only 58
percent of such employees had received specialized training. If the
remaining 42 percent have now received the appropriate training, FDIC will
have satisfied our recommendation.

With regard to our recommendation that FDIC update its continuity of
operations plans and test them for the New Financial Environment, FDIC
partially concurred. According to the Deputy, the corporation has now
updated its Business Impact Analysis (on which its continuity of
operations plans are based), and it retested its disaster recovery program
in 2006, including a full test of the New Financial Environment.
Accordingly, FDIC believes that it is now in compliance with this
recommendation. The Deputy described the corporation's concurrence as
partial because of the timing of several events, including the
corporation's response to Hurricane Katrina and other priorities.
According to the Deputy, FDIC had exercised its discretion in continuing
to rely on its previous Business Impact Analysis because of these other
priorities. In addition, the Deputy stated that although the corporation
did not test the New Financial Environment in a production environment, it
ran a limited test of the system before it went into production. At the
time of our review, however, the Business Impact Analysis did not reflect
the current environment, which had been significantly changed as a result
of the implementation of the New Financial Environment.  An outdated
Business Impact Analysis increases risk because this analysis provides a
mechanism for identifying the business functions that will be affected by
availability problems and thus forms the basis for disaster recovery
planning and testing. FDIC's recent actions to address this risk are thus
important; although we have not evaluated these actions, if they have been
implemented appropriately, FDIC will have satisfied our recommendation.

FDIC did not concur with our recommendation that it report weaknesses as
closed in remedial action plans only when corrective actions are taken.
According to the Deputy, the corporation disagreed with the assessment on
which this recommendation was based: that is, that it did not effectively
implement or accurately report the status of remedial actions. According
to FDIC, our observation was based on a single instance that was part of a
pilot test process, and thus the finding was not valid for the program
that was in place through most of 2005. However, we disagree with FDIC's
characterization that our observation was based on a single instance. Our
finding is based on a remediation plan that FDIC developed following a
security test and evaluation of its New Financial Environment. In that
plan, dated November 2005, we found 38 control weaknesses that were closed
without test or validation. FDIC also provided us with an updated
remediation plan for this test, dated December 2005, which did not include
the improperly closed weaknesses or any indication that they had been
addressed. We also disagree that our finding was not valid for the process
that was in place for most of 2005. Our analysis was based on the process
in

effect from March to December 2005.27 Further, several of the items that
were improperly closed were the same weaknesses that we identify in this
report. For example, we found that the corporation closed weaknesses that
had been identified in areas such as security awareness training,
segregation of duties, encryption, and audit and monitoring; however,
during our audit we found that these weaknesses still existed.

After the end of the review period, FDIC informed us that it was improving
its process to ensure that weaknesses were not closed without corrective
action, but we have not evaluated this improved process. In his comments,
the Deputy stated that FDIC is now in compliance with our recommendation,
because its mature program requires full monitoring of remedial actions
and testing for completion. If FDIC's process has been implemented
appropriately, the corporation will have satisfied our recommendation.

Finally, the FDIC does not share our assessment that it had a reportable
condition due to the severity of the risk impact or the magnitude of the
collective vulnerability posed by potential control issues. However, we
believe that the problems we identified in this report concerning FDIC's
security program adversely affected the overall security posture of the
corporation and did merit a reportable condition. These problems included
the (1) lack of consistent implementation of documented policies and
procedures related to information security, (2) absence of integration of
nonmajor applications into general support security plans, (3) lack of
specialized security training for trusted employees, (4) an oversight
process that allowed weaknesses to remain open even though they were
reported as closed, (4) lack of updated Business Impact Analyses and
contingency plans, (5) failure to test the New Financial Environment in a
production environment, and (6) significant access controls
vulnerabilities described in a separate report. All of these
vulnerabilities contributed to our reinstating a reportable condition on
FDIC information security controls.

We are sending copies of this report to the Chairman and Ranking Minority
Member of the Senate Committee on Banking, Housing, and Urban Affairs; the
Chairman and Ranking Minority Member of the House Committee on Financial
Services; members of the FDIC Audit Committee; officials in FDIC's
divisions of information resources management, administration, and
finance; and the FDIC inspector general. We also will make copies
available to others upon request. In addition, this report will be
available at no charge on the GAO Web site at http://www.gao.gov .

If you have any questions regarding this report, please contact me at
(202) 512-6244 or by e-mail at [email protected] . Contact points for our
Offices of Congressional Relations and Public Affairs may be found on the
last page of this report. Key contributors to this report are listed in
appendix II.

Gregory C. Wilshusen Director, Information Security Issues

Appendix I:  Comments from the Federal Deposit Insurance Corporation

Appendix II:  GAO Contact and Staff Acknowledgments 

GAO Contact

Gregory C. Wilshusen (202) 512-6244

Staff Acknowledgments

In addition to the individual named above, the following people made key
contributions to this report: William Wadsworth; Ed Alexander, Jr.; Gerald
Barnes; Angela Bell; Mark Canter; Jason Carroll; Lon Chin; Barbara
Collier; Anh Dang; Kristi Dorsey; Denise Fitzpatrick; Ed Glagola; Nancy
Glover; David Hayes; Sairah Ijaz; Kevin Metcalfe; Duc Ngo; Tammi Nguyen;
Eugene Stevens; Charles Vrabel; and Chris Warweg.

(310574)

www.gao.gov/cgi-bin/getrpt? GAO-06-620 .

To view the full product, including the scope

and methodology, click on the link above.

For more information, contact Gregory C. Wilshusen at (202) 512-6244 or
[email protected].

Highlights of GAO-06-620 , a report to the Board of Directors, Federal
Deposit Insurance Corporation

August 2006

INFORMATION SECURITY

Federal Deposit Insurance Corporation Needs to Improve Its Program

The Federal Deposit Insurance Corporation (FDIC) has a demanding
responsibility enforcing banking laws, regulating financial institutions,
and protecting depositors. The corporation relies extensively on
computerized systems to support and carry out its financial and
mission-related operations.

As part of the audit of the calendar year 2005 financial statements, GAO
assessed (1) the progress FDIC has made in correcting or mitigating
information security weaknesses previously reported and (2) the
effectiveness of the corporation's information system controls to protect
the confidentiality, integrity, and availability of its key financial
information and information systems.

What GAO Recommends

GAO recommends that the FDIC Chairman fully implement key elements of its
agencywide information security program.

In providing written comments on a draft of this report, FDIC's Deputy to
the Chairman and Chief Financial Officer stated that FDIC concurred with
one of GAO's recommendations, partially concurred with three, and did not
concur with one. FDIC also disagreed with GAO's assessment that its
information system control weaknesses were sufficient to constitute a
reportable condition.

FDIC has made progress in correcting previously reported weaknesses.
Specifically, the corporation has corrected or mitigated 18 of the 24
weaknesses that GAO previously reported as unresolved at the time of the
last review. Among actions FDIC has taken are developing and implementing
procedures to comply with its computer file naming convention standards
and developing and implementing automated procedures for limiting access
to sensitive information.

Nevertheless, FDIC has not consistently implemented information security
controls to properly protect the confidentiality, integrity, and
availability of its financial and sensitive information and information
systems. In addition to the remaining six previously reported weaknesses
for which FDIC has not completed corrective actions, GAO identified 20 new
information security weaknesses. Most identified weaknesses pertain to
access controls over (1) user accounts and passwords; (2) access rights
and permissions; (3) network services; (4) configuration assurance; (5)
audit and monitoring of security-related events; and (6) physical security
that are to prevent, limit, or detect access to its critical financial and
sensitive systems and information. In addition, weaknesses exist in other
information security controls relating to segregation of duties and
application change controls.

A key reason for these weaknesses is that FDIC has not fully implemented
elements of its information security program. For example, it has not
consistently implemented its security-related policies, addressed security
plans for certain applications, provided specialized training to
individuals with significant security responsibilities, implemented
remedial action plans for resolving known weaknesses, and updated or
tested continuity plans in light of its implementation of the new
financial environment. As a result, financial and sensitive information
are at increased risk of unauthorized access, modification, and/or
disclosure, possibly without detection. Because of this, GAO reported
information system control weaknesses to be a reportable condition in
2005.

GAO's Mission

The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting its
constitutional responsibilities and to help improve the performance and
accountability of the federal government for the American people. GAO
examines the use of public funds; evaluates federal programs and policies;
and provides analyses, recommendations, and other assistance to help
Congress make informed oversight, policy, and funding decisions. GAO's
commitment to good government is reflected in its core values of
accountability, integrity, and reliability.

Obtaining Copies of GAO Reports and Testimony

The fastest and easiest way to obtain copies of GAO documents at no cost
is through GAO's Web site ( www.gao.gov ). Each weekday, GAO posts newly
released reports, testimony, and correspondence on its Web site. To have
GAO e-mail you a list of newly posted products every afternoon, go to
www.gao.gov and select "Subscribe to Updates."

Order by Mail or Phone

The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent of
Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more
copies mailed to a single address are discounted 25 percent. Orders should
be sent to:

U.S. Government Accountability Office 441 G Street NW, Room LM Washington,
D.C. 20548

To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202)
512-6061

To Report Fraud, Waste, and Abuse in Federal Programs

Contact:

Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: [email protected]
Automated answering system: (800) 424-5454 or (202) 512-7470

Congressional Relations

Gloria Jarmon, Managing Director, [email protected] (202) 512-4400 U.S.
Government Accountability Office, 441 G Street NW, Room 7125 Washington,
D.C. 20548

Public Affairs

Paul Anderson, Managing Director, [email protected] (202) 512-4800 U.S.
Government Accountability Office, 441 G Street NW, Room 7149 Washington,
D.C. 20548
*** End of document. ***