{"id":200117,"date":"2017-06-21T03:56:09","date_gmt":"2017-06-21T07:56:09","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/watchdog-nsa-needs-to-boost-insider-threat-protocols-fcw-com\/"},"modified":"2017-06-21T03:56:09","modified_gmt":"2017-06-21T07:56:09","slug":"watchdog-nsa-needs-to-boost-insider-threat-protocols-fcw-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/watchdog-nsa-needs-to-boost-insider-threat-protocols-fcw-com\/","title":{"rendered":"Watchdog: NSA needs to boost insider-threat protocols &#8211; FCW.com"},"content":{"rendered":"<p><p>    Oversight  <\/p>\n<p>    The National Security Agency is still not fully implementing    all necessary security protocols to minimize the potential of    another Edward Snowden-like data breach, according to a newly    declassified 2016 Pentagon watchdog report.  <\/p>\n<p>    In the wake of the Snowden breach, the NSA outlined 40    privileged-access Secure-the-Net initiatives designed to    guard against insider threats by tightening controls over data    and monitoring of user access.  <\/p>\n<p>    The Defense Department's Office of the Inspector General    audited seven of the STN protocols and found that the NSA    implemented or partially implemented four of the audit sample.    Those related to developing a new system administration model,    assessing the number of systems administrators, implementing    two-stage authentication controls and deploying two-person    access controls.  <\/p>\n<p>    According to the heavily redacted report, the NSA culled the    number of systems administrators and implemented a tiered    system to take away privileged access from those who do not    require it.   <\/p>\n<p>    The report states the NSA only partially implemented two-stage    authentication and two-person access controls and did not    consistently secure server racks and other sensitive equipment    in data centers and machine rooms.  <\/p>\n<p>    The three audit initiatives where the NSA missed the mark were    in reducing the number of privileged users and data transfer    agents as well as fully implementing technology to oversee    privileged-user activities.  <\/p>\n<p>    NSA did not effectively implement the three initiatives    because it did not develop an STN strategy that detailed a    structured framework and methodology to implement the    initiatives and measure completeness, states the audit. As a    result, NSAs actions to implement STN did not fully meet the    intent of decreasing the risk of insider threats to NSA    operations and the ability of insiders to exfiltrate data.  <\/p>\n<p>    The report states that prior to 2013, the NSA did not know how    many privileged users and data transfer agents it had, and that    throughout 2014 the number of DTAs actually increased.  <\/p>\n<p>    The report acknowledges that it is not possible to protect    against all insider threats, but stresses that NSA must at    least implement all of its own stated protocols.  <\/p>\n<p>    Although the NSA worked in a fluid situation, NSA should have    developed a strategy that detailed a structured framework and    methodology for implementing STN to ensure its actions were    effective in mitigated vulnerabilities exploited during the    security breach, the report states.  <\/p>\n<p>    The NSAs woes did not end with the Snowden breach. In August    2016, a cryptic group or individual going by the name    TheShadowBrokers announced it had acquired a trove of NSA    hacking tools and has since been leaking some of the data in    an attempt to seduce buyers to pay for the    remaining stash.  <\/p>\n<p>    It is still not clear whether the so-called ShadowBrokers    obtained the data through an insider.  <\/p>\n<p>    The DOD OIG report made three recommendations -- all of which    were fully redacted -- and according to the document, the NSA    agreed with the recommendations.  <\/p>\n<p>    The NSA responded to questions about the audit from FCW with an    email statement.  <\/p>\n<p>    The National Security Agency operates in one of the most    complicated IT environments in the world, the NSA stated.    Over the past several years, we have continued to build on    internal security improvements while carrying out the mission    to defend the nation and our allies around the clock.  <\/p>\n<p>    According to the statement, the NSA has undertaken a    comprehensive and layered set of enterprise defensive measures    to further safeguard operations and advance best practices    across the Intelligence Community.  <\/p>\n<p>    NSA has never stopped seeking and implementing ways to    strengthen both security policies and internal controls, the    statement concluded.  <\/p>\n<p>      About the Author    <\/p>\n<p>       Sean      Carberry is an FCW staff writer covering defense,      cybersecurity and intelligence. Prior to joining FCW, he was      Kabul Correspondent for NPR, and also served as an      international producer for NPR covering the war in Libya and      the Arab Spring. He has reported from more than two-dozen      countries including Iraq, Yemen, DRC, and South Sudan. In      addition to numerous public radio programs, he has reported      for Reuters, PBS NewsHour, The Diplomat, and The Atlantic.    <\/p>\n<p>      Carberry earned a Master of Public Administration from the      Harvard Kennedy School, and has a B.A. in Urban Studies from      Lehigh University.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"https:\/\/fcw.com\/articles\/2017\/06\/19\/nsa-insider-audit.aspx\" title=\"Watchdog: NSA needs to boost insider-threat protocols - FCW.com\">Watchdog: NSA needs to boost insider-threat protocols - FCW.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Oversight The National Security Agency is still not fully implementing all necessary security protocols to minimize the potential of another Edward Snowden-like data breach, according to a newly declassified 2016 Pentagon watchdog report.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/watchdog-nsa-needs-to-boost-insider-threat-protocols-fcw-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-200117","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200117"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=200117"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200117\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=200117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=200117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=200117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}