{"id":200759,"date":"2017-06-23T06:05:56","date_gmt":"2017-06-23T10:05:56","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/va-fails-cyber-audit-for-18th-straight-year-but-progress-is-evident-federalnewsradio-com\/"},"modified":"2017-06-23T06:05:56","modified_gmt":"2017-06-23T10:05:56","slug":"va-fails-cyber-audit-for-18th-straight-year-but-progress-is-evident-federalnewsradio-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/progress\/va-fails-cyber-audit-for-18th-straight-year-but-progress-is-evident-federalnewsradio-com\/","title":{"rendered":"VA fails cyber audit for 18th straight year, but progress is evident &#8211; FederalNewsRadio.com"},"content":{"rendered":"<p><p>    In the two years since the Veterans Affairs Department    announced its goal of closing all cybersecurity material    weaknesses, the effortsdetailed in the latest audit    report from the agencys inspector general seem to be making a    difference.  <\/p>\n<p>    While VA fell short of its ultimate objective of cybersecurity    not being a material weakness in 2017the 18th year in a row    auditors rated it that way  the Office of Information and    Technology (OI&T) said in its response to the IGs Federal    Information Security Management Act (FISMA) report to Congress that    it has made significant progress across all 33 recommendations,    and is asking the IG to close 18 of them.  <\/p>\n<p>    For example, the IG says VA continued to struggle with ensuring    systems had an up-to-date authority to operate (ATO).  <\/p>\n<p>    Specifically, process deficiencies allowed certain system    authorizations to operate to expire and allowed other systems    to be reauthorized by an official without the proper    authority, the IG stated.  <\/p>\n<p>      Sponsored Content - Download our Executive Briefing      to learn how agency and industry experts are hoping to reduce      insider threats.    <\/p>\n<p>    But VAs chief information officers office says its Enterprise    Cybersecurity Strategy Team (ECST) has updated its processes    and is nowusing the ongoing authorizations approach as    required by the Office of Management and Budget in the Circular    A-130 update issued last fall.  <\/p>\n<p>    By the end of calendar year 2016, systems requiring an ATO    were updated to reflect the new AO, OI&Ts response    stated. Updated assessment and authorization (A&A) policy    and process to redefine roles and responsibilities of VAs    authorizing officials (AO), and AO procedures, which will allow    for oversight of systems throughout their full lifecycle.    Office of Cyber Security Policy and Compliance (OCSPC) conducts    routine, regularly scheduled briefings with the AO prior to    issuance of ATOs on systems within their purview.  <\/p>\n<p>    The system authorization process has been a problem at VA for    some time. Back in 2013, former VA chief information security    officer Jerry Davis claimed VA was    rubber stamping ATOs in order to get them completed before    they expired.  <\/p>\n<p>    After several congressional    hearings and the turnover of the CIO, VAs new leadership    promised to fix the long-standing cyber problems. Former VA CIO    Laverne Council said when she took over the role in 2015 that    her intention was to get rid of the    more than two dozen cyber weaknesses over the next two years.  <\/p>\n<p>    She created a cyber    strategy, the ECST and eight domains to address the biggest    problem areas.  <\/p>\n<p>    The cyber team is playing a major role in nearly every    initiative to close the IGs recommendations.  <\/p>\n<p>    Deputy Inspector General Linda Halliday said in an email to    Federal News Radio that her office will continue to review VAs    progress in improving its cyber posture.  <\/p>\n<p>    When the OIG receives evidence of appropriate corrective    action, we will generally close that recommendation, Halliday    said. As VA provides documentation to support the corrective    actions taken on any recommendation, we will review it and make    the determination on whether we can close that recommendation.    Further, we continue to assess VAs progress in implementing    corrective actions and their ability to sustain improvements    impacting VA information security posture during our annual    FISMA review in the following year.  <\/p>\n<p>    One area where VA says it has made progress has been a    long-time challenge around password management.  <\/p>\n<p>    Over the past two years, the ECST has implemented technology to    enforce password policies, mandated the use of smart identity    cards and initiated single sign-on capabilities.  <\/p>\n<p>    VA has enhanced password monitoring policies via credentialed,    predictive scans and remediation processes on OI&T systems.    Routine system scans are completed by the Network and Security    Operations Center (NSOC). Enterprise Discovery Scans (EDS) are    conducted on a quarterly basis to detect password    vulnerabilities across the enterprise, OI&T told auditors.    In order to improve organizationwide availability of security    data, VA has enhanced the reporting of scan results and has    published results with historical data on the Nessus Enterprise    Web Tool (NEWT). VA is using NEWT dashboards to monitor    password vulnerabilities and show trends based on the results    of EDS scans. Scan results are shared with users in the    enterprise who have been granted access to NEWT.  <\/p>\n<p>    Another major problem the IG pointed out was the lack of    visibility into their networks and therefore failure to    identify numerous high-risk security incidents, including    malware infections that were not remediated in a timely manner.    Specifically, we noted these issues at three major data centers    and two VA medical centers.  <\/p>\n<p>    The CIOs office said it expects to complete the national    deployment of an enterprisewide security incident and event    management toolby June 30.  <\/p>\n<p>    VAs OI&T said it is currently receiving logs from across    the enterprise to include centralized logging from devices    owned and managed by field operations to include Windows and    Linux servers, and network infrastructure devices    (routers\/switches). Other log sources such as domain    controllers, Domain Name Services (DNS), and ePolicy    Orchestrator (ePO) systems are now also included in the    centralized logging repository, which helps to enrich the data    lake and enhance data available for event monitoring,    correlation processes and incident response. Currently, only    failed logon events are being collected for infrastructure    devices.  <\/p>\n<p>    VA OI&T also expects to complete a related effort by June    30 to track and make sure patches and vulnerabilities are    closed in a timely manner.  <\/p>\n<p>    VA has an enterprise-wide scanning program performed by the    NSOC on a scheduled and ad-hoc basis (when needed or    requested). Results of the scans are rolled into NEWT for    analysis and reporting. The analysis tool provides an    enterprise view to the terminal device level (specific Internet    Protocol), the offices response stated. NEWT coverage has    been expanded to include Cisco and Red Hat Enterprise Linux    scan results as well as trending and historical remediation    efforts. VA implemented DbProtect, a database scanning tool, to    gain enterprise level access and insight to the many databases    that exist in the organization.  <\/p>\n<p>    VA told the IG it expects to close eight of the remaining    recommendations no later than Sept. 30 and then five more by    Dec. 31.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/federalnewsradio.com\/cybersecurity\/2017\/06\/va-fails-cyber-audit-for-18th-straight-year-but-progress-is-evident\/\" title=\"VA fails cyber audit for 18th straight year, but progress is evident - FederalNewsRadio.com\">VA fails cyber audit for 18th straight year, but progress is evident - FederalNewsRadio.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In the two years since the Veterans Affairs Department announced its goal of closing all cybersecurity material weaknesses, the effortsdetailed in the latest audit report from the agencys inspector general seem to be making a difference. While VA fell short of its ultimate objective of cybersecurity not being a material weakness in 2017the 18th year in a row auditors rated it that way the Office of Information and Technology (OI&#038;T) said in its response to the IGs Federal Information Security Management Act (FISMA) report to Congress that it has made significant progress across all 33 recommendations, and is asking the IG to close 18 of them. For example, the IG says VA continued to struggle with ensuring systems had an up-to-date authority to operate (ATO) <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/progress\/va-fails-cyber-audit-for-18th-straight-year-but-progress-is-evident-federalnewsradio-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187725],"tags":[],"class_list":["post-200759","post","type-post","status-publish","format-standard","hentry","category-progress"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200759"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=200759"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/200759\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=200759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=200759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=200759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}