According to a recent report by the Office of the Inspector General, the Department of Homeland Security still has a lot of work to do when it comes to the agency’s cyber security posture.
The audit report published on September 4, 2015, highlights two specific OIG recommendations that remain unresolved.
Number 1: Individuals with major security responsibilities have yet to receive “annual specialized security training”.
The OIG made a statement mentioning that when the mandatory training is not provided, components cannot guarantee that their personnel with major security responsibilities have the appropriate skills and knowledge to properly manage and secure systems against potential attacks.
The DHS acknowledged their lack of training and said that by November 30, 2015, it would “leverage any/all applicable Virtual University training opportunities related to information systems security.”
Number 2: The report identified a variety of vulnerabilities on internal websites, stating they could allow “unauthorized individuals to gain access to sensitive data.”
Cross-frame scripting vulnerabilities that could potentially be used to mislead an authentic user into turning over sensitive information as well as structured query language injection vulnerabilities that could lead to the alteration of support infrastructure were among the few flaws found within their internal websites.
Even worse, the United States Immigration and Customs Enforcement (ICE), which is part of the DHS, confirmed it does not use a vulnerability assessment tool to scan its websites.
Although the OIG acknowledged that the DHS has strengthened their performance in cyber missions, it appears there’s still a lot of work to be done to strengthen their cyber security environment.
The concept of security best practices have been developed for a reason, and the unfortunate reality is, these breaches will continue to happen without the best security practices and solutions in place. With NNT’s Change Tracker Gen7, you’ll be equipped with solutions like File Integrity Monitoring and Change & Configuration Management to help protect your cyber security environment from a potential hack or breach.
Read the full OIG Audit Report
Read the full article on SC Magazine