SlideShare a Scribd company logo
VA hacked by foreign orgs, security needs standardization
June 05, 2013 | AnthonyBrino,Associate Editor
RelatedNews
VA compromise bill wouldbolstertelemedicine,schedulingsoftware
iEHR redefined:DOD'stop3 tacticsin VA turf war detente
GAO: DoD,VA missEHR interoperabilitybyamile
AllscriptsbringsCSCandHP to DoD EHR fight
MHS CIOtalksEHR procurement
The Departmentof VeteransAffairsdatabase hasbeenhackedbyatleasteightforeignorganizations,
includingthe Chinese military,the House Veterans'Affairsoversightandinvestigationssubcommittee
learnedTuesday.
TestimonyfromVA inspectorgeneral officialsandaformerVA informationsecurityofficialshow an
agencystrugglingtomanage securityfora vast IT systemat clinics,officesanddatacentersacross the
country — leadingtodata breacheslike the well-knownstolenlaptopin2006 and to attacks by
nefariousforeigngroups.
A rankingVA official toldsubcommittee membersthatthe agencyisinthe midstof a wide-ranging
securitystandardizationplan — intendingtoencryptall butcertainexemptcomputersbythe endof
June,forinstance.Butagencywatchdogsand a formerIT securityofficial saidthere’salotof workleft
to do.
In August2010, JerryDavis,a formerMarine andGulf War veteran,tookoveras the VA’schief
informationsecurityofficer,and“inheritedthe resultsof more than15 continuousyearsof an
unattendedanddocumentedmaterial weaknessinITsecuritycontrols,”ashe toldthe subcommittee.
“In nearly20 yearsof buildingandmanagingsecurityprogramsacrossgovernmentandprivate industry,
I had neverseenanorganizationwithasmanyunattendedITsecurityvulnerabilities,”Davissaid,noting
some 13,000 corrective actionswaitingtobe completedashe arrived.
Those notwithstanding,the “mostconcerningissue”forDavisarose froma conversationwiththenVA
principal deputyassistantsecretaryStephenWarren,whoapparentlytoldhimnotlongafterarrivingat
the VA:“We have uninvitedvisitors inthe network.”
Davisthenlearnedthatthe VA NetworkSecurityOperationsTeamfirstnoticed“seriousnetwork
compromises”inMarch 2010 from“nationstate-sponsoredattackers.”ByDavis’estimate,eight
differentforeignorganizationshad“successfully compromisedVA networksanddataor were actively
attackingVA networks,”andmaystill be doingsotoday.
There isn’ttoomuch knownaboutthe nature of the foreignattacks;manylikelyoriginatedfromthe
Chinese militaryandsome mayhave come fromRussian-linkedorganizations,ashypothesizedby
subcommittee chairmanMike Coffman,aRepublicanfromColoradowhoconvenedthe hearing.It’salso
not clearwhat,if any, veteraninformationwastaken,butCoffmansaiditwaspossible thatpersonal
data such as Social Securitynumberswere viewed.
Davis,wholeftthe VA to become CIOat the NASA AmesResearchCenterearlierthisyear,citedseveral
contributingfactorsthatenabledthe hackings:lackof encryptioninVA databases,webapplications
with“commonexploitable vulnerabilities”andweakauthenticationinsensitivesystems.
Davissaidhe startedtryingto counterthe attacks andseal up securitygapsthroughseveral initiatives
for webapplicationsecurity,software assurance andcontinuingmonitoring,andthe VA eventuallyfixed
about10,000 problemsidentifiedinthe 13,000 securitycorrective actions.
But Davisalsotoldthe subcommitteehe encounteredorganizational problems.Hisoffice wasaskedto
attestthat VA systemswere adequatelysecure,althoughthe processesnecessarytoensure that,Davis
said,were “completelyfaultyandimproperandthe implementationof the processexposedVeteran
systemsandVA informationtofurtherriskof compromise.”
Daviswenton,“It was confirmedtome by the VA informationsecuritystaff chargedwithexecutingthe
processthat itwas flawed,providednovalue andthatprovidingapositive attestationtothe adequacy
of securitycontrolswouldseriouslycompromise the integrityof the VA securityprogram.”
Davissuggestedthatthe subcommitteetrytohave the greaterVA networkdesignatedasa
“compromisedenvironment,”toensure “reclamationof control.”He alsorecommendedthatVA
networksbe movedintoa“full continuousmonitoringanddiagnosticsprogramwithnearreal time
situational awarenessof itssecurityposture,”andthatorganizational reportingforthe deputyassistant
secretaryof informationsecurity(wherehe washousedasCISO) be streamlineddirectlytothe assistant
secretaryforthe Office of InformationTechnologyorthe Office of the Secretary.
[See also:Q&A:Why IT securitygrowsmore complex.]
AlsotestifyingwasStephenWarren,whofirstalertedDavistothe problemsandwhoisnow the acting
VA CIO.
Warren broadlyaddressedsome of the securityconcerns,outliningseveralplansthe agencyhasto
standardize securityacrossitsITsystems,andalsosaidthere wasn’tany evidenceof information
actuallybeingtakenbyforeignhackers.(Coffman,though,respondedtothatbysayingthat absence of
evidence doesn’tnecessarilymeaninformationwasn’tstolen.)
Emphasizingthe agency’sbidtowardcorrectingsecurityproblems,Warrenalsosaidthatofficialsare
“fosteringaculture change”and focusingonencryption.Over98percentof the VA’s non-medical
laptopsare encrypted,he said.Bythe endof thismonth,the agencyexpectstocomplete the encryption
of all laptopsexceptthose withspecificwaivers(certainmedical andresearchlaptops,service laptops
not connectedtothe VA networkand laptopsgiventoveteransforrehabilitation).
Warren alsosaidthe VA is increasingcontinuousmonitoringof the sortDavisrecommended,withthe
“VisibilityintoEverything”initiative thatallowsVA ITtosee and manage all of itsdevicesandnetwork
componentsinnearreal time.
As part of that culture change,though,officialsfromthe VA Office of the InspectorGeneral saidthe
agencyhas a lot more workto do. LindaHalliday,assistantinspectorgeneral forauditsandevaluations,
toldthe subcommittee that“VA continuestoface significantchallengesimplementingeffective access
controls,configurationmanagementcontrols,andcontingencyplanningtoprotectmission-critical
systemsfromunauthorizedaccess,alteration,ordestruction.”
Several investigationsbythe OIGhave “disclosedapatternof ineffective informationsecuritycontrols
that expose VA’smission-critical systemsandsensitive datatounnecessaryrisk,”Hallidaysaid.
Duringfiscal year2012, the VA OIG conductedan extensive review of VA ITand issetto release its
findingsthismonth,Hallidaysaid.Amongsome of the findings:keydatabaseswere nottimelypatched
or securelyconfiguredtomitigate knownandunknown informationsecurityvulnerabilities,and
baseline configurationswereinconsistentlyimplementedtomitigatesignificantsystemsecurityrisks
and vulnerabilitiesacrossthe facilities.
In a reviewof the VA’scompliance withthe FederalInformationSecurityManagementAct,Hallidaysaid
the OIG foundthat passwordstandardswere notconsistentlyimplementedandenforcedacross
multiple VA systems,andthatmulti-factorauthenticationforremote accesshadnotbeenimplemented
agency-wide.The FISMA compliance auditalsofoundinconsistentreviewsof networksandapplication
useraccess that resultedin“numerousgeneric,system, andinactiveuseraccounts”thatwere not
removedordeactivatedfromthe system, aswell as“outdatedsecuritymanagementdocumentation.”
“More importantly,we continuetoidentifysignificanttechnicalweaknessesindatabases,servers,and
networkdevicesthatsupporttransmittingsensitive informationamongVA’sMedical Centers,data
centersandVA central office,”Hallidaysaid, blamingthose problemson“inconsistentenforcement.”

More Related Content

What's hot

Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
James Gachie
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
Nexon Asia Pacific
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
The Internet of Things
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
The Internet of Things
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
United Technology Group (UTG)
 
10 things you should know about cybersecurity
10 things you should know about cybersecurity10 things you should know about cybersecurity
10 things you should know about cybersecurity
United Technology Group (UTG)
 
Security Web Servers
Security Web ServersSecurity Web Servers
Security Web ServersAung Khant
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
Eoin Keary
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions
Swapnil Deshmukh
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
Jeremiah Grossman
 

What's hot (10)

Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
10 things you should know about cybersecurity
10 things you should know about cybersecurity10 things you should know about cybersecurity
10 things you should know about cybersecurity
 
Security Web Servers
Security Web ServersSecurity Web Servers
Security Web Servers
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Intelligent cyber security solutions
Intelligent cyber security solutionsIntelligent cyber security solutions
Intelligent cyber security solutions
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
 

Viewers also liked

Andrzejewski, Barbara
Andrzejewski, BarbaraAndrzejewski, Barbara
Andrzejewski, BarbaraMichael Holt
 
Maurita Tollestrup,
Maurita Tollestrup, Maurita Tollestrup,
Maurita Tollestrup,
Maurita Tollestrup
 
Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...
Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...
Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...
CTI2014
 
PaidAmplification-JH
PaidAmplification-JHPaidAmplification-JH
PaidAmplification-JHJoy Hays
 
In-House Agencies working with External Partners
In-House Agencies working with External PartnersIn-House Agencies working with External Partners
In-House Agencies working with External Partners
Rich Whalen
 
A flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerA flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerMichael Holt
 
Mayo Clinic's social media DNA, presented by Lee Aase
Mayo Clinic's social media DNA, presented by Lee AaseMayo Clinic's social media DNA, presented by Lee Aase
Mayo Clinic's social media DNA, presented by Lee Aase
SocialMedia.org Health
 
Challenge based learning for rich, authentic engagement
Challenge based learning for rich, authentic engagementChallenge based learning for rich, authentic engagement
Challenge based learning for rich, authentic engagement
Kim Flintoff
 
бунимович 6кл
бунимович 6клбунимович 6кл
бунимович 6кл
reshyvse
 
Услуга контактный центр по запросу
Услуга контактный центр по запросуУслуга контактный центр по запросу
Услуга контактный центр по запросу
CTI2014
 
9 l1 b
9 l1 b9 l1 b
9 l1 b
YchebnikRU1
 
The benefits of patient involvement in research and development (RE:ACT Congr...
The benefits of patient involvement in research and development (RE:ACT Congr...The benefits of patient involvement in research and development (RE:ACT Congr...
The benefits of patient involvement in research and development (RE:ACT Congr...
jangeissler
 
Spectrum Health System: Using animated video to share social media guidelines...
Spectrum Health System: Using animated video to share social media guidelines...Spectrum Health System: Using animated video to share social media guidelines...
Spectrum Health System: Using animated video to share social media guidelines...
SocialMedia.org Health
 
11 ayku bib
11 ayku bib11 ayku bib
11 ayku bib
YchebnikRU1
 
11 l2 ch_2011
11 l2 ch_201111 l2 ch_2011
11 l2 ch_2011
YchebnikRU1
 
11 l1 zh
11 l1 zh11 l1 zh
11 l1 zh
YchebnikRU1
 
Lindenwood Legacy Cartoon
Lindenwood Legacy CartoonLindenwood Legacy Cartoon
Lindenwood Legacy CartoonWes Murrell
 
Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...
Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...
Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...
Sarathy Kalaichelvan
 
5 ayf v
5 ayf v5 ayf v
5 ayf v
YchebnikRU
 
Timberland: Social media case study, presented by Frank Hwang
Timberland: Social media case study, presented by Frank HwangTimberland: Social media case study, presented by Frank Hwang
Timberland: Social media case study, presented by Frank Hwang
SocialMedia.org
 

Viewers also liked (20)

Andrzejewski, Barbara
Andrzejewski, BarbaraAndrzejewski, Barbara
Andrzejewski, Barbara
 
Maurita Tollestrup,
Maurita Tollestrup, Maurita Tollestrup,
Maurita Tollestrup,
 
Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...
Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...
Презентация CTI "Почему важно инвестировать именно в средства совместной рабо...
 
PaidAmplification-JH
PaidAmplification-JHPaidAmplification-JH
PaidAmplification-JH
 
In-House Agencies working with External Partners
In-House Agencies working with External PartnersIn-House Agencies working with External Partners
In-House Agencies working with External Partners
 
A flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet ExplorerA flaw in Microsoft's Internet Explorer
A flaw in Microsoft's Internet Explorer
 
Mayo Clinic's social media DNA, presented by Lee Aase
Mayo Clinic's social media DNA, presented by Lee AaseMayo Clinic's social media DNA, presented by Lee Aase
Mayo Clinic's social media DNA, presented by Lee Aase
 
Challenge based learning for rich, authentic engagement
Challenge based learning for rich, authentic engagementChallenge based learning for rich, authentic engagement
Challenge based learning for rich, authentic engagement
 
бунимович 6кл
бунимович 6клбунимович 6кл
бунимович 6кл
 
Услуга контактный центр по запросу
Услуга контактный центр по запросуУслуга контактный центр по запросу
Услуга контактный центр по запросу
 
9 l1 b
9 l1 b9 l1 b
9 l1 b
 
The benefits of patient involvement in research and development (RE:ACT Congr...
The benefits of patient involvement in research and development (RE:ACT Congr...The benefits of patient involvement in research and development (RE:ACT Congr...
The benefits of patient involvement in research and development (RE:ACT Congr...
 
Spectrum Health System: Using animated video to share social media guidelines...
Spectrum Health System: Using animated video to share social media guidelines...Spectrum Health System: Using animated video to share social media guidelines...
Spectrum Health System: Using animated video to share social media guidelines...
 
11 ayku bib
11 ayku bib11 ayku bib
11 ayku bib
 
11 l2 ch_2011
11 l2 ch_201111 l2 ch_2011
11 l2 ch_2011
 
11 l1 zh
11 l1 zh11 l1 zh
11 l1 zh
 
Lindenwood Legacy Cartoon
Lindenwood Legacy CartoonLindenwood Legacy Cartoon
Lindenwood Legacy Cartoon
 
Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...
Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...
Mapping the Business Model(Osterwalder Canvas) and Marketing Strategies of ET...
 
5 ayf v
5 ayf v5 ayf v
5 ayf v
 
Timberland: Social media case study, presented by Frank Hwang
Timberland: Social media case study, presented by Frank HwangTimberland: Social media case study, presented by Frank Hwang
Timberland: Social media case study, presented by Frank Hwang
 

Similar to Veterans Administration Hacked by foreign orgs, security needs standardization

Snarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdfSnarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdf
Yury Chemerkin
 
Snarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdfSnarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
Suresh Mandava
 
Running Head cyber security Emerging Cyber security T.docx
Running Head cyber security Emerging Cyber security T.docxRunning Head cyber security Emerging Cyber security T.docx
Running Head cyber security Emerging Cyber security T.docx
charisellington63520
 
1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docx1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docx
moggdede
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
Sophia Price
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
SophiaPalmira1
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
Journal For Research
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay Dean Kay
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
marilucorr
 
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agencyUs in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Waqas Amir
 
Gao report
Gao reportGao report
Gao report
Carlos Carvalho
 
Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015John Boyd
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesAli Youssef
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2Shane Kite
 
Computer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docxComputer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docx
patricke8
 

Similar to Veterans Administration Hacked by foreign orgs, security needs standardization (20)

Snarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdfSnarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdf
 
Snarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdfSnarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdf
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
Running Head cyber security Emerging Cyber security T.docx
Running Head cyber security Emerging Cyber security T.docxRunning Head cyber security Emerging Cyber security T.docx
Running Head cyber security Emerging Cyber security T.docx
 
1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docx1212018 SafeAssign Originality Reporthttpswilmu.black.docx
1212018 SafeAssign Originality Reporthttpswilmu.black.docx
 
Application Security
Application SecurityApplication Security
Application Security
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
BIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATIONBIOMETRIC REMOTE AUTHENTICATION
BIOMETRIC REMOTE AUTHENTICATION
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
 
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agencyUs in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
Us in-flight-wi-fi-internet-could-be-hacked-warns-federal-watchdog-agency
 
Gao report
Gao reportGao report
Gao report
 
Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015
 
Power station monitoring and cyber security
Power station monitoring and cyber securityPower station monitoring and cyber security
Power station monitoring and cyber security
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
 
ghostsinthemachine2
ghostsinthemachine2ghostsinthemachine2
ghostsinthemachine2
 
Computer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docxComputer Security Incident Handling Guide Recommendati.docx
Computer Security Incident Handling Guide Recommendati.docx
 

More from Michael Holt

NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
Michael Holt
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
Michael Holt
 
Icreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisIcreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysis
Michael Holt
 
Google never killed authorship entirely, some of the code still remains being...
Google never killed authorship entirely, some of the code still remains being...Google never killed authorship entirely, some of the code still remains being...
Google never killed authorship entirely, some of the code still remains being...
Michael Holt
 
Bash software bug could be bigger threat than heartbleed, experts warn
Bash software bug could be bigger threat than heartbleed, experts warnBash software bug could be bigger threat than heartbleed, experts warn
Bash software bug could be bigger threat than heartbleed, experts warn
Michael Holt
 
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor AccessFederal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
Michael Holt
 
Letter of Recommendation - Holt(1)
Letter of Recommendation - Holt(1)Letter of Recommendation - Holt(1)
Letter of Recommendation - Holt(1)Michael Holt
 
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1Michael Holt
 
NSA's Secret Google-Like Search Engine for Metadata Analysis
NSA's Secret Google-Like Search Engine for Metadata AnalysisNSA's Secret Google-Like Search Engine for Metadata Analysis
NSA's Secret Google-Like Search Engine for Metadata AnalysisMichael Holt
 
Analytics Trackers
Analytics TrackersAnalytics Trackers
Analytics TrackersMichael Holt
 

More from Michael Holt (12)

NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
NSA, GCHQ, Five, Nine and Fourteen Eyes White Paper on Cybersecurity Exploit ...
 
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniquesNSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
NSA, GCHQ, Five, Nine, Fourteen Eye tactics and techniques
 
Icreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysisIcreach — nsa's secret google like search engine for metadata analysis
Icreach — nsa's secret google like search engine for metadata analysis
 
Google never killed authorship entirely, some of the code still remains being...
Google never killed authorship entirely, some of the code still remains being...Google never killed authorship entirely, some of the code still remains being...
Google never killed authorship entirely, some of the code still remains being...
 
Bash software bug could be bigger threat than heartbleed, experts warn
Bash software bug could be bigger threat than heartbleed, experts warnBash software bug could be bigger threat than heartbleed, experts warn
Bash software bug could be bigger threat than heartbleed, experts warn
 
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor AccessFederal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
Federal CyberSecurity Whistleblower on Analytics trackers and Backdoor Access
 
Letter of Recommendation - Holt(1)
Letter of Recommendation - Holt(1)Letter of Recommendation - Holt(1)
Letter of Recommendation - Holt(1)
 
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1
Merit Systems Protection Board Docket Number SF-0752-11-0427-I-1
 
Ron Wyden
Ron WydenRon Wyden
Ron Wyden
 
NSA's Secret Google-Like Search Engine for Metadata Analysis
NSA's Secret Google-Like Search Engine for Metadata AnalysisNSA's Secret Google-Like Search Engine for Metadata Analysis
NSA's Secret Google-Like Search Engine for Metadata Analysis
 
Beacons
BeaconsBeacons
Beacons
 
Analytics Trackers
Analytics TrackersAnalytics Trackers
Analytics Trackers
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Veterans Administration Hacked by foreign orgs, security needs standardization

  • 1. VA hacked by foreign orgs, security needs standardization June 05, 2013 | AnthonyBrino,Associate Editor RelatedNews VA compromise bill wouldbolstertelemedicine,schedulingsoftware iEHR redefined:DOD'stop3 tacticsin VA turf war detente GAO: DoD,VA missEHR interoperabilitybyamile AllscriptsbringsCSCandHP to DoD EHR fight MHS CIOtalksEHR procurement The Departmentof VeteransAffairsdatabase hasbeenhackedbyatleasteightforeignorganizations, includingthe Chinese military,the House Veterans'Affairsoversightandinvestigationssubcommittee learnedTuesday. TestimonyfromVA inspectorgeneral officialsandaformerVA informationsecurityofficialshow an agencystrugglingtomanage securityfora vast IT systemat clinics,officesanddatacentersacross the country — leadingtodata breacheslike the well-knownstolenlaptopin2006 and to attacks by nefariousforeigngroups. A rankingVA official toldsubcommittee membersthatthe agencyisinthe midstof a wide-ranging securitystandardizationplan — intendingtoencryptall butcertainexemptcomputersbythe endof June,forinstance.Butagencywatchdogsand a formerIT securityofficial saidthere’salotof workleft to do. In August2010, JerryDavis,a formerMarine andGulf War veteran,tookoveras the VA’schief informationsecurityofficer,and“inheritedthe resultsof more than15 continuousyearsof an unattendedanddocumentedmaterial weaknessinITsecuritycontrols,”ashe toldthe subcommittee. “In nearly20 yearsof buildingandmanagingsecurityprogramsacrossgovernmentandprivate industry, I had neverseenanorganizationwithasmanyunattendedITsecurityvulnerabilities,”Davissaid,noting some 13,000 corrective actionswaitingtobe completedashe arrived. Those notwithstanding,the “mostconcerningissue”forDavisarose froma conversationwiththenVA principal deputyassistantsecretaryStephenWarren,whoapparentlytoldhimnotlongafterarrivingat the VA:“We have uninvitedvisitors inthe network.” Davisthenlearnedthatthe VA NetworkSecurityOperationsTeamfirstnoticed“seriousnetwork compromises”inMarch 2010 from“nationstate-sponsoredattackers.”ByDavis’estimate,eight differentforeignorganizationshad“successfully compromisedVA networksanddataor were actively attackingVA networks,”andmaystill be doingsotoday.
  • 2. There isn’ttoomuch knownaboutthe nature of the foreignattacks;manylikelyoriginatedfromthe Chinese militaryandsome mayhave come fromRussian-linkedorganizations,ashypothesizedby subcommittee chairmanMike Coffman,aRepublicanfromColoradowhoconvenedthe hearing.It’salso not clearwhat,if any, veteraninformationwastaken,butCoffmansaiditwaspossible thatpersonal data such as Social Securitynumberswere viewed. Davis,wholeftthe VA to become CIOat the NASA AmesResearchCenterearlierthisyear,citedseveral contributingfactorsthatenabledthe hackings:lackof encryptioninVA databases,webapplications with“commonexploitable vulnerabilities”andweakauthenticationinsensitivesystems. Davissaidhe startedtryingto counterthe attacks andseal up securitygapsthroughseveral initiatives for webapplicationsecurity,software assurance andcontinuingmonitoring,andthe VA eventuallyfixed about10,000 problemsidentifiedinthe 13,000 securitycorrective actions. But Davisalsotoldthe subcommitteehe encounteredorganizational problems.Hisoffice wasaskedto attestthat VA systemswere adequatelysecure,althoughthe processesnecessarytoensure that,Davis said,were “completelyfaultyandimproperandthe implementationof the processexposedVeteran systemsandVA informationtofurtherriskof compromise.” Daviswenton,“It was confirmedtome by the VA informationsecuritystaff chargedwithexecutingthe processthat itwas flawed,providednovalue andthatprovidingapositive attestationtothe adequacy of securitycontrolswouldseriouslycompromise the integrityof the VA securityprogram.” Davissuggestedthatthe subcommitteetrytohave the greaterVA networkdesignatedasa “compromisedenvironment,”toensure “reclamationof control.”He alsorecommendedthatVA networksbe movedintoa“full continuousmonitoringanddiagnosticsprogramwithnearreal time situational awarenessof itssecurityposture,”andthatorganizational reportingforthe deputyassistant secretaryof informationsecurity(wherehe washousedasCISO) be streamlineddirectlytothe assistant secretaryforthe Office of InformationTechnologyorthe Office of the Secretary. [See also:Q&A:Why IT securitygrowsmore complex.] AlsotestifyingwasStephenWarren,whofirstalertedDavistothe problemsandwhoisnow the acting VA CIO. Warren broadlyaddressedsome of the securityconcerns,outliningseveralplansthe agencyhasto standardize securityacrossitsITsystems,andalsosaidthere wasn’tany evidenceof information actuallybeingtakenbyforeignhackers.(Coffman,though,respondedtothatbysayingthat absence of evidence doesn’tnecessarilymeaninformationwasn’tstolen.) Emphasizingthe agency’sbidtowardcorrectingsecurityproblems,Warrenalsosaidthatofficialsare “fosteringaculture change”and focusingonencryption.Over98percentof the VA’s non-medical laptopsare encrypted,he said.Bythe endof thismonth,the agencyexpectstocomplete the encryption of all laptopsexceptthose withspecificwaivers(certainmedical andresearchlaptops,service laptops not connectedtothe VA networkand laptopsgiventoveteransforrehabilitation).
  • 3. Warren alsosaidthe VA is increasingcontinuousmonitoringof the sortDavisrecommended,withthe “VisibilityintoEverything”initiative thatallowsVA ITtosee and manage all of itsdevicesandnetwork componentsinnearreal time. As part of that culture change,though,officialsfromthe VA Office of the InspectorGeneral saidthe agencyhas a lot more workto do. LindaHalliday,assistantinspectorgeneral forauditsandevaluations, toldthe subcommittee that“VA continuestoface significantchallengesimplementingeffective access controls,configurationmanagementcontrols,andcontingencyplanningtoprotectmission-critical systemsfromunauthorizedaccess,alteration,ordestruction.” Several investigationsbythe OIGhave “disclosedapatternof ineffective informationsecuritycontrols that expose VA’smission-critical systemsandsensitive datatounnecessaryrisk,”Hallidaysaid. Duringfiscal year2012, the VA OIG conductedan extensive review of VA ITand issetto release its findingsthismonth,Hallidaysaid.Amongsome of the findings:keydatabaseswere nottimelypatched or securelyconfiguredtomitigate knownandunknown informationsecurityvulnerabilities,and baseline configurationswereinconsistentlyimplementedtomitigatesignificantsystemsecurityrisks and vulnerabilitiesacrossthe facilities. In a reviewof the VA’scompliance withthe FederalInformationSecurityManagementAct,Hallidaysaid the OIG foundthat passwordstandardswere notconsistentlyimplementedandenforcedacross multiple VA systems,andthatmulti-factorauthenticationforremote accesshadnotbeenimplemented agency-wide.The FISMA compliance auditalsofoundinconsistentreviewsof networksandapplication useraccess that resultedin“numerousgeneric,system, andinactiveuseraccounts”thatwere not removedordeactivatedfromthe system, aswell as“outdatedsecuritymanagementdocumentation.” “More importantly,we continuetoidentifysignificanttechnicalweaknessesindatabases,servers,and networkdevicesthatsupporttransmittingsensitive informationamongVA’sMedical Centers,data centersandVA central office,”Hallidaysaid, blamingthose problemson“inconsistentenforcement.”