http://www.gcn.com/vol1_no1/daily-updates/38341-1.html

By Mary Mosquera 
GCN Staff
02/27/06 

The IRS has not consistently maintained the security settings it 
established and deployed under a common operating environment (COE), 
resulting in a high risk of exploitation for some of its computers, 
according to the Treasury Department's inspector general for tax 
administration. 

The IRS has adopted a common operating environment for security
configurations on all of its workstations. The common environment lets
IRS control security configuration settings and software on
workstations by using one master COE template, which the IRS installs
on its computers. The IRS has installed the master COE image on 95
percent of its computers, TIGTA said in its report [1] released today.

Agencies must be able to control security settings under the Federal
Information Security Management Act to strengthen the security of
federal systems.

"The COE essentially minimizes the risk of someone compromising
computers on the IRS network," said Michael Phillips, TIGTA's deputy
inspector general for audit, in the report.

Of 102 computers tested, only 41 percent continued to be in
compliance; 59 percent were not or contained at least one high-risk
vulnerability that would allow the computer to be exploited or
rendered unusable. Almost one-half of the compliant computers
contained at least one incorrect setting that could allow employees to
circumvent security controls established by the common operating
environment.

Also, at the time of the audit, the COE security settings had not been
installed on more than 4,700 computers. Without them, computers were
missing security patches and at high risk for viruses.

TIGTA recommended that the IRS hold system administrators accountable
for maintaining adequate security settings and periodically check
configurations on a sample of computers to assure that they continue
to comply with the COE. Computers that do not have the common
environment should have it installed, or the computers replaced or
brought manually into compliance with the prescribed security
configurations, TIGTA said in its report.

In addition, the IRS at the time did not own a software license
tracking or metering tool that could identify software use for a
baseline inventory. For example, the IRS spends up to $32 million
annually for Microsoft Office suite products. But the IRS could not
explain how it arrived at the number of licenses needed.

"Without the ability to track software usage and licenses, the IRS may
have unused licenses available that could be redistributed or have
licenses that are not needed," Phillips said.

The IRS has established a combined Modernization and Information
Technology Services organization to prioritize corrective actions that
were recommended, which reduces the security risk, said IRS CIO Todd
Grams said in a response last month.

"We believe the recommendations in this audit are low-risk control
deficiencies," he said.

Also, as the tax agency has replaced computers and moved from the
Windows NT environment, more computers are running the common
operating environment security control settings.

The IRS will direct system administrators this week to ensure that the
password-protected start-up process is enabled and that the system
administrator accounts are limited to those who need them to carry out
their responsibilities.

The IRS has already targeted noncompliant workstations with
distribution of baseline COE patches and security settings. By June,
IRS will develop a recurring report to identify those computers that
do not meet the current version.

By August, the IRS will deploy a software metering tool to gather data
about software usage and related costs. And to improve oversight of
its software licensing, the IRS will implement a software inventory
application by October.

[1] http://www.ustreas.gov/tigta/auditreports/2006reports/200620031fr.pdf



_________________________________
InfoSec News v2.0 - Coming Soon! 
http://www.infosecnews.org 

Reply via email to