Skip to main content

Federal Information Security: Agencies and OMB Need to Strengthen Policies and Practices

GAO-19-545 Published: Jul 26, 2019. Publicly Released: Jul 26, 2019.
Jump To:

Fast Facts

A 2014 law requires federal agencies to have information security programs. The Office of Management and Budget oversees these efforts. We looked at how agencies and OMB have implemented the law and found:

Of our sample of 16 agencies, most had weaknesses in most security control areas

Inspectors General reported ineffective programs at 18 of 24 major agencies

OMB coordinated cybersecurity review meetings with 3 agencies in fiscal year 2018, compared to 24 in 2016

Our recommendations to OMB include holding those meetings at more agencies that need them. Federal information security has been a topic on our High Risk List since 1997.

 

Photograph of hands typing on a laptop.

Skip to Highlights

Highlights

What GAO Found

During fiscal year 2018, many federal agencies were often not adequately or effectively implementing their information security policies and practices. For example, most of the 16 agencies GAO selected for review had deficiencies related to implementing the eight elements of an agency-wide information security program required by the Federal Information Security Modernization Act of 2014 (FISMA) (see figure) . Further, inspectors general (IGs) reported that 18 of the 24 Chief Financial Officers (CFO) Act of 1990 agencies did not have effective agency-wide information security programs. GAO and IGs have previously made numerous recommendations to agencies to address such deficiencies, but many of these recommendations remain unimplemented.

Number of 16 Selected Agencies with Deficiencies in the Eight Elements of an Information Security Program, as Required by the Federal Information Security Modernization Act of 2014

U:\Work in Process\Teams\FY19 Reports\ITC\103151_545\Graphics\jpgs-tifs\highlights 01-5_v1-ITC-103151-num of agencies_cgb-01.tif

With certain exceptions, the Office of Management and Budget (OMB), Department of Homeland Security (DHS), and National Institute of Standards and Technology (NIST) were generally implementing their government-wide FISMA requirements, including issuing guidance and implementing programs that are intended to improve agencies' information security. However, OMB has not submitted its required FISMA report to Congress for fiscal year 2018 and has reduced the number of agencies at which it holds CyberStat meetings from 24 in fiscal year 2016 to three in fiscal year 2018—thereby restricting key activities for overseeing agencies' implementation of information security. Also, OMB, in collaboration with the Council of Inspectors General for Integrity and Efficiency (CIGIE), did not include a metric for system security plans, one of the required information security program elements, in its guidance on FISMA reporting. As a result, oversight of agencies' information security programs was diminished.

Why GAO Did This Study

For 22 years, GAO has designated information security as a government-wide high-risk area. FISMA requires federal agencies to develop, document, and implement information security programs and have independent evaluations of those programs and practices. It also assigns government-wide responsibilities for information security to OMB, DHS, and NIST.

FISMA includes a provision for GAO to periodically report to Congress on agencies' implementation of the act. GAO's objectives in this report were to (1) describe the reported adequacy and effectiveness of selected federal agencies' information security policies and practices and (2) evaluate the extent to which OMB, DHS, and NIST have implemented their government-wide FISMA requirements. GAO categorized information security deficiencies as reported by 16 randomly selected agencies and their IGs according to the elements of an information security program; evaluated IG reports for 24 CFO Act agencies; examined OMB, DHS, and NIST documents; and interviewed agency officials.

Recommendations

GAO is making three recommendations to OMB to (1) submit its FISMA report to Congress for fiscal year 2018, (2) expand its coordination of CyberStat meetings with agencies, and (3) collaborate with CIGIE to update the inspector general FISMA reporting metrics to include assessing system security plans. OMB generally agreed with GAO's recommendations.

Recommendations for Executive Action

Agency Affected Recommendation Status
Office of Management and Budget The Director of OMB should submit the statutorily required report to Congress on the effectiveness of agencies' information security policies and practices during the preceding year. (Recommendation 1)
Closed – Implemented
After issuance of GAO-19-545 in July 2019, OMB provided us its statutorily required report on the effectiveness of agencies' information security policies and practices for fiscal year 2018.
Office of Management and Budget
Priority Rec.
The Director of OMB should expand its coordination of CyberStat review meetings for those agencies with a demonstrated need for assistance in implementing information security. (Recommendation 2)
Closed – Implemented
We verified that OMB expanded its coordination with agencies by holding 11 CyberStat engagement meetings on various topics in 2021. In addition, OMB worked with DHS to update the CyberStat CONOPS, which details the objectives and processes of the CyberStat program.
Office of Management and Budget The Director of OMB should collaborate with CIGIE to ensure that the inspector general reporting metrics include the FISMA-required information security program element for system security plans. (Recommendation 3)
Closed – Implemented
We verified that the inspector general reporting metrics have been updated to include the FISMA-required information security program element for system security plans.

Full Report

GAO Contacts

Gregory C. Wilshusen
Director
Information Technology and Cybersecurity

Media Inquiries

Sarah Kaczmarek
Managing Director
Office of Public Affairs

Topics

Chief financial officersContinuous monitoringCybersecurityInformation securityInformation systemsInspectors generalPolicies and proceduresRisk managementSecurity incidentsFederal agencies