IT security plans getting personal

 

Connecting state and local government leaders

The recent spike in reported data breaches prompted the Office of Management and Budget in June to require that agencies enforce existing data security provisions and put new ones in place.

Agencies haven't been ignoring security in recent years, but while they focused on protecting the highest-risk areas, many left personal data in peril.Federal officials said agencies did not pay enough attention to such important controls as encrypting data on mobile devices and logging all computer-readable data extracts from databases holding personal information.And this lack of control over personnel data was a major contributor to the rash of data losses and breaches over the last three months, federal experts said.'There are so many things to be done. We've been attacking chunks of them. We have our hands full,' said Vance Hitch, Justice Department CIO and chairman of the federal CIO Council's executive committee on cybersecurity and privacy.The recent spike in reported data breaches prompted the Office of Management and Budget in June to require that agencies enforce existing data security provisions and put new ones in place. The deadline was last week.OMB guidance acts as an accelerant for agencies to get their data security in place, said newly minted Education CIO Bill Vajda.The breaches also spotlight one aspect of the IT security universe and how vulnerable agencies can be with remote access and personally identifiable information, Hitch said'For comparison purposes, maybe we've addressed what we considered the high-risk items. Now this will make us focus more on those two things as higher risk than what we thought before,' he said.Agencies must install controls and other IT security safeguards under the Federal Information Security Management Act and guidelines recommended by the National Institute of Standards and Technology, including Federal Information Processing Standard 200 and Special Publication 853, he said.OMB added safeguards in the June memo: Agencies must encrypt data on mobile devices, use two-factor authentication for remote access, require re-authentication after 30 minutes of inactivity and log all computer-readable data extracts from databases holding personal information. OMB gave agencies until Aug. 7 to have these controls in place.Agencies are expected to review their information systems and ensure that they are properly protecting sensitive data, an OMB spokeswoman said.'We continue to work with inspectors general and chief information officers to ensure agencies are compliant with existing administration policies and IT standards, and that all improvements necessary to secure sensitive information are made,' the OMB spokeswoman said about the deadline.Department inspectors general will analyze how well their agencies comply with the guidelines and report to OMB in September, Hitch said.'I think it will become clearer what the federal government needs to do,' he saidFor agencies, the data breaches triggered renewed efforts to implement data security controls and highlighted their importance, said Dennis Heretick, Justice chief information security officer.Education was conducting its annual IT security refresher course for employees when the reported incidents took place, Vajda saidThe breaches let people know how serious security is, said Education chief information security officer Jerry Davis.'It reinforced all the conversations, training and me standing on a soapbox in front of our senior officers all the way down to our most junior career staff. ... IT security is a shared responsibility,' Davis said.Education also introduced new training modules specifically on privacy to re-emphasize the importance of protecting personal information, he added.With the urgency to comply with OMB's data security requirements, Education accelerated some milestones for previously planned IT security investments, Vajda said.'The incidents gave us a little more leverage in our investment review process, where we could move up milestones, get broader support from some people. ... It gave us more momentum to do it in a timely way,' Vajda said.For example, OMB's requirement for two-factor authentication for data protection during remote access was already part of Education's investment strategy for complying by October with Homeland Security Presidential Directive-12. So Education accelerated that milestone.The department also is speeding up a milestone for encrypting data archived on backup tapes already stored in secure repositories, Davis said. So if that media is lost, the data is not compromised.Some of OMB's data security requirements are in place, such as double-checking gap analyses on 30-minute time-out sessions for remote access to department systems. Others will take longer, despite the urgency in the OMB memos, Vajda said.'Most of my colleagues would echo: We want to make sure we solve the problem and do it right,' he said.At Justice and many other agencies, IT security policies and procedures are already in place, Hitch said. But agencies need to clarify specific areas of the policy at a level of detail everybody understands.'It's not a change in direction in policy. ... It's getting people enough specifics so that they better understand how to implement it,' Hitch said, adding that it will include more training.Technology, such as for logging all computer-readable data extracts, may assist agencies, Hitch said.'But technology is not a silver bullet that you can implement tomorrow,' he said.It involves the entire IT architecture, all agency databases and all the data, Hitch said.'Even if the technology is promising and we want to go ahead with it, it could take years, and you'd have to implement it selectively on a risk-based approach,' he said.Compliance with the newer OMB data security policies on mobile devices is a matter of stricter enforcement and identifying weaknesses, Heretick said.The CIO Council helps agencies with the establishment of IT security through opportunities for cross-department sharing of best practices in seminars and other CIO gatherings, Hitch said. The emerging IT security Line of Business will break down IT security into specialty areas, creating shared-services centers.'Agencies [whose programs] are designated as a Line of Business for that sliver of IT security would serve as a resource to other federal agencies,' Hitch said.The Government Accountability Office also will evaluate how agencies comply with IT security.'We have received and accepted congressional requests to look at federal policies and practices for protecting personal information,' said Gregory Wilshusen, director of GAO's information security issues.GAO, however, has not started this work and does not yet have an expected completion date. n

Maybe we've addressed what we considered the high-risk items. Now this will make us focus on' remote access and personally identifiable information.

'Vance Hitch










































































NEXT STORY: Fighting spyware with 'spyware'

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.