U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

Evaluation of Compliance with the Requirements of the Federal Information Security Management Act: Fiscal Year 2009

Report Information

Date Issued
Report Number
I-PA-EAC-02-09
Report Type
Audit
Subject
IT
Description

EAC OIG, through the independent public accounting firm of Leon Snead & Co., conducted an evaluation of EAC's compliance with the requirements of the Federal Information Security Management Act for fiscal year 2009.

Questioned Costs
$0
Funds for Better Use
$0

Status of Recommendations

Closed

Establish an overall comprehensive plan of action and milestone (POA&M) document, with target dates for completion of corrective actions, to address the problems noted in this report. Assure that the plan is monitored on a monthly basis and updates...

Closed

Provide sufficient specialized training to EAC personnel to enable EAC to develop and maintain a risk-based IT security program that meets FISMA requirements, or hire an official that has experience managing an agency-wide IT security program.

Closed

Establish a continuous monitoring program to address the NIST 800-53 requirements.

Closed

Finalize the EAC IT security handbook, and establish a process to identify and document necessary operational processes to enable personnel to meet the control requirements contained in the handbook, and applicable NIST control requirements.

Closed

Assign a high priority to the completion of required contingency plans and coop documents.

Closed

Implement the minimum password settings for the network. Ensure that other FDCC mandatory configuration settings are established as soon as possible.

Closed

Implement access controls required by FISMA, including controls over all remote access methods, and OMB guidance on securing PII data.

Closed

Finalize the risk assessment, and ensure it is used to develop risk-based controls, and as a starting point for development of contingency plans and COOP documents.

Closed

Establish controls over the audit logs maintained to ensure that the system is capable of providing required alerts. Ensure that periodic reviews are made of the logs to identify any unusual activity, other concerns or problems.

Closed

Ensure that access controls are implemented for all EAC network devices.