IG: Cyber concerns persist at OPM
- By Ben Berliner
Nearly two-and-a-half years since OPM suffered a data breach that exposed the records of over 20 million federal employees and contractors, the agency still has a long way to go when it comes to managing security and meeting key requirements, according to an inspector general report.
The overall cybersecurity posture at OPM has improved, according to the annual FISMA report, but the information security teams continue to struggle with training, hiring and management structure. And despite pockets of improvements, OPM continues to add to its pile unfulfilled recommendations.
The report also fired back at complaints from agency personnel that the intense oversight are creating "audit fatigue" among agency staff, making it difficult to enact improvements.
"Although we agree that audits can be a strain on resources, we believe that the primary cause of OPM’s 'audit fatigue' is the OCIO staff's inability to maintain complete, detailed, and organized documentation," the report states.
The report notes that IG staff "wasted over 600 hours auditing useless and irrelevant information," because of OPM staff's inability to supply needed documentation upon request.
"This audit is essentially an 'open book test,' but, inexplicably, OPM continues to struggle in providing timely documentation and appears to be generally unprepared to respond to routine audit requests," the report states.
Last year's audit dinged OPM for missing requirements it had fulfilled in prior years. This year’s audit hit OPM over its failure to implement contingency planning, risk management and configuration management requirements.
The report includes 39 recommendations, most of which OPM concurred with. According to agency replies, some of the key recommendations will be knocked out via the Continuous Diagnostics and Mitigation program, created to help agencies strengthen their networks and systems. OPM will use CDM to implement recommendations related to endpoint management, software inventory and to analyze OPM’s identity, credential and access management strategy.