This is the accessible text file for GAO report number GAO-05-362 
entitled 'Information Security: Improving Oversight of Access to 
Federal Systems and Data by Contractors Can Reduce Risk' which was 
released on May 23, 2005. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to Congressional Requesters: 

April 2005: 

Information Security: 

Improving Oversight of Access to Federal Systems and Data by 
Contractors Can Reduce Risk: 

[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-05-362]: 

GAO Highlights: 

Highlights of GAO-05-362, a report to congressional requesters: 

Why GAO Did This Study: 

The federal government relies extensively on information technology 
services and systems provided by contractors. The Federal Information 
Security Management Act of 2002 (FISMA) requires agencies to establish 
information security programs that extend to contractors and other 
users of federal data and systems, such as grantees, state and local 
governments, and research and educational institutions. 

GAO was asked to (1) describe the information security risks associated 
with contractors and users with privileged access to federal data and 
systems; (2) identify methods federal agencies use to ensure security 
of information and systems provided or used by contractors and other 
users with privileged access to federal data; and (3) determine what 
steps the administration is taking to ensure implementation and 
oversight of security of federal information and systems provided or 
used by contractors and other users with privileged access. 

What GAO Found: 

Contractors and users with privileged access to federal data and 
systems provide valuable services that contribute to the efficient 
functioning of the government, but they present a range of related 
risks that must be managed effectively. Most agencies recognize risks 
to the confidentiality, integrity, and availability of their 
information and systems associated with the use of contractors and 
other users with privileged access to federal data and systems. In 
addition, agencies reported specific risks when contractors develop 
software or perform work at off-site facilities. 

Agencies use contracts, policies, and self-assessments as methods to 
ensure information security oversight of contractors; however, each 
method has limitations and needs further strengthening. For example, 
most agencies have not incorporated FISMA requirements, such as annual 
testing of controls, into their contract language. Additionally, most 
of the 24 major agencies reported having policies for contractors and 
users with privileged access to federal data and systems; however, 
GAO’s analysis of submitted agency policies found that only 5 agencies 
had established specific information security oversight policies (see 
figure). Finally, while the majority of agencies reported using a 
National Institute of Standards and Technology self-assessment tool to 
review contractor security capabilities, only 10 agencies reported 
using the tool to assess users with privileged access to federal data 
and systems, which may expose federal data to increased risk. 

The administration continues in its efforts to improve information 
security oversight of contractors, but challenges remain. For example, 
efforts to update the Federal Acquisition Regulation to address 
information security have been under way since 2002, but are not 
complete. OMB continues to gather data about the number of agency 
systems, including those that are operated by contractors and how many 
have been reviewed. However, the submitted data showed that several 
agencies disagreed internally on the number of contractor or agency 
systems. Finally, federal agencies could benefit from unified guidance 
for overseeing information security of contractors and privileged users 
of federal data and systems. 

Major Agencies with Security Policies for Contractors, Privileged Users 
of Federal Data and Systems, and Contractor Security Oversight: 

[See PDF for image]

[End of figure]

What GAO Recommends: 

GAO recommends that the Office of Management and Budget (OMB) ensure 
that the Federal Acquisition Regulation aligns with FISMA and that 
agencies develop contractor oversight policies We also recommend that 
the Commerce develop unified guidance. OMB and Commerce generally 
agreed with the results of this report. 

www.gao.gov/cgi-bin/getrpt?GAO-05-362. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Gregory C. Wilshusen 
(202) 512-3317 or wilshuseng@gao.gov. 

[End of section]

Contents: 

Letter: 

Results in Brief: 

Background: 

Federal Agencies Face a Range of Risks from Contractors and Other Users 
of Federal Data and Systems: 

Agencies Use Various Methods for Overseeing Contractor Security: 

Administration Efforts to Improve Information Security of Contractors 
Continue, but Challenges Remain: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments on Our Evaluation: 

Appendixes: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: Comments from the Department of Commerce: 

Appendix III: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

Staff Acknowledgments: 

Tables: 

Table 1: Examples of Agency-Identified Risks to Federal Systems and 
Data Resulting from Reliance on Contractors: 

Table 2: The FAR Privacy or Security Safeguards Contract Language: 

Table 3: Number of Contractor Facilities and Operations Reported in 
Fiscal Year 2004: 

Figures: 

Figure 1: Federal Sources for Addressing Information Security Oversight 
of Contractor-Delivered IT Systems and Services: 

Figure 2: Major Agencies with Security Policies for Contractors, 
Privileged Users of Federal Data and Systems, and Contractor Security 
Oversight: 

Figure 3: Total Contractor Facilities and Number of Facilities Reviewed 
for 23 Federal Agencies in Fiscal Years 2002-2004: 

Abbreviations: 

CFO: chief financial officer: 

DOD: Department of Defense: 

FAR: Federal Acquisition Regulation: 

FISMA: Federal Information Security Management Act of 2002: 

GSA: General Services Administration: 

IT: information technology: 

NIST: National Institute of Standards and Technology: 

OMB: Office of Management and Budget: 

Letter April 22, 2005: 

The Honorable Tom Davis: 
Chairman, Committee on Government Reform: 
House of Representatives: 

The Honorable Adam Putnam: 
House of Representatives: 

The federal government increasingly relies on information technology 
(IT) systems to provide essential services affecting the health, 
economy, and defense of the nation. To assist in providing these 
important services, the federal government relies extensively on 
contractors to provide IT services and systems. In addition to 
contractors that provide systems and services to the federal 
government, other organizations possess or use federal information or 
have access to federal information systems. These other organizations 
with privileged access to federal data and systems can include 
grantees, state and local governments, and research and educational 
institutions. 

The Office of Management and Budget (OMB) cited contractor security as 
a governmentwide challenge in a 2001 information security report to 
Congress. Recognizing the need for agencies to have effective 
information security programs, Congress passed the Federal Information 
Security Management Act of 2002 (FISMA), which provides the overall 
framework for ensuring the effectiveness of information security 
controls that support federal operations and assets. FISMA requirements 
apply to all federal contractors and organizations or sources that 
possess or use federal information or that operate, use, or have access 
to federal information systems on behalf of an agency. 

Our objectives were to (1) describe the information security risks 
associated with the federal government's reliance on contractor- 
provided IT systems and services and other users with privileged access 
to federal data and systems; (2) identify methods used by federal 
agencies to ensure security of information and information systems that 
are operated, used, or accessed by contractors and other users with 
privileged access to federal data; and (3) discuss steps the 
administration is taking to ensure implementation and oversight of 
security of information and information systems that are operated, 
used, or accessed by contractors and other users with privileged access 
to federal data and systems. 

To accomplish our review, we surveyed the 24 Chief Financial Officers 
Act (CFO) agencies[Footnote 1] regarding their policies and procedures 
for overseeing contractor security. We analyzed documentation submitted 
by the federal agencies and interviewed relevant officials in OMB, the 
General Services Administration (GSA), the Federal Acquisition 
Regulation Council, the National Institute of Standards and Technology 
(NIST), and private sector officials in the banking and finance 
industries. We conducted our work between August 2004 and March 2005 in 
accordance with generally accepted government auditing standards. 
Details of our objectives, scope, and methodology are included in 
appendix I. 

Results in Brief: 

Contractors and users with privileged access to federal data and 
systems provide valuable services that contribute to the efficient 
functioning of the government, but a range of risks (including 
operational, strategic, and legal) must be managed effectively. Most 
agencies recognize risks to the confidentiality, integrity, and 
availability of their information and systems associated with the use 
of contractors and other users with privileged access to federal data 
and systems. For example, malicious code can be inserted into agency 
software and systems. In addition, agencies also reported specific 
risks when contractors develop software or perform work at off-site 
facilities. Federal agencies reported additional risks to their 
operations posed by other users with privileged access to federal data 
and systems, such as lack of controlled network connections, poor 
access controls, and the introduction of viruses and worms.[Footnote 2]

Agencies use contracts, policies, and self-assessments for ensuring 
information security oversight of contractors; however, each of these 
methods has limitations and needs further strengthening. Most agencies 
reported using contract language to establish information security 
requirements for contractors. However, agency-provided contract 
language generally did not address key elements of FISMA, such as 
annual testing of controls. In addition, the majority of agencies 
reported having information security policies for contractors and 
almost two-thirds of the agencies reported having such policies for 
other users with privileged access to federal data. Yet our analysis of 
agency-provided policies found that only 5 agencies had established 
policies that specifically addressed information security oversight of 
contractor-provided systems. Finally, the majority of agencies reported 
using the NIST self-assessment tool to assess contractor security 
capabilities. However, only 10 reported using the tool to assess the 
security implemented by other users with privileged access to federal 
data. 

The administration continues in its efforts to improve information 
security oversight of contractors, but challenges remain. For example, 
efforts to update the Federal Acquisition Regulation (FAR) to include 
the information security requirements of FISMA (which would be 
reflected in all relevant government contracts) have been under way 
since 2002, but are not yet complete. OMB continues to gather data 
about the number of agency systems, including those that are operated 
by contractors, and how many have been reviewed using a self-assessment 
tool. However, the data submitted showed that several agencies' chief 
information officers and inspectors general disagreed on the number of 
contractor or agency systems by as many as 100 systems or more. In 
addition, the data collected by OMB does not address other users with 
privileged access to federal data or the quality of the self 
assessments. Finally, NIST has developed guidance, parts of which are 
relevant to contractor security oversight. However, unified 
governmentwide guidance for overseeing information security of 
contractors and other users with privileged access to federal data and 
systems has not been issued. 

We are making recommendations to the Director of OMB to ensure that (1) 
the FAR update efforts complement agency security management efforts 
required by FISMA; (2) federal agencies develop policies for 
information security oversight of contractors and other users with 
privileged access to federal data; and (3) agencies review the security 
of other users with privileged access to federal data and systems. 
Additionally, we are making recommendations to the Secretary of 
Commerce to develop a unified set of guidance to assist agencies in 
developing appropriate information security policies for managing risks 
related to contractors and other users with privileged access to 
federal data and systems. 

In commenting on a draft of this report, OMB officials provided oral 
comments that generally agreed with the results of this report. 
Additionally, the Deputy Secretary of Commerce provided written 
comments that agreed with our findings and stated that the department 
is planning to develop a consolidated framework for contractor-related 
guidelines. 

Background: 

The U.S. government is one of the largest users and acquirers of data, 
information, and supporting technology systems in the world, and plans 
to invest approximately $65 billion annually on IT. These investments 
include the acquisition of IT services and systems from thousands of 
contractors.[Footnote 3] The ability to contract for technology 
services can allow an agency to obtain or offer enhanced services 
without the cost of owning the required technology or maintaining the 
human capital required to deploy and operate it. The systems and 
services provided by contractors include computer and telecommunication 
systems and services, as well as the testing, quality control, 
installation, and operation of computer equipment. Additionally, 
contractors provide services and systems to agencies by: 

* providing IT services and systems at agency facilities;

* providing IT services and systems on behalf of the agency at 
contractor facilities;

* providing IT services and systems to an agency via remote access; 
and: 

* developing or maintaining IT systems or software. 

In its fiscal year 2001 report to Congress on federal government 
information security reform, OMB identified poor security oversight of 
contractor-provided IT systems and services as a common governmentwide 
challenge. In that report, OMB stated that IT contracts should include 
adequate security requirements, but that many agencies had reported no 
security controls in contracts or no verification that contractors 
fulfill any requirements that are in place. 

Federal Law and Policy Address Planning and Oversight for Information 
Security: 

Information security is an essential component of the acquisition, 
development, management, and oversight of IT systems and services 
delivered by contractors. When relying on contractors, a federal agency 
transfers operational responsibilities for performing one or more IT 
service(s) to one or more external providers. However, the overall 
responsibility and accountability for securing the information and 
systems remains with the federal agency (see fig. 1). 

Figure 1: Federal Sources for Addressing Information Security Oversight 
of Contractor-Delivered IT Systems and Services: 

[See PDF for image] 

[End of figure] 

As depicted in figure 1, federal sources for addressing information 
security oversight of contractor-delivered IT systems and services are 
as follows: 

* FAR: emphasizes basic planning for the acquisition process;[Footnote 
4]

* FISMA: requires an agencywide information security program that 
extends to contractors and other users with privileged access to 
federal data and systems;[Footnote 5] and: 

* NIST standards and guidance and OMB guidance: assist agencies in 
establishing necessary security programs. 

The FAR Emphasizes Planning and Includes Certain Information Security 
Requirements: 

The FAR emphasizes planning and includes certain specific information 
security requirements and provides the primary regulation for federal 
executive agencies in their acquisition of IT supplies and services 
with appropriated funds. 

Additionally, in implementing federal privacy requirements, agencies 
are to ensure that contracts for the design, development, or operation 
of records systems using commercial IT services or support services 
include the following: 

* agency rules of conduct that the contractor and the contractor's 
employees shall be required to follow;

* a list of the anticipated threats and hazards that the contractor 
must guard against;

* a description of the safeguards that the contractor must specifically 
provide; and: 

* requirements for a program of government inspection during 
performance of the contract that will ensure the continued efficacy and 
efficiency of safeguards and the discovery and countering of new 
threats and hazards. 

The FAR requires agencies to ensure that IT contracts address privacy 
protections in accordance with the Privacy Act.[Footnote 6]

FISMA Implementation Extends to Federal Contractors and Others: 

FISMA requires each agency to develop, document, and implement an 
agencywide information security program to protect information and 
information systems, including those provided or managed by another 
agency, contractor, or accessed by other users with privileged access 
to federal data. Specifically, this information security program is to 
include the following: 

* periodic assessments of the risk and magnitude of harm that could 
result from the unauthorized access, use, disclosure, disruption, 
modification, or destruction of information or information systems;

* risk-based policies and procedures that cost-effectively reduce 
information security risks to an acceptable level and ensure that 
information security is addressed throughout the life cycle of each 
information system;

* subordinate plans for providing adequate information security for 
networks, facilities, and systems or groups of information systems;

* security awareness training for agency personnel, including 
contractors and other users of information systems that support the 
operations and assets of the agency;

* periodic testing and evaluation of the effectiveness of information 
security policies, procedures, and practices, performed with a 
frequency depending on risk, but no less than annually, and that 
includes testing of management, operational, and technical controls for 
every system identified in the agency's required inventory of major 
information systems;

* a process for planning, implementing, evaluating, and documenting 
remedial action to address any deficiencies in the information security 
policies, procedures, and practices of the agency;

* procedures for detecting, reporting, and responding to security 
incidents; and: 

* plans and procedures to ensure continuity of operations for 
information systems that support the operations and assets of the 
agency. 

Federal agencies' implementation of FISMA requirements extends to 
contractors that are delivering IT systems and services and to other 
users of federal data and systems.[Footnote 7] In addition to these 
requirements, FISMA requires each agency to develop, maintain, and 
annually update an inventory of major information systems operated by 
the agency or that are under its control. This inventory is to include 
an identification of the interfaces between each system and all other 
systems or networks, including those operated by or under the control 
of contractors or other users with privileged access to federal data. 

FISMA also requires each agency to have an annual independent 
evaluation of its information security program and practices, including 
control testing and compliance assessment. Evaluations of nonnational 
security systems are to be performed by the agency inspector general or 
by an independent external auditor. Furthermore, for nonnational 
security systems, FISMA requires NIST to develop (1) standards to be 
used by all agencies to categorize all of their information and 
information systems based on the objectives of providing appropriate 
levels of information security according to a range of risk levels; (2) 
guidelines recommending the types of information and information 
systems to be included in each category; and (3) minimum information 
security requirements for information and information systems in each 
category. 

NIST Standards and Guidance and OMB Guidance Support FISMA 
Implementation: 

NIST standards and guidance and OMB guidance both support agency 
efforts to implement FISMA. NIST has issued a number of information 
security standards and guidance that is intended to promote the 
security of federal IT systems and services, such as its guidance on 
conducting risk assessments and on the format and content of security 
plans.[Footnote 8] In addition, as part of its statutory 
responsibilities under FISMA, NIST has issued standards and guidance 
that include consideration of security oversight of contractor-provided 
IT systems and services and other users with privileged access to 
federal data and systems. 

In its fiscal year 2004 FISMA reporting guidance,[Footnote 9] OMB 
required federal agencies to use NIST SP 800-26 or an equivalent 
assessment tool for agency annual information security 
reviews.[Footnote 10] The self assessments were also to be used to 
evaluate the security of contractor-provided IT systems and services. 
The self assessments provide a method for agency officials to determine 
the current status of their information security programs and, where 
necessary, to establish a target for improvement. 

Federal Agencies Face a Range of Risks from Contractors and Other Users 
of Federal Data and Systems: 

Federal agencies face a range of risks from contractors and other users 
with privileged access to federal data and systems. Contractors that 
provide systems and services or other users with privileged access to 
federal data and systems can introduce risks to agency information and 
systems. Most agencies recognize the contractor-related risks, 
including those associated with contractor software development and off-
site operations. Further, agencies view users with privileged access to 
federal systems and data as potential sources of risk. 

Contractors and Other Users of Federal Data and Systems Introduce Risks 
to Agencies: 

Contractors and other users with privileged access to federal data and 
systems can introduce information security risks to federal information 
and information systems that are sometimes difficult to quantify. 
Examples of these risks are as follows. 

Strategic. Two basic strategic risks include management inexperience in 
overseeing contractor/other organization operations and the potential 
for inaccurate contractor/other organization information to negatively 
impact agency decisions. For example, inadequate management experience 
and expertise can impede an agency's ability to understand and control 
key risks. Additionally, inaccurate information from a contractor/other 
organization may prevent the leadership of an organization from having 
the necessary data to make well-informed strategic decisions. 

Reputation. Errors, delays, system failures, or unauthorized disclosure 
of information may negatively impact how citizens, state and local 
governments, and other federal agencies view an agency and its services 
or mission. 

Legal/Compliance. Federal agencies are required to ensure that their 
information security programs are being applied to systems and services 
that are being provided by contractors/other organizations and ensure 
compliance with laws such as privacy protections. 

Implementation. Initiating a contractor relationship may require a 
complex transition of people, processes, hardware, software, and other 
assets from the agency to the provider or from one provider to another, 
all of which may introduce new risks. 

Ownership/Dependence. An agency may ignore certain security issues due 
to "out of sight, out of mind" thinking, having delegated this concern 
to the provider. An agency may also become dependent on a particular 
contractor. 

Operational. In addition to fraud or error, contractor or privileged 
access information security weaknesses could negatively impact agency 
operations, including delivering products; managing information; 
maintaining operations and transaction processing; customer service; 
systems development and support; and internal control processes. 

Shared Environment. Contractors may use one system to service multiple 
clients and, as a result, this system-sharing may pose more risks than 
an in-house environment. For example, sharing a common network or a 
processing environment, such as a general purpose server, across 
multiple clients can increase the likelihood of one organization having 
access to the sensitive information of another. 

The risks identified can present complex challenges to federal 
agencies. Many of the complexities stem from risks related to people, 
processes, or technologies that, if not properly overseen or managed, 
can potentially harm an agency's operations, information, or systems. 

Most Agencies Recognize Contractor-Related Risks to Information: 

Most agencies (17 of 24) reported that they recognize contractor risks 
to their information and information systems. These people, process, 
and technology risks can degrade or diminish the confidentiality, 
integrity, and availability of agency information systems or data. 
Examples of agency-identified risks are summarized in table 1. 

Table 1: Examples of Agency-Identified Risks to Federal Systems and 
Data Resulting from Reliance on Contractors: 

Category: People; 
Risk description: Unauthorized personnel having physical access to 
agency IT resources (including systems, facilities, and data). 

Category: People; 
Risk description: Unauthorized personnel having electronic access to 
agency IT resources (including systems and data). 

Category: People; 
Risk description: Increased use of foreign nationals. 

Category: People; 
Risk description: Contractor or privileged users of federal data and 
systems who may not receive appropriate, periodic background 
investigations. 

Category: People; 
Risk description: Inadequate segregation of duties (e.g., software 
developer is the same individual who puts the software into 
production). 

Category: Processes; 
Risk description: Failure by contractor or privileged users of federal 
data and systems to follow agency IT security requirements. 

Category: Processes; 
Risk description: Possible disclosure of agency-sensitive information 
to unauthorized individuals or entities. 

Category: Processes; 
Risk description: Lack of effective compliance monitoring of 
contractors performing work off-site or privileged users of federal 
data and systems. 

Category: Processes; 
Risk description: Contractor or privileged users of federal data and 
systems may have ineffective patch management processes. 

Category: Technology; 
Risk description: Incorporation of unauthorized features in customized 
application software. For example, a third-party software developer has 
the potential to incorporate "back doors," spyware, or malicious code 
into customized application software that could expose agency IT 
resources to unauthorized loss, damage, modification, or disclosure of 
data. 

Category: Technology; 
Risk description: Encryption technology may not meet federal standards. 

Category: Technology; 
Risk description: Intentional or unintentional introduction of viruses 
and worms. 

Source: GAO analysis of federal agencies' survey response data. 

Note: The various risks identified in table 1 could represent multiple 
risks (i.e. risks in one or more of the identified categories of 
people, processes and technology). 

[End of table]

In addition to the risks identified in the table, agencies identified 
specific risks from contractor software development activities and off- 
site operations. These risks include the following: 

* a poor patch management process could impact federal operations, such 
as agency Web sites;

* the hosting infrastructure may not separate customer and company 
data; and: 

* the need for oversight at an off-site facility. 

Without proper controls, the risks associated with software development 
and work performed off site could be very damaging to federal 
information and systems. For example, loss of confidentiality, 
integrity, or availability of data can disrupt federal operations and 
services and may impede the ability to ensure the performance of 
mission-critical functions. 

Agencies Assess Users with Privileged Access to Federal Data and 
Systems as Potential Risks: 

Many agencies reported their risks from other users with privileged 
access to federal data and systems. Seventeen agencies indicated that 
they assess the risks posed by other users with privileged access to 
federal data and systems. Agency-identified risks included: 

* lack of controls on network connections;

* unauthorized use or release of information, such as grantee 
information being revealed to another grantee;

* malicious activity that introduces viruses and worms; and: 

* poor electronic access controls that could permit customer passwords 
to be compromised and exploited by identity theft. 

Of the remaining 7 agencies, 5 indicated that other users do not 
possess or use their data and systems; 1 indicated that it had not 
assessed risks of other users with privileged access; and the other 
agency did not respond regarding whether they had assessed risks of 
other users with privileged access to federal data and systems. 

Agencies Use Various Methods for Overseeing Contractor Security: 

Federal agencies report using three primary methods for overseeing the 
information security of contractors: 

* using contract language to establish information security 
requirements for contractors;

* having information security policies for contractors and other users 
with privileged access to federal data; and: 

* using NIST self-assessment tools to assess contractor security 
capabilities and assess the security implemented by other users with 
privileged access to federal data. 

These methods can be leveraged for effective agency oversight of 
contractors and privileged users for federal systems and data. However 
when not properly implemented, each of these methods has limitations. 

Agencies Use Contract Language to Establish Information Security 
Requirements: 

Most agencies report using contract language to establish information 
security requirements for contractors. The FAR requires that agencies 
use specific contract language related to privacy or security 
safeguards. Table 2 contains an example of FAR-provided language for 
agencies to include in their IT contracts. 

Table 2: The FAR Privacy or Security Safeguards Contract Language: 

(a) The Contractor shall not publish or disclose in any manner, without 
the Contracting Officer's written consent, the details of any 
safeguards either designed or developed by the Contractor under this 
contract or otherwise provided by the Government. 

(b) To the extent required to carry out a program of inspection to 
safeguard against threats and hazards to the security, integrity, and 
confidentiality of Government data, the Contractor shall afford the 
Government access to the Contractor's facilities, installations, 
technical capabilities, operations, documentation, records, and 
databases. 

(c) If new or unanticipated threats or hazards are discovered by either 
the Government or the Contractor, or if existing safeguards have ceased 
to function, the discoverer shall immediately bring the situation to 
the attention of the other party. 

Source: Federal Acquisition Regulation 52.239-1. 

[End of table]

This FAR language helps ensure that federal agencies can maintain 
access to contractor facilities in order to perform security oversight 
functions. However, this language does not address all aspects of 
security. For example, the clause in table 2 does not apply to 
subcontractors. By not including subcontractors within specific 
information security requirements, agencies can be introducing 
significant risks without a contractual tool with which to manage them. 

More importantly, the FAR has not been amended to reflect the 
requirements of the FISMA. As a result, the language in the FAR does 
not reflect key FISMA requirements, including: 

* periodic testing and evaluation of the effectiveness of information 
security policies, procedures, and practices performed with a frequency 
depending on risk, but not less than annually, and including testing of 
management, operational, and technical controls for every system 
identified in the agency's required inventory of major information 
systems;

* a process for planning, implementing, evaluating, and documenting 
remedial action to address any deficiencies in the information security 
policies, procedures, and practices of the agency;

* procedures for detecting, reporting, and responding to security 
incidents; and: 

* plans and procedures to ensure continuity of operations for 
information systems that support the operations and assets of the 
agency. 

The FAR provides, however, that this contract language only needs to be 
"substantially the same" as standard FAR clauses and agencies, 
therefore, have the flexibility to modify it to address FISMA 
requirements. Additionally, agencies are authorized to include in their 
agency FAR supplements, regulations, and clauses that supplement FAR 
policies and procedures or satisfy specific needs of the 
agency.[Footnote 11] Agency FAR supplements, accordingly, could include 
additional language to address the requirements of FISMA. 

However, although some agency FAR supplements include requirements 
related to IT security that are not in the FAR, no agency has made a 
comprehensive effort to revise its FAR supplement to reflect FISMA. 

The 2003 NIST SP 800-35[Footnote 12] stresses the importance of 
establishing security requirements with external parties in formal 
contracts. However, by not establishing clear security requirements in 
contracts, agencies may not be able to ensure that their agency 
information is secured in accordance with FISMA. 

Most Agencies Have Information Security Policies for Contractors, but 
Few Policies Provide for Oversight Capabilities: 

Although most agencies reported having written policies that addressed 
information security for contractor-provided IT services and systems 
and for other users with privileged access to federal data and systems, 
few established specific policies for overseeing the information 
security practices of contractors to ensure compliance with contract 
requirements and agency information security policies. As figure 2 
illustrates, 22 of the surveyed agencies reported having information 
security policies for contractors, and 15 reported having policies for 
other users with privileged access to federal data and systems. 
However, the majority of agencies addressed contractors and other users 
with privileged access to federal information and systems within the 
general scope of their agency policy, and did not define information 
security oversight requirements. For example, agency policies did not 
describe oversight methods; the frequency of reviews or assessments; 
key management controls to mitigate unauthorized disclosure of 
information; physical/logical access controls; or the introduction of 
unauthorized features. Further, most of the agencies did not have 
policies or provide guidance on key areas, including control of agency 
data in an off-site facility or requirements for interconnection 
security agreements.[Footnote 13]

Figure 2: Major Agencies with Security Policies for Contractors, 
Privileged Users of Federal Data and Systems, and Contractor Security 
Oversight: 

[See PDF for image] 

[End of figure] 

However, we identified only 5 agencies that had established specific 
policies addressing contractor information security oversight. While 
the five agency policies reflected a broad range of maturity levels, 
they included many of the following elements: 

* establishing procedures for contractor information security oversight;

* assigning roles and responsibilities;

* creating specific audit plans for systems and facilities;

* describing interconnection security agreements;

* creating requirements for agency information that will be secured at 
contractor facilities--including storing, processing, and transmitting 
on contractor systems, background checks, and facility security; and: 

* requiring agency officials to conduct reviews to ensure that IT 
security requirements were being enforced. 

By establishing oversight policies that address these elements, 
agencies can more consistently oversee contractor security and ensure 
that contractors and other users with privileged access to federal 
systems and data comply with agency security requirements. However, 
without such policies, oversight efforts can be impeded. 

In fiscal years 2003 and 2004, many agency inspectors general cited the 
lack of agency policies and guidance regarding how agency program 
managers or organizational components should conduct oversight of 
contractor operations as problematic. Three different agency inspectors 
general reported the following: 

* Agency policies and procedures did not provide organizational 
components with guidance on conducting reviews of their contractor- 
provided services. Further, there was little evidence that components 
are ensuring that contractor-provided services are secure and comply 
with agency security policy. 

* Agency program officials had not ensured that (1) adequate security 
of contractor-provided services, including not identifying the full 
range of services provided and that (2) oversight processes and 
procedures for ensuring secure operations had not been defined or 
implemented. 

* Agency officials were not using adequate methods to ensure that 
contractor security met the requirements of FISMA, OMB, and NIST 
guidelines after reviewing the access controls, security clearances, 
and security awareness training for contractors that provide network 
administration, systems development, and systems administration. 

Without appropriate policies and guidance, agencies may not be able to 
effectively and efficiently assess the security of contractor 
operations or that of other users with privileged access to federal 
data and systems. For example, without specific oversight policies 
establishing when and how agencies will review contractor-operated 
systems, officials responsible for the systems may not be taking 
sufficient action to ensure that security requirements are being met. 
Further, information system controls needed to ensure secure operations 
may not be tested on regular intervals. As a result, agencies may not 
be able to protect federal information in accordance with FISMA. 

Agencies Use Self-Assessment Tool to Review Contractor Security, but 
Its Oversight Value May Be Limited: 

The majority of agencies reported using a self-assessment tool to 
review contractor information security, but the oversight value may be 
limited. NIST's self-assessment guide states that self-assessments 
provide a method for agency officials to determine the current status 
of their information security programs and, where necessary, to 
establish a target for improvement. NIST SP 800-26 structures the 
questionnaire by management, operational, and technical controls. The 
section on technical controls does not require testing of those 
controls as part of the self-assessment, but instead relies on 
documentation. In response to our survey, 22 agencies reported using 
NIST SP 800-26 to assess contractors providing IT services and systems 
and 2 agencies reported not using this assessment tool. 

While most agencies reported using NIST SP 800-26, the self-assessment 
tool may have limited value in overseeing contractor information 
security. For example, by relying on a contractor's self assessment, an 
agency official may not obtain a clear understanding of the 
effectiveness of security controls or be assured of the validity of the 
responses without independent testing. Further, the agency chief 
information officer or inspector general may have trouble conducting an 
analysis or review of the self assessment if there is not sufficient 
documentation. 

As an example of the self-assessment challenges, one agency inspector 
general found significant problems with the agency's self assessment. 
The inspector general noted that, after reviewing a sample of the 
agency's NIST SP 800-26 self assessments, (1) security weaknesses had 
not been properly defined, (2) variations existed between inspector 
general and agency scoring on the NIST SP 800-26 reviews, and (3) the 
agency did not verify the results of self assessments. 

Further, the lack of information security requirements established in 
contracts and the absence of agency oversight policies may diminish the 
efforts of reviewers using NIST SP 800-26 because they may not be able 
to refer to clear criteria with which to assess systems' security. As a 
result, agencies may not obtain an accurate status of the security of 
contractor-provided systems and services. 

Many Agencies Do Not Review Other Users with Privileged Access to 
Federal Data and Systems: 

In August 2004, OMB mandated the use of NIST SP 800-26 for agency 
annual system reviews. However, in response to our survey, only 10 
agencies reported using NIST SP 800-26 to assess other users with 
privileged access to federal data and systems that have connectivity to 
agency networks. By not assessing and testing the security controls of 
other users with privileged access to federal data, agencies reported 
that they are at increased risk of losing control of network 
connections, experiencing unauthorized use of information, such as 
grantee information being revealed to another grantee, and malicious 
activity that introduces viruses and worms. 

Administration Efforts to Improve Information Security of Contractors 
Continue, but Challenges Remain: 

The administration is making efforts to improve information security 
over contractors, but challenges remain. For example, the information 
security requirements in FAR are being revised and OMB continues to 
gather data from the agencies about the number of contractor facilities 
reviewed by agencies. Additionally, NIST has issued guidance, parts of 
which address some contractor security issues. 

Federal Acquisition Regulation Is Being Updated to Modernize IT 
Requirements: 

In response to the administration's plans to update FAR, officials at 
the FAR Council stated that the acquisition regulation was being 
updated to address information security requirements of contractor- 
provided systems and services. Officials further explained that the 
administration had been working on updating the FAR language since 2002 
when FISMA was enacted. According to the FAR Council officials, the 
council had completed the majority of its work in December 2004. As of 
March 2005, the FAR amendments were undergoing legal review. 

OMB Collects Data on Agency Information Security Oversight of 
Contractors, but Effectiveness of Agency Efforts Is Unclear: 

Through its FISMA reporting requirements, OMB continues to gather 
information about agency oversight of contractors, but understanding 
the effectiveness of agency efforts based on the collected data is 
unclear. On an annual basis, OMB collects information from the agencies 
about: 

* the total number of agency systems, including whether the chief 
information officer and the inspectors general agree on the number of 
systems identified and: 

* the number of contractor facilities and operations identified and 
reviewed using NIST SP 800-26 or an equivalent methodology. 

The fiscal year 2004 FISMA submissions revealed significant 
discrepancies in the responses from the agency and the inspector 
general. For example, as shown in table 3, the number of systems 
reported as being agency systems or contractor systems varied 
significantly among the chief information officers and the inspectors 
general at four agencies. Without a clear understanding of who has 
operational control of a system, agencies cannot ensure that the 
appropriate oversight and security controls are being implemented in 
accordance with agency policy. 

Table 3: Number of Contractor Facilities and Operations Reported in 
Fiscal Year 2004: 

Agency: Agency A; 
Agency/chief information officers total: 61; 
Inspectors general total: 13. 

Agency: Agency B; 
Agency/chief information officers total: 11; 
Inspectors general total: 65. 

Agency: Agency C; 
Agency/chief information officers total: 4; 
Inspectors general total: 111. 

Agency: Agency D; 
Agency/chief information officers total: 20; 
Inspectors general total: 5. 

Source: Fiscal year 2004 agency chief information officer and 
inspectors general FISMA submissions to OMB. 

[End of table]

Over the past 3 years, there has been a decline in both the number of 
contractor facilities identified by the agencies and the number of 
facilities reviewed by the agencies. Figure 3 depicts this trend in 23 
of the major agencies. 

Figure 3: Total Contractor Facilities and Number of Facilities Reviewed 
for 23 Federal Agencies in Fiscal Years 2002-2004: 

[See PDF for image] 

Note: The Department of Defense (DOD) contractor facilities and number 
of facilities reviewed are not reflected in the figure because this 
information was not available for 2002. However, in 2003, the DOD 
reported identifying 4,716 contractor facilities and reviewing 4,000 
facilities, while in 2004, the department inventoried 4,686 and 
reviewed 3,961 facilities. 

[End of figure] 

The disagreement between agency chief information officers and 
inspectors general about whether systems are deemed to be agency 
systems or contractor systems can impede effective and efficient 
information security oversight efforts. In some cases, it may even 
result in systems not being reviewed. By not performing reviews of 
contractor-operated facilities, agencies cannot ensure that their 
information is being protected in accordance with FISMA and, as a 
result, federal operations and data can be at risk. 

The data gathered from the agencies on the number of contractor systems 
identified and reviewed do not provide an accurate measure of the 
effectiveness of agency information security oversight of contractors. 
However, additional data about the contracts, policies, and self 
assessments could provide a better measure of effectiveness. For 
example, asking inspectors general to determine: 

* what portion of the contractor systems identified by the agencies 
have specific IT security language that addresses key FISMA elements;

* if the agency information security policies provide specific 
oversight policies for contractors and privileged users of federal 
systems and data; and: 

* whether the required NIST SP 800-26 assessments of contractor systems 
were completed by the agency, the contractor, or an independent entity. 

Finally, annual agency reports required by FISMA do not address 
security related to other users with privileged access to federal data. 
There is not a clear governmentwide understanding of how agencies are 
addressing the various challenges and identified risks related to other 
users with privileged access. As previously discussed, agencies have 
not developed policies or reviewed the controls necessary to ensure 
that these users of federal data do not place agencies' information and 
systems at risk of compromise. As a result, federal agencies that lack 
appropriate controls and oversight can be exposing their information 
and systems to additional risks from privileged users who might 
introduce malicious code, disclose unauthorized information, or lack 
controls to secure their network interfaces with the agency systems. 

Unified Federal Guidance Could Assist Agencies: 

No single federal guide exists for federal agencies to rely on when 
addressing information security over contractors. FISMA requirements 
apply to all federal contractors and organizations or sources that 
possess or use federal information or that operate, use, or have access 
to federal information systems on behalf of an agency. In support of 
FISMA implementation, NIST has issued a number of information security 
products intended to improve federal IT systems. 

However, in the absence of a single, comprehensive guide to assist in 
the development of policies, agencies must refer to portions of several 
different documents that address elements related to contractor 
information security oversight. For example, in 2005, NIST published 
Recommended Security Controls for Federal Information Systems,[Footnote 
14] which refers to portions of the following documents that can be 
used by agencies to address some of the challenges related to 
information security oversight of contractors: 

* SP 800-18 states that agencies may require compliance with the guide 
as part of contract requirements;

* SP 800-35 lists in its appendices sample acquisition language that is 
appropriate for inclusion into IT security service statements of work;

* SP 800-47 discusses, in brief, the development of non-disclosure 
agreements for contractors when determining interconnection 
requirements; and: 

* 800-64 gives examples of contract clauses that can be used to help 
establish clear lines of authority and responsibility. 

In February 2005, NIST released the Federal Information Processing 
Standard 201 entitled Personal Identity Verification of Federal 
Employees and Contractors. This standard was developed in response to 
Homeland Security Presidential Directive 12 and is intended to improve 
the identification and authentication of federal employees and 
contractors for access to federal facilities and information systems. 
This standard helps to address the risk of contractors gaining 
unauthorized physical or electronic access to federal information. 

Unified guidance on addressing the information security oversight of 
contractors and privileged users of federal systems and data could 
assist agencies in developing effective programs to ensure compliance 
with agency policy. However, without clear guidance on how to develop 
effective information security oversight of contractors and users with 
privileged access to federal systems and data, federal agencies may not 
develop sufficient policies to address the range of risks posed by 
contractors and key users. As a result, federal information and 
operations can be placed at undue risk. 

Conclusions: 

Contractors provide valuable services that contribute to the efficient 
functioning of the government, but a range of risks from contractors 
and other users with privileged access to federal data and systems must 
be managed effectively. Contracts, policies, and security self- 
assessments can be leveraged as valuable oversight tools for federal 
agencies in managing oversight of contractors and other users. However, 
when not properly implemented, each of these methods has limitations. 
For example, many agencies are not incorporating FISMA requirements 
into their contract language; accordingly, their strongest tool for 
establishing information security requirements is limited. 
Additionally, many agencies have not defined specific oversight 
policies for contractors and other users with privileged access to 
federal data. Without clearly defined information security oversight 
policies, agencies may be accepting significant risk to their 
information and systems from both contractors and other users with 
privileged access without having the appropriate controls to mitigate 
the risks. Finally, agency reliance on self-assessment tools may not 
provide them with the appropriate tools to ensure the security of their 
information. 

To address these complex challenges, a variety of administration 
efforts have been started to further enhance federal agencies' efforts 
to improve information security oversight of contractors, but 
challenges remain. For example, the effort to update FAR guidance has 
not been completed. In addition, continuing OMB FISMA oversight reveals 
challenges in contractor oversight. Finally, if agencies lack unified 
guidance to assist them in creating appropriate information security 
oversight policies for contractors and other users with privileged 
access to federal data and systems, federal agencies may not be able to 
effectively protect their information. 

Recommendations for Executive Action: 

To ensure that agencies are developing the appropriate information 
security oversight capabilities for contractors and other users with 
privileged access to federal data and systems, we recommend, in 
accordance with FISMA, that the Director of OMB ensure that the 
following two actions take place. 

* Efforts to update FAR are completed expeditiously and that such 
efforts require agency security management efforts required by FISMA, 
including: 

* periodic testing and evaluation of management, operational, and 
technical controls;

* a process for planning, implementing, evaluating, and documenting 
remedial action to address any deficiencies in the information security 
policies and procedures;

* procedures for detecting, reporting, and responding to security 
incidents; and: 

* plans and procedures to ensure continuity of operations for 
information systems that support the operations and assets of the 
agency. 

* Federal agencies develop policies for ensuring information security 
of contractors and other users with privileged access to federal data, 
including: 

* establishing procedures for contractor information security oversight;

* assigning roles and responsibilities;

* creating specific audit plans for systems and facilities;

* describing interconnection security agreements;

* creating requirements for agency information that will be secured at 
contractor facilities including storing, processing, transmitting on 
contractor systems, background checks, and facility security; and: 

* requiring agency officials to conduct reviews to ensure that IT 
security requirements are being enforced. 

To assist agencies in managing the risks related to contractors and 
other users with privileged access to federal data and systems, we 
recommend that the Secretary of Commerce develop a unified set of 
guidance for developing appropriate information security policies. 

Agency Comments on Our Evaluation: 

We provided a draft of this report to OMB and the Department of 
Commerce for their official review and comment. OMB General Counsel 
provided oral comments on the report, which have been incorporated as 
appropriate. OMB generally agreed with the report findings and 
conclusions. OMB officials told us that, as part of the capital asset 
plan and business case development process, agencies are required to 
answer several information security oversight questions related to 
contractor-provided IT systems and services. These questions provide 
OMB important information when assessing the business case for funding. 
Further, OMB stated that their efforts to enhance oversight of 
contractors includes requiring that the 25 E-Government initiatives be 
independently reviewed to determine compliance with IT security 
requirements. OMB did not disagree with the overall recommendations and 
recognized the need for further agency action to address contractor 
security oversight. 

In written comments, which are reprinted in appendix II, the Deputy 
Secretary of the Department of Commerce acknowledged the accuracy of 
the report. In regard to our recommendation, Commerce stated that NIST 
recognizes the importance of providing guidance to assist agencies in 
ensuring that security requirements are applied by contractors. 
Additionally, NIST has developed publications that can be used for 
contractors and are focused on acquisition, assessments, controls, and 
the system development life cycle. Commerce agreed that through NIST, 
it would develop a strategy to build a framework for a consolidated 
delivery of contractor related-guidelines. 

As agreed with your offices, unless you publicly announce the contents 
of this report earlier, we plan no further distribution until 30 days 
from the report date. At that time, we will send copies of this report 
to interested congressional committees; the Director, Office of 
Management and Budget; and the Secretary, Department of Commerce. We 
will also make copies available to others upon request. In addition, 
the report will be available at no charge on the GAO Web site at 
[Hyperlink, http://www.gao.gov]. 

If you or any of your staff have any questions concerning this report, 
please contact me at (202) 512-3317. I can also be reached by e-mail at 
[Hyperlink, wilshuseng@gao.gov]. Other contacts and key contributors to 
this report are listed in appendix III. 

Signed by: 

Gregory C. Wilshusen: 
Director, Information Security Issues: 

[End of section]

Appendixes: 

Appendix I: Objectives, Scope, and Methodology: 

The objectives of our review were to: 

* Describe the information security risks associated with the federal 
government's reliance on contractors providing information technology 
systems and services and other users with privileged access to federal 
data and systems federal information or access federal information 
systems. 

* Identify methods used by federal agencies to ensure security of 
information and information systems that are operated, used, or 
accessed by contractors and other users with privileged access to 
federal data. 

* Discuss what steps the administration is taking to ensure 
implementation and oversight of security of information and information 
systems that are operated, used, or accessed by contractors and other 
users with privileged access to federal data. 

To describe the information security risks associated with the federal 
government's reliance on contractors and other organizations, we 
analyzed existing federal regulations, laws, and guidelines such as the 
Federal Acquisition Regulation (FAR); Federal Information Security 
Management Act of 2002 (FISMA); and National Institute of Standards and 
Technology (NIST) guidance. In addition, we interviewed federal and 
private-sector officials regarding the policies and procedures for 
overseeing contractor security. We then developed a series of questions 
that were incorporated into a Web-based survey instrument. We pretested 
our survey instrument at one federal department and one federal 
independent agency. We also met with Office of Management and Budget 
(OMB) officials to discuss OMB's role in ensuring the security of 
contractor-provided systems and services. For each agency to be 
surveyed, we identified the office of the chief information officer, 
notified each office of our work, and, via e-mail, distributed a link 
to each office. All 24 agencies responded to our survey. We did not 
verify the accuracy of the agencies' responses; however, we reviewed 
supporting documentation that agencies provided to validate their 
responses. We contacted agency officials when necessary for follow-up. 

Although this was not a sample survey and, therefore, there were no 
sampling errors, conducting any survey may introduce errors, commonly 
referred to as nonsampling errors. For example, difficulties in how a 
particular question is interpreted, in the sources of information that 
are available to respondents, or in how the data are entered into a 
database or were analyzed can introduce unwanted variability into the 
survey results. We took steps in the development of the survey 
instrument, the data collection, and the data analysis to minimize 
these nonsampling errors. For example, a survey specialist designed the 
survey instrument in collaboration with GAO staff with subject-matter 
expertise. Then, as previously stated, it was pretested to ensure that 
the questions were relevant, clearly stated, and easy to comprehend. 
When the data were analyzed, a second, independent analyst checked all 
computer programs. Because this was a Web-based survey, respondents 
entered their answers directly into the electronic questionnaire. This 
eliminated the need to have the data keyed into a database, thus 
removing an additional potential source of error. 

To identify methods used by federal agencies to ensure security of 
contractor-provided systems and services, we interviewed the FAR 
Council, OMB, and NIST officials to discuss their guidelines and other 
tools available to agencies. In addition, questions regarding agency 
policy, agency use of oversight guidelines, acquisition process, and 
personnel/background checks, security requirements, and contract 
language were included in the survey we sent to the 24 Chief Financial 
Officer's Act agencies. We did not verify the accuracy of the agencies' 
responses; however, we reviewed supporting documentation that agencies 
provided to validate their responses. We contacted agency officials 
when necessary for follow-up. 

Finally, to determine what steps the administration is taking to ensure 
implementation and oversight of security of contractors and other users 
with privileged access that operate, use, or access federal information 
systems on behalf of an agency, we interviewed FAR Council, OMB, and 
NIST officials regarding the policies and procedures for overseeing 
contractor security. We also reviewed annual chief information officer 
and inspectors general FISMA reports to assess progress made in meeting 
FISMA requirements related to contractor security. 

We conducted our work in Washington, D.C., from August 2004 through 
March 2005 in accordance with generally accepted government auditing 
standards. 

[End of section]

Appendix II: Comments from the Department of Commerce: 

THE DEPUTY SECRETARY OF COMMERCE: 
Washington, D.C. 20230:

April 19, 2005:

Mr. Gregory Wilshusen:
Director, Information Security Issues:
United States Government Accountability Office:
Washington, DC 20548:

Dear Mr. Wilshusen:

I enclose the Department of Commerce's comments on Government 
Accountability Office (GAO) proposed report entitled Information 
Security: Improving Oversight of Access to Federal Systems and Data by 
Contractors Can Reduce Risk (GAO-05-362). Thank you for the opportunity 
to review the report. I commend the GAO for this study on the issue of 
improving information security oversight of contractors.

We recognize the need to develop cohesive government-wide guidance to 
assist agencies in developing appropriate information security policies 
for addressing contractors and other users with privileged access to 
federal data and systems. The National Institute of Standards and 
Technology (KIST) has developed a set of publications for acquisition, 
self-assessment, and controls that should be applied in developing 
information systems. In addition, NIST has recently developed a road 
map which maps NIST publications to the various phases of the system 
development life cycle. In support of the GAO proposed recommendation, 
NIST will extend its efforts to develop a strategy to build the 
necessary framework for a more consolidated delivery of the contractor 
related guidelines.

Again, thank you for the opportunity to comment on this draft report.

Sincerely,

Signed by: 

Theodore W. Kassinger:

Enclosure:

Comments on Government Accountability Office (GAO) Report entitled 
"Information Security: Improving Oversight of Access to Federal Systems 
and Data by Contractors Can Reduce Risk" made by the National Institute 
of Standards and Technology (KIST), Department of Commerce:

The GAO team should be commended for the study. The report provides a 
thorough assessment of the information security risks associated with 
the Federal Government's reliance on contractor-provided IT systems and 
services and other users with privileged access to federal data and 
systems. Furthermore, it identifies current methods employed by federal 
agencies to avoid these risks, and provides recommendations to improve 
information security oversight for contractors.

NIST has reviewed the report and has noted no major errors or 
omissions. The report identified one major recommendation --that the 
Secretary of Commerce develop a unified set of guidance for developing 
appropriate information security guidance related to contracting.

NIST recognizes the importance of providing guidance to assist agencies 
in ensuring that the appropriate security requirements are applied to 
contractors. We had previously developed a three-volume set of special 
publications (SP) specifically focused on acquisition (SP800-64, SP800- 
35, and SP800-36). In addition, SP 800-26, the NIST self-assessment 
tool, can be used for contractor assessments. Most recently, NIST 
published SP800-53 which defines in great detail the controls that 
should be applied in developing information systems. This document can 
be used to derive security requirements for systems being developed by 
contractors. (http://csrc.nist.gov/publications/nistpubs/index.html)

Further, recognizing the need to provide one consolidated road map to 
the numerous NIST publications, which can be applied throughout the 
system development life cycle (SDLC), we recently published a reference 
which maps all of the NIST guidance to the various phases of the SDLC. 
It can be used by contractors to identify the appropriate references 
based on scope and focus of specific contract tasking. 
(http://csrc.nist.gov/SDLCinfosec/SDLC_brochure_Aug04.pdf)

The above strategy has allowed NIST to develop information security 
publications in focused areas with the sufficient detail required to be 
useful.

To support the GAO proposed recommendation, NIST will extend its 
efforts to develop a strategy to build the necessary framework for a 
more consolidated delivery of the contractor-related guidelines. 

[End of section]

Appendix III: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

J. Paul Nicholas, Assistant Director, (202) 512-4457, [Hyperlink, 
nicholasj@gao.gov].  

Staff Acknowledgments: 

In addition to the individual named above, key contributors to this 
report included Neil Doherty, Nancy Glover, Stuart Kaufman, Anjalique 
Lawrence, Nnaemeka Okonkwo, and Kevin Secrest. 

(310544): 

FOOTNOTES

[1] These 24 CFO departments and agencies are the Departments of 
Agriculture, Commerce, Defense, Education, Energy, Health and Human 
Services, Homeland Security, Housing and Urban Development, Interior, 
Justice, Labor, State, Transportation, Treasury, Veterans Affairs, 
Environmental Protection Agency; General Services Administration; 
National Aeronautics and Space Administration; National Science 
Foundation; Nuclear Regulatory Commission; Office of Personnel 
Management; Small Business Administration; Social Security 
Administration; and U.S. Agency for International Development. 

[2] A virus is a program that "infects" computer files, usually 
executable programs, by inserting a copy of itself into the file. These 
copies are usually executed when the infected file is loaded into 
memory, allowing the virus to infect other files. A virus requires 
human involvement (usually unwittingly) to propagate. A worm is an 
independent computer program that reproduces by copying itself from one 
system to another across a network. Unlike computer viruses, worms do 
not require human involvement to propagate. 

[3] Contractors are generally considered to be the primary entity with 
which a department or agency enters into an agreement. In this report, 
we use the term "contactor" when referring to both contractors and 
subcontractors. We refer to other organizations that possess or use 
federal information or have access to federal information systems--such 
as grantees, state and local governments, and research and educational 
institutions--as other users with privileged access to federal data and 
systems. 

[4] 48 C.F.R. Chapter 1. 

[5] Federal Information Security Management Act of 2002, Title III, E- 
Government Act of 2002, Pub. L. No. 107-347 (Dec. 17, 2002). 

[6] Privacy Act of 1974, Pub. L. No. 93-579, 5 U.S.C. 552a; FAR Subpart 
24.1, 48 C.F.R. Subpart 24.1. 

[7] In 2003, the Medicare Prescription Drug, Improvement, and 
Modernization Act (Pub. L. No. 108-173) was enacted. Section 912 of the 
act includes a provision requiring Medicare administrative contractors 
to implement a contractorwide information security program to provide 
information security for the operation and assets of the contractor for 
Medicare functions. Additionally, the information security program is 
required to meet certain requirements for information security programs 
already imposed on agencies and their data contractors by FISMA. 
Medicare administrative contractors are also required to undergo an 
annual independent testing and evaluation of their information security 
programs. 

[8] NIST, Risk Management Guide for Information Technology Systems, 
Special Publication 800-30 (Gaithersburg, Md.: July 2002) and Guide for 
Developing Security Plans for Information Technology Systems, Special 
Publication 800-18 (Gaithersburg, Md.: December 1998). 

[9] OMB, Fiscal Year 2004 Reporting Instructions for the Federal 
Information Security Management Act, M-04-25(Washington, D.C.: Aug. 23, 
2004). 

[10] NIST, Security Self-Assessment Guide for Information Technology 
Systems, NIST Special Publication 800-26 (Gaithersburg, Md.: November 
2001). 

[11] FAR Subpart 1.3; 48 C.F.R. Subpart 1.3. 

[12] NIST, Guide to Information Technology Services, Special 
Publication 800-35 (Gaithersburg, Md.: October 2003). 

[13] An interconnection security agreement documents specific technical 
and security requirements for connecting IT systems from different 
organizations, such as between a federal agency and a contractor or 
between a federal agency and other users with privileged access to 
federal data and systems. 

[14] NIST, Recommended Security Controls for Federal Information 
Systems, Special Publication 800-53 (Gaithersburg, Md.: February 2005). 

GAO's Mission: 

The Government Accountability Office, the investigative arm of 
Congress, exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO's commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains 
abstracts and full-text files of current reports and testimony and an 
expanding archive of older products. The Web site features a search 
engine to help you locate documents using key words and phrases. You 
can print these documents in their entirety, including charts and other 
graphics. 

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as "Today's Reports," on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order 
GAO Products" heading. 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office

441 G Street NW, Room LM

Washington, D.C. 20548: 

To order by Phone: 

Voice: (202) 512-6000: 

TDD: (202) 512-2537: 

Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm

E-mail: fraudnet@gao.gov

Automated answering system: (800) 424-5454 or (202) 512-7470: 

Public Affairs: 

Jeff Nelligan, managing director,

NelliganJ@gao.gov

(202) 512-4800

U.S. Government Accountability Office,

441 G Street NW, Room 7149

Washington, D.C. 20548: