This is the accessible text file for GAO report number GAO-10-28 
entitled 'Information Security: Actions Needed to Better Manage, 
Protect, and Sustain Improvements to Los Alamos National Laboratory's 
Classified Computer Network' which was released on November 13, 2009. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to Congressional Committees: 

United States Government Accountability Office: 

GAO: 

October 2009: 

Information Security: 

Actions Needed to Better Manage, Protect, and Sustain Improvements to 
Los Alamos National Laboratory's Classified Computer Network: 

GAO-10-28: 

GAO Highlights: 

Highlights of GAO-10-28, a report to congressional committees. 

Why GAO Did This Study: 

The Los Alamos National Laboratory (LANL), which is overseen by the 
National Nuclear Security Administration (NNSA), has experienced a 
number of security lapses in controlling classified information stored 
on its classified computer network. GAO was requested to (1) assess the 
effectiveness of security controls LANL used to protect information on 
its classified network, (2) assess whether LANL had fully implemented 
an information security program to ensure that security controls were 
effectively established and maintained for its classified network, and 
(3) identify the expenditures used to operate and support its 
classified network from fiscal years 2001 through 2008. To carry out 
this work, GAO examined security policies and procedures and reviewed 
LANL’s access controls for protecting information on its classified 
network. 

What GAO Found: 

LANL has implemented measures to enhance its information security 
controls, but significant weaknesses remain in protecting the 
confidentiality, integrity, and availability of information stored on 
and transmitted over its classified computer network. The laboratory’s 
classified computer network had vulnerabilities in several critical 
areas, including (1) uniquely identifying and authenticating the 
identity of users, (2) authorizing user access, (3) encrypting 
classified information, (4) monitoring and auditing compliance with 
security policies, and (5) maintaining software configuration 
assurance. 

A key reason for the information security weaknesses GAO identified was 
that the laboratory had not fully implemented an information security 
program to ensure that controls were effectively established and 
maintained. Shortfalls in the program include, among other things, (1) 
the lack of comprehensive risk assessments to ensure that appropriate 
controls are in place to protect against unauthorized use, (2) not 
developing detailed implementation guidance for key control areas such 
as marking the classification level of information stored on the 
classified network, (3) inadequate specialized training for users with 
significant security responsibilities, and (4) not adequately 
developing and testing disaster recovery and contingency plans to 
mitigate the laboratory’s chances of being unsuccessful at resuming 
normal operational standards after a service disruption. LANL’s 
security plans and test plans were neither comprehensive nor detailed 
enough to identify certain critical weaknesses on the classified 
network. Furthermore, the laboratory’s decentralized approach to 
information security program management has led to inconsistent 
implementation of policy, and although the laboratory has taken steps 
to address management weaknesses, its efforts may be limited because 
LANL has not demonstrated a consistent capacity to sustain security 
improvements over the long term. 

Since fiscal year 2001, the laboratory has spent approximately $433 
million, in constant 2009 dollars, to operate and support its 
classified network. Between fiscal years 2001 and 2008, annual 
expenditures increased from about $20 million to $80 million. 
Expenditures for the core classified cyber security program, which 
serves as the foundation of LANL’s protection strategy for the 
classified cyber security program, accounted for $45 million of total 
expenditures over the period. According to LANL, funding for its core 
classified cyber security program has been inadequate for implementing 
an effective program during fiscal years 2007 and 2008. However, 
according to NNSA, it funded programs based on available resources and 
risk evaluations conducted at both the enterprise and site levels. 

What GAO Recommends: 

GAO recommends, among other things, that NNSA direct LANL to (1) fully 
implement its information security program, (2) centralize management 
of the classified network, and (3) develop a sustainability plan that 
details how it plans to strengthen recent cyber security improvements 
over the long term. 

NNSA generally agreed with a draft of this report. 

View [hyperlink, http://www.gao.gov/products/GAO-10-28] key components. 
For more information, contact Gene Aloise at (202) 512-3841 or 
aloisee@gao.gov; Nabajyoti Barkakati at (202) 512-4499 or 
barkakatin@gao.gov; or Gregory Wilshusen at (202) 512-6244 or 
wilshuseng@gao.gov. 

[End of section] 

Contents: 

Letter: 

Background: 

Significant Information Security Control Weaknesses Remain on LANL's 
Classified Computer Network: 

LANL Has Not Fully Implemented Key Elements of Its Information Security 
Program for Its Classified Computer Network: 

LANL Has Spent More Than $400 Million to Operate and Support Its 
Classified Computer Network Since Fiscal Year 2001, but LANL and DOE 
Officials Believe That Resources Are Inadequate to Mitigate Risks: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Objectives, Scope, and Methodology: 

Appendix II: Comments from the National Nuclear Security 
Administration: 

Appendix III: GAO Contacts and Staff Acknowledgments: 

Figure: 

Figure 1: Annual Expenditures for LANL's Classified Computer Network, 
Fiscal Years 2001 through 2008: 

Abbreviations: 

DOE: Department of Energy: 

FISMA: Federal Information Security Management Act: 

FTE: full-time equivalent: 

LANL: Los Alamos National Laboratory: 

LANS: Los Alamos National Security, LLC: 

NIST: National Institute of Standards and Technology: 

NNSA: National Nuclear Security Administration: 

OCIO: Office of the Chief Information Officer: 

OMB: Office of Management and Budget: 

POAM: Plan of Actions and Milestones: 

[End of section] 

United States Government Accountability Office: 

Washington, DC 20548: 

October 14, 2009: 

The Honorable Henry Waxman: 

Chairman: 

The Honorable John D. Dingell: 

Chairman Emeritus: 

The Honorable Joe Barton: 

Ranking Member: 

Committee on Energy and Commerce: 

House of Representatives: 

The Honorable Bart Stupak: 

Chairman: 

The Honorable Greg Walden: 

Ranking Member: 

Subcommittee on Oversight and Investigations: 

Committee on Energy and Commerce: 

House of Representatives: 

The Los Alamos National Laboratory (LANL),[Footnote 1] which is 
operated by Los Alamos National Security, LLC[Footnote 2] for the 
National Nuclear Security Administration,[Footnote 3] has experienced a 
number of high-profile security lapses. Over the last decade, these 
lapses have included, but are not limited to, the inability to account 
for and control classified information. For example, in October 2006, 
evidence obtained during a drug-related investigation in Los Alamos, 
New Mexico, revealed that classified information--a "USB thumb drive" 
and several physical documents--had been improperly removed from the 
laboratory. This incident followed several others in 2003 and 2004, 
when LANL could not account for classified removable electronic media, 
such as compact disks and removable hard drives. In 2000, two pieces of 
this type of media containing nuclear weapon design information used by 
the Department of Energy's (DOE) Nuclear Emergency Search Team were 
temporarily lost.[Footnote 4] Furthermore, in 1999, a LANL scientist 
transferred classified information from laboratory computer systems 
onto unmarked disks and removed the disks from the laboratory. 
Following the October 2006 event and an extensive investigation, DOE 
and National Nuclear Security Administration (NNSA) took formal 
enforcement actions against the University of California and Los Alamos 
National Security, LLC (LANS) for violations of classified information 
security requirements under their respective contracts.[Footnote 5] In 
addition to the assessment of civil penalties for both contractors, the 
Secretary of Energy issued a Compliance Order to LANS, which required 
the laboratory's management and operating contractor to take 14 
specific actions. These actions required LANS to, among other things, 
correct management deficiencies that contributed to the October 2006 
incident and address long-standing deficiencies in the laboratory's 
classified information and cyber security programs.[Footnote 6] The Los 
Alamos Site Office, which is a field component of NNSA and is 
responsible for day-to-day oversight of LANL cyber security activities, 
was responsible for ensuring that the laboratory satisfied the 
objectives of the Compliance Order. 

At your request, we evaluated key elements of LANL's classified 
information security program for its classified computer network. 
Specifically, we (1) assessed the effectiveness of security controls 
used to protect information stored on and transmitted over its 
classified computer network, (2) assessed whether LANL had fully 
implemented an information security program to ensure that controls 
were effectively established and maintained for its classified computer 
network, and (3) identified the expenditure of funds used to operate 
and support the classified computer network from fiscal years 2001 
through 2008. To accomplish these objectives, we examined the 
information security controls for five systems connected to the 
classified computer network at LANL that are critical to the 
laboratory's achievement of its nuclear weapon missions. In addition, 
we analyzed procedures and their implementation areas such as risk 
assessment, security awareness training, information security plans, 
security testing and evaluation, corrective action plans, and 
continuity of operations. Further, we identified and analyzed financial 
data provided by LANL that detailed classified computer network 
expenditures, and adjusted these expenditures to constant 2009 dollars. 

We conducted this performance audit from November 2008 to July 2009 in 
accordance with generally accepted government auditing standards. Those 
standards require that we plan and perform the audit to obtain 
sufficient, appropriate evidence to provide a reasonable basis for our 
findings and conclusions based on our audit objectives. We believe that 
the evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives. A more detailed description 
of our objectives, scope, and methodology is contained in appendix I. 

This report summarizes shortcomings identified in information security 
controls on LANL's classified computer network. It does not contain 
specific examples of the weaknesses identified due to the sensitive 
nature of the information discussed. In a separate classified report, 
issued in July 2009, we provided specific examples and made 
recommendations to address the specific control weaknesses identified. 
[Footnote 7] 

Background: 

LANL is responsible for planning and executing all facets of the 
stockpile stewardship program, including assessing, refurbishing, and 
certifying nuclear weapons.[Footnote 8] To help carry out these 
critical missions, LANL uses its classified computing network to 
analyze results from nonnuclear experiments and to simulate the 
performance of nuclear weapons and their delivery systems to meet 
military requirements established by the Department of Defense. Due to 
the sensitivity of the information stored on and transmitted over the 
laboratory's classified computer network, LANL segregates this network 
from its other computer systems. The classified computer network 
consists of more than 3,900 computers and devices, serving about 3,800 
users. The most restrictive information that can be processed on LANL's 
classified computer network is classified at the Secret-Restricted Data 
level, additionally controlled by Sigmas 1 through 13, 15, and 20. 
[Footnote 9] In addition, the following types of information can be 
stored on and transmitted over LANL's classified computer network: (1) 
open public unrestricted information, (2) unclassified protected 
information, (3) unclassified mandatory protected information, (4) 
confidential nonnuclear weapons information, (5) secret nonnuclear 
weapons information, and (6) confidential restricted data. However, all 
information stored on LANL's classified computer network is protected 
at the Secret-Restricted Data classification level. 

In July 2007, the Secretary of Energy issued a Compliance Order that 
directed LANS to implement specific action items by December 2008 to 
address long-standing deficiencies in the laboratory's classified 
information and cyber security programs, including the following: 

* address organizational culture issues, including the lack of 
classified information protection by all employees and lack of 
leadership in classified information protection by LANL management; 

* develop and implement an integrated corrective action plan for all 
previously identified classified information and cyber security issues; 

* ensure full implementation of all NNSA cyber security requirements; 
and: 

* accredit all unclassified computer systems and reaccredit all 
classified computer systems. 

A basic management objective for any organization is to protect the 
resources that support its critical operations from unauthorized 
access. To ensure the confidentiality, integrity, and availability of 
critical information and information systems used to support operations 
and assets of federal agencies, information security controls and 
complementary program activities are required. Effective controls are 
necessary to ensure the protection of information stored on and 
transmitted over computer networks. In addition, certain program 
management activities, such as the development, documentation, and 
implementation of policies and procedures, are required to govern the 
protection of information.[Footnote 10] 

Information security controls are put in place to prevent, limit, and 
detect unauthorized access, use, disclosure, modification, 
distribution, or disruption of computing resources, programs, and 
information. For example: 

* User identification and authentication allows computer systems to 
differentiate between users, so that the claimed identity of users can 
be verified and activities on the system can be linked to specific 
individuals. 

* Authorization is the process of granting or denying access rights and 
privileges to a protected resource, such as a network, system, 
application, function, or file. 

* Cryptography underlies many of the mechanisms used to enforce the 
confidentiality and integrity of critical and sensitive information. 

* Audit and monitoring controls help establish individual 
accountability and monitor compliance with security policies. 

* Configuration assurance involves the (1) verification of the 
correctness of the security settings in the operating systems, 
applications, or computing and network devices and (2) maintenance of 
software in a secure fashion. 

Information security program activities govern the security protections 
for the information and information systems that support the operations 
and assets of an agency using a risk-based approach. These activities 
include ensuring that an agency (1) periodically assesses the risk and 
the magnitude of harm that could result from unauthorized access; (2) 
develops, documents, and implements risk-based policies and procedures 
to ensure that information security is addressed throughout the life 
cycle of each system and ensures compliance with applicable 
requirements; (3) provides security awareness training to inform 
personnel of information security risks and of their responsibilities 
in complying with agency policies and procedures; (4) develops, 
documents, and implements plans to provide adequate information 
security for networks, systems, and facilities; (5) periodically tests 
and evaluates the effectiveness of information security policies, 
procedures, and practices relating to management, operational, and 
technical controls for every system; (6) has a process for planning, 
implementing, evaluating, and documenting remedial action to address 
deficiencies in information security policies, procedures, or 
practices; (7) has procedures for detecting, reporting, and responding 
to security incidents; and (8) documents, develops, and implements 
plans and procedures to ensure continuity of operations for information 
systems that support its operations and assets. 

A comprehensive information security program is the foundation of a 
security control structure and a reflection of senior management's 
commitment to addressing security risks. The program should establish a 
framework and continuous cycle of activities for assessing risk, 
developing and implementing effective security procedures, and 
monitoring the effectiveness of these procedures. 

In 2008, we issued two reports--a public version and a limited official 
use only version--regarding the effectiveness of the security controls 
protecting information stored on and transmitted over LANL' s 
unclassified computer network.[Footnote 11] We made 11 recommendations 
to correct deficiencies identified in the public version of the report, 
including (1) ensuring that the risk assessment for the unclassified 
computer network evaluates all known vulnerabilities and is revised 
periodically and (2) strengthening policies with a view toward further 
reducing, as appropriate, foreign nationals'--particularly those from 
countries that DOE has identified as sensitive--access to the 
unclassified network. In a letter dated January 16, 2009, NNSA informed 
us that it concurred with all 11 recommendations in the public version 
of our report, noting that corrective action plans were either in place 
or being developed to address the identified deficiencies. We also made 
an additional 41 technical recommendations to improve specific computer 
security problems identified in our limited official use version of the 
report. NNSA informed us that it concurred with all 41 recommendations, 
noting that corrective actions were either in place or being developed 
in response to our report. 

Significant Information Security Control Weaknesses Remain on LANL's 
Classified Computer Network: 

While LANL had implemented measures to enhance the security controls 
protecting information stored on and transmitted over its classified 
computer network, significant security control weaknesses remain. LANL 
had vulnerabilities in several critical areas, including (1) 
identifying and authenticating the identity of users, (2) authorizing 
user access, (3) encrypting classified information, (4) monitoring and 
auditing compliance with security policies, and (5) maintaining 
software configuration assurance. 

Strong Authentication Was Implemented but Was Not Always Used: 

A computer system must be able to identify and authenticate different 
users so that activities on the system can be linked to specific 
individuals. When an organization assigns a unique user account to a 
specific user, the system is able to distinguish one user from another--
a process called identification. The system must also establish the 
validity of a user's claimed identity by requesting some kind of 
information, such as a password, that is known only by the user--a 
process known as authentication. NNSA policy states that individuals 
must not share passwords except in emergency circumstances or when 
there is an overriding operational necessity, as described in the 
system's approved security plan. In addition, the policy requires that 
passwords be changed at least every 6 months on systems where the 
consequence of loss of confidentiality or integrity for any information 
group is medium to high risk. Furthermore, LANL's password policy 
requires that one-time passcodes--using token cards and personal 
identification numbers, that is, two-factor authentication--be used 
whenever possible or practical. 

LANL did not always manage passwords securely on the classified 
computer network. As a result of this weakness, increased risk exists 
that insiders with malicious intent could guess the passwords of other 
individuals and use them to gain inappropriate access to classified 
information. 

Weaknesses Existed in Authorizing User Access: 

Authorization is the process of granting or denying access rights and 
privileges to a protected resource, such as a network, system, 
application, function, or file. A key component of authorization and a 
basic principle for securing computer resources and data is the concept 
of least privilege. Least privilege means that users are granted access 
only to those programs and files that they need in order to perform 
their official duties. According to NNSA policy, LANL is required to 
provide access to classified information only to individuals with the 
appropriate access authorizations and a need-to-know to do their jobs. 
In addition, NNSA policy states that configuring computer systems only 
for necessary capabilities minimizes processes and services, and only 
required services should be enabled. LANL policy also recommends that 
only required services should be installed on computer systems and 
requires the configuration of computer systems only for necessary 
processes and services. 

LANL provided users with more access than needed to perform their 
duties and configured classified systems with more capabilities and 
services than required. As a result, there is an increased risk that 
users could access classified data they do not need to perform their 
duties. 

Cryptography Was Not Always Effectively Used: 

Cryptography underlies many of the mechanisms used to enforce the 
confidentiality and integrity of critical and sensitive information. 
One such mechanism is encryption. Encryption can be used to provide 
basic confidentiality and integrity of transmitted or stored data by 
transforming plain text into cipher text using a special value, known 
as a key, and a mathematical process, known as an algorithm. NNSA 
requires that cryptographic services be used to ensure that information 
maintains an adequate level of confidentiality and integrity based on 
the sensitivity of the information to be protected and the threat 
environment. 

Although LANL employed encryption mechanisms to protect data on its 
network and servers, it did not always comply with NNSA policy. As a 
result, weaknesses in encryption increased the risk of exposing data to 
unnecessary disclosure or misuse by unauthorized individuals. 

Network Monitoring Was Performed Regularly but Was Not Comprehensive: 

To establish individual accountability, monitor compliance with 
security policies, and investigate security violations, it is crucial 
to determine what, when, and by whom specific actions are taken on a 
computer system. Organizations accomplish this by implementing system 
or security software that provides an audit trail of needed information 
in the desired format and locations, so they can use it to determine 
the source of a transaction or attempted transaction and to monitor 
users' activities. The way in which organizations configure system or 
security software determines the nature and extent of information that 
the audit trails can provide. A key aspect of this process is managing 
audit logs. Organizations should periodically review audit log design, 
review processes and procedures, and implement changes, as needed, to 
ensure that logs effectively detect security threats. NNSA policy 
requires that all user activities, and activities on behalf of the 
user, should be monitored and reviewed for actions that are detrimental 
to the confidentiality, integrity, and availability of the information 
or information systems. In addition, intrusion detection measures, 
which also enhance monitoring capabilities, must be taken to detect 
unauthorized attempts to penetrate the system and respond to detected 
incidents on the classified computer network. 

Weaknesses existed in audit and monitoring controls for LANL's 
classified computer network, and although LANL was logging certain 
events such as failed and successful login attempts, other events were 
not being captured. These weaknesses increase the risk that 
unauthorized activity would not be effectively detected or 
investigated. 

Weaknesses Existed in Software Configuration Assurance: 

Configuration assurance is the process of (1) verifying the correctness 
of the security settings in the operating systems, applications, or 
computing and network devices and (2) maintaining operations in a 
secure fashion. Organizations should maintain software configuration to 
ensure protection against vulnerabilities. According to the National 
Institute of Standards and Technology (NIST), all organizations should 
have a systematic, accountable, and documented process for managing 
exposure to vulnerabilities. Proactively mitigating the vulnerabilities 
of computer systems can reduce or eliminate the potential for 
exploitations to occur. However, LANL did not effectively mitigate 
certain vulnerabilities on its systems, and as a result, data was 
unnecessarily vulnerable to compromise. 

LANL Has Not Fully Implemented Key Elements of Its Information Security 
Program for Its Classified Computer Network: 

LANL's information security program for its classified computer network 
had not been fully implemented. Specifically, (1) risk assessments were 
not comprehensive, (2) specific guidance was missing from policies and 
procedures, (3) the training and awareness program did not adequately 
address specialized training needs for individuals with significant 
network security responsibilities, (4) system security plans were 
incomplete, (5) the system security testing and evaluation process had 
shortcomings, (6) corrective action plans were not comprehensive, and 
(7) contingency plans were incomplete and not tested. In addition, the 
laboratory's decentralized management approach has led to weaknesses in 
the effectiveness of its classified cyber security program. Although 
the laboratory has taken steps to address these weaknesses, its efforts 
may be limited because LANL has not demonstrated a consistent capacity 
to sustain security improvements over the long term. Until LANL ensures 
that the information security program associated with its computer 
network is fully implemented, the laboratory will have limited 
assurance that classified information is adequately protected against 
unauthorized disclosure. 

Although Risk Assessments Were Complete, They Were Not Comprehensive: 

Identifying and assessing information security risks are essential 
steps in determining the security controls required to ensure the 
protection of information and information systems. The cornerstone of 
an information system's security program is the risk management 
process, which determines the protection requirements for information. 
Risk management is the process of identifying risk, assessing risk, and 
taking steps to reduce risk to an acceptable level. 

The Federal Information Security Management Act of 2002 (FISMA) 
requires each agency to develop, document, and implement an information 
security program that periodically assesses the risk and magnitude of 
harm that could result from unauthorized access, use, disclosure, 
disruption, modification, or destruction of information and information 
systems.[Footnote 12] DOE and NNSA require that their organizations and 
contractors develop and implement a risk management process to protect 
classified information systems. DOE's risk assessment process includes 
detailed analysis of areas such as threat assessment, the effect of 
countermeasures, the remaining vulnerability (residual risk), and the 
protection requirements and value of the information being processed. 
Furthermore, risks must be reassessed when significant changes are made 
to computer systems or at least every 3 years. In January 2008, LANL 
issued a new risk management procedure, consistent with NNSA risk 
management policy, describing the framework to identify and manage 
risks for classified systems. In addition, the LANL policy requires 
that risk assessment results be incorporated into the system's security 
plans and be used in the development of information system controls. 

Although LANL had strengthened its risk assessment program, 
shortcomings remained. To satisfy the July 2007 DOE Compliance Order, 
the laboratory reaccredited all classified computer systems. During 
2008, as part of its reaccredidation process, LANL revised risk 
assessments for classified computer systems and included the results in 
the system security plans. The laboratory also developed a new risk 
assessment process that included related training and a comprehensive 
tool to aid in conducting risk assessments. However, of the five system 
security plans we reviewed, one plan's risk assessment did not adhere 
to the latest methodology and did not include evidence of a 
comprehensive threat analysis, as required by DOE. Furthermore, the 
remaining four plans noted that all known threats and vulnerabilities 
were not evaluated to determine risks. Without comprehensive risk 
assessments, risks to certain systems may be unknown and appropriate 
controls may not be in place to protect against unauthorized access to 
or disclosure of sensitive information, or disruption of critical 
systems and operations. 

Detailed Implementation Guidance Did Not Exist for Certain Cyber 
Security Policies and Procedures: 

Another key task in developing an effective information security 
program is to establish and implement risk-based policies, procedures, 
and technical standards that govern security over an agency's computing 
environment. If properly implemented, policies and procedures should 
help reduce the risk that could come from unauthorized access or 
disruption of services. Because security policies and procedures are 
the primary mechanisms through which management communicates its views 
and requirements, it is important that these policies and procedures be 
established and documented. FISMA requires agencies to develop and 
implement policies and procedures to support an effective information 
security program. NIST issued security standards and related guidance 
to help agencies implement security controls, including appropriate 
information security policy and procedures. DOE and NNSA have also 
issued cyber security policies and related guidance to help implement 
security controls. In March 2007, DOE issued a National Security 
Systems Manual that established a framework for addressing technical, 
operational, and assurance controls such as security audits, management 
of user identifiers and authenticators, and configuration management. 
Although NNSA did not issue implementing guidance for this manual until 
May 2008, the Los Alamos Site Office instructed LANL to comply with 
NIST guidance in lieu of existing policies and procedures. 

LANL had yet to develop detailed implementation guidance for certain 
areas. Although the laboratory has developed and documented many 
information security policies and procedures, it did not always have 
specific, detailed guidance for implementing federal and departmental 
requirements in the classified network environment. For example, the 
laboratory had neither developed detailed implementation guidance for 
the services allowed for computer systems connected to the classified 
network nor indicated whether encrypted protocols should be used. In 
addition, recertification and accreditation testing for four of the 
systems we reviewed identified a lack of up-to-date or formal 
institutional guidance for audit and accountability, system and 
information integrity, and contingency planning. Further, no specific 
policy existed for marking computer files within the classified 
network's directory system. As a result, LANL did not (l) mark the 
classification level of any individual documents stored on its 
classified computer network or (2) maintain an inventory of the numbers 
and types of classified documents stored on the network. Because 
classified documents in electronic form were not marked or inventoried, 
the laboratory did not know the numbers and types of information stored 
on its classified computer network or whether classified information is 
accessed by unauthorized individuals or misused by authorized 
individuals. This increases the risk that the laboratory may not be 
able to detect inappropriate activities or conduct comprehensive 
investigations of security violations on the network. Without 
effectively developing, documenting, and implementing detailed 
guidance, the laboratory has less assurance that the confidentiality, 
integrity, and availability of its systems and information were 
protected. 

LANL's Classified Cyber Security Training and Awareness Program Did Not 
Adequately Address Specialized Training: 

People are often one of the weaker links in attempts to secure systems 
and networks. Therefore, an important component of an information 
security program is providing necessary training, so that users 
understand a system's security risks and their own role in implementing 
related policies and controls to mitigate those risks. FISMA requires 
each agency to develop, document, and implement an information security 
program that includes security awareness training to inform personnel 
of information security risks and of their responsibilities in 
complying with agency policies and procedures, as well as to train 
personnel with significant security responsibilities for information 
security. DOE policy requires the establishment of a training, 
education, and awareness program that develops and maintains cyber 
security competencies, and further states that, for classified 
information systems, users should be properly trained in system 
security by identifying their system-specific training needs and 
assigned personnel. LANL policy requires that all employees complete an 
initial computer security briefing prior to being granted access to the 
laboratory's classified information system resources, and it requires 
that employees complete annual refresher training. LANL's policy also 
states that cyber security specialists must maintain a record of their 
local training that includes the content of the training. 

LANL had an annual awareness training program in place, but not all 
individuals with cyber security responsibilities had received 
specialized training. We examined the training records for 176 
individuals, with significant security responsibilities, whom LANL had 
categorized as privileged users for the five computer systems we 
reviewed.[Footnote 13] All privileged users had completed the annual 
awareness training, which is a general course required for all 
classified computer users. However, more specialized training was not 
given to all privileged users. For example, system administrators, who 
are privileged users, were not required to take additional specialized 
training, despite having significant cyber security responsibilities on 
the classified computer network. Because the LANL cyber security 
training program does not adequately address the specialized training 
that users with significant security responsibilities require, LANL is 
at an increased risk of a security compromise if privileged users are 
not sufficiently trained to effectively perform their cyber security 
roles and responsibilities on the classified computer network. 

System Security Plans Were Incomplete: 

An information system security plan should provide a complete and up- 
to-date overview of a computer system's security requirements and 
describe the controls that are in place or planned to meet those 
requirements. DOE and NNSA policy require that each national security 
system be covered by a system security plan. Furthermore, DOE requires 
that the minimum set of security controls for the system be documented 
in plans, including any additional implementation information for the 
controls. The NNSA cyber security program policy outlines the contents 
for system security plans, including documentation of the system 
security requirements. According to NIST standards, there are three 
general classes of security controls--management, operational, and 
technical--that should be implemented to protect information systems. 
LANL policy reinforces these requirements, stating that system security 
plans will describe the management structure, the security environment, 
and the technical controls needed to protect the information on the 
system. 

Although LANL had developed system security plans, it had not 
adequately addressed certain technical controls. This is especially 
significant since the controls documented in the security plans serve 
as the basis for security testing and evaluation to ensure that 
appropriate controls are functioning properly to protect information 
stored on and transmitted over LANL's classified computer network. All 
five system security plans that we reviewed generally documented 
management, operational, and technical controls, and described the 
management structure and security environment. However, these plans did 
not cover certain technical controls where weaknesses existed. Until 
the plans sufficiently address technical controls, LANL has limited 
assurance that appropriate controls are in place to protect its 
classified computer network. 

LANL's Security Testing and Evaluation Process Had Shortcomings: 

Another key element of an information security program is testing and 
evaluating system controls to ensure they are appropriate and 
effective, and comply with agency policies. FISMA requires each agency 
to develop, document, and implement an information security program 
that includes periodic testing and evaluation of the effectiveness of 
information security policies, procedures, and practices. The frequency 
of this testing depends on the risk, but must be conducted at least 
annually. The program is to include testing of management, operational, 
and technical controls for every system identified in the agency's 
required inventory of major information systems. DOE guidance specifies 
that all controls identified in the security plan are subject to 
assessment procedures, and that the breadth and depth of testing 
activities should be documented. In January 2008, the Los Alamos Site 
Office instructed LANL to use NIST guidance for documenting and testing 
security controls. 

Although LANL annually tested the controls in its system security plans 
and conducted continuous automated testing to detect network 
vulnerabilities, these tests were not comprehensive. During our review, 
LANL conducted certification testing for its classified computer 
systems using NIST guidance. Nevertheless, our own independent tests 
identified numerous vulnerabilities and related control weaknesses that 
were not identified in LANL's tests. Further, LANL did not conduct 
comprehensive vulnerability scans of the classified computer network. 
Without appropriate tests and evaluations of system controls, the 
laboratory has limited assurance that policies and controls are 
appropriate and working as intended. As a result, the classified 
computer network is at increased risk that it could be compromised. 
Additionally, without these tests and evaluations, there is a higher 
risk that undetected vulnerabilities could be exploited. 

Corrective Action Tracking Had Improved, but the Laboratory's Remedial 
Action Plans Were Not Comprehensive: 

Remedial action plans, which include plans known as Plans of Action and 
Milestones (POAM), can help set priorities and monitor progress in 
correcting identified security weaknesses. FISMA requires each agency 
to develop, document, and implement an information security program 
that includes a process for planning, implementing, evaluating and 
documenting remedial action to address any deficiencies in its 
information security policies, procedures, or practices. According to 
POAM instructions set forth by the Office of Management and Budget, 
these action plans must describe classified and unclassified weaknesses 
from a variety of sources-internal assessments, the inspector general, 
and GAO-and should track progress for correcting each deficiency. A 
POAM should also detail the resources required to carry out the plan, 
any milestones in meeting the tasks, and scheduled completion dates for 
those milestones. DOE requires that POAMs serve as a management tool 
for tracking corrective actions associated with program and system- 
level weaknesses. 

The laboratory had a management process for identifying, evaluating, 
and documenting security weaknesses and tracking corrective actions, 
but had not yet reported certain weaknesses in its POAM. LANL also used 
a new process for tracking and reporting weaknesses and the status of 
its corrective action plans, which provide specificity regarding 
remediation. The POAM that the laboratory created generally contained 
all required elements and included estimated resources required to 
correct ongoing weaknesses. However, findings related to the 
laboratory's internal weaknesses or assessments were not in the POAM. 
In addition, LANL had not yet developed corrective action plans to 
address the 104 system-level weaknesses identified in its certification 
testing for the five computer systems we reviewed. According to a Los 
Alamos Site Office official, LANL is working to create corrective 
action plans for these weaknesses. Until LANL includes all weaknesses 
in its remedial action program, identified vulnerabilities may not be 
resolved in a timely manner, thereby allowing continuing opportunities 
for unauthorized individuals to exploit these weaknesses. 

LANL's Network Contingency Planning Was Incomplete and Testing Was Not 
Consistently Performed Across the Components of the Classified Computer 
Network: 

Contingency planning is a critical component of information protection. 
If normal operations are interrupted, network managers must be able to 
detect, mitigate, and recover from service disruptions while preserving 
access to vital information. Therefore, a contingency plan is needed to 
detail emergency response, backup operations, and disaster recovery for 
information systems. It is important that these plans be clearly 
documented, communicated to potentially affected staff, and updated to 
reflect current operations. In addition, it is essential to test 
contingency plans in order to determine whether the plans will function 
as intended in an emergency situation. 

Federal law and departmental guidance and policies call for the 
development and testing of contingency plans. LANL's policy also 
indicates that disaster recovery and contingency planning are essential 
parts of the laboratory's overall process for helping ensure that 
classified computer systems can be safely and securely managed during a 
crisis. This policy, which complies with NIST, DOE, and NNSA guidance, 
provides the framework to develop and implement disaster recovery and 
contingency plans, which should include a business impact analysis and 
test plan. Individual systems may be identified in the disaster 
recovery and contingency plan documentation, but the actual contingency 
planning process is performed at a higher level--addressing the 
contingency requirements of the network and its critical systems. 
Furthermore, according to LANL policy, disaster recovery and 
contingency plans should address (1) site policy; (2) business impact 
analysis; (3) preventive controls; (4) recovery strategies; (5) 
testing, training, and exercise; and (6) plan maintenance. 

LANL did not have comprehensive disaster recovery and contingency plans 
in place for its classified computer network. Only one of the five 
plans reviewed had addressed all topics as required by LANL policy, 
including an up-to-date test plan and recent testing. Two others had 
contingency plans, but the plans were inadequate. For example, although 
one plan addressed all topics, the plan is a procedural template and 
did not provide any specific information on the classified computer 
network. Furthermore, two plans did not include elements, such as a 
business impact assessment or appendices containing the points-of- 
contact notification list and standard operating procedures. With the 
exception of the one classified computer system plan that completed all 
topics of the disaster recovery and contingency planning process, none 
of the other four systems addressed contingency plan testing. 

As a result, until LANL (1) identifies the essential processes that 
should be included in its contingency plans, (2) develops a contingency 
plan in accordance with its own policies for each of the systems on the 
laboratory's classified computer network, and (3) sufficiently tests 
each contingency plan, the laboratory faces higher risk that the 
classified network infrastructure will not be able to effectively 
recover and resume normal operations after a service disruption. LANL 
has recognized the shortcomings of its contingency planning for its 
classified computer network and has included the issues in its 
corrective action plans. 

The Laboratory's Decentralized Management Approach Has Led to 
Weaknesses in the Effectiveness of Its Classified Cyber Security 
Program: 

LANL's decentralized approach to information security program 
management has led to inconsistent implementation of policy and 
contributed to both technical weaknesses and security program 
shortfalls. For example, the laboratory did not always use a consistent 
approach to implementing security fixes for the classified computer 
network. Specifically, LANL's central cyber security organization did 
not have the authority to enforce compliance with the laboratory's 
policies and procedures. Each operating division at the laboratory is 
responsible for managing and securing its computer systems that are 
connected to the classified computer network, and each division 
approaches cyber security differently. The result has been a patchwork 
of cyber security practices and procedures, which increases the risk of 
compromise and hampers the laboratory's ability to effectively secure 
information on its classified computer network. We have reported that 
establishing a central management focal point for cyber security is 
essential to spotting trends, identifying problem areas, and 
determining whether policies and administrative issues are handled in a 
consistent manner.[Footnote 14] 

DOE's Office of Independent Oversight also found weaknesses with the 
laboratory's decentralized approach. In 2008, the Office of Independent 
Oversight reported that the laboratory's decentralized management 
approach was not fully effective in managing its classified cyber 
security program. For example, the Office of Independent Oversight 
reported that while LANL's Office of the Chief Information Officer 
cyber security group and LANL's central network group were integrated, 
LANL did not implement a consistent approach to managing its cyber 
security resources across the laboratory.[Footnote 15] In addition, the 
Office of Independent Oversight reported that some LANL organizations 
were allowed to run their cyber security functions for their computer 
systems autonomously and, in many cases, not as effectively as those 
whose cyber security was centrally managed. 

Although LANL Took Actions to Address Weaknesses Governing Its Cyber 
Security Program, Sustainability Concerns Remain: 

Notwithstanding efforts to satisfy the July 2007 Compliance Order, DOE 
and NNSA officials told us they were concerned about LANL's ability to 
sustain security improvements over the long term. According to 
laboratory officials, the measures taken to address the Compliance 
Order facilitated the development of a solid foundation to monitor and 
sustain effective performance. Although actions taken by LANL have 
contributed to cyber security improvements over the short term, the 
assignment of financial penalties would no longer be available once it 
successfully completed the actions outlined in the Compliance Order, as 
we previously noted in our June 2008 report.[Footnote 16] In addition, 
LANL officials described two efforts that will form the basis for the 
sustainability of recent efforts over the long term, including (1) 
LANL's Contractor Assurance System and (2) NNSA's annual performance 
evaluation plans. However, as noted in the June 2008 report, these 
efforts have weaknesses and therefore do not form a solid foundation 
for sustainability. 

Strengthening LANL's sustainability efforts requires federal oversight, 
specifically from NNSA and its Los Alamos Site Office. The Site Office 
is responsible for day-to-day oversight of LANL for NNSA and must 
conduct a comprehensive annual survey of LANL's cyber security 
performance to assure DOE and NNSA that the laboratory's cyber-related 
assets are adequately protected. These surveys must be validated 
through, among other things, document reviews, performance testing, and 
direct observation. To conduct these surveys, as well as to perform 
effective oversight, the Site Office must be appropriately staffed with 
well-trained personnel. 

In our January 2007 report on the effectiveness of NNSA's management of 
its security programs, we reported that NNSA's site offices--including 
the Los Alamos Site Office--had a shortage of security personnel, 
lacked adequate training resources for Site Office security staff, and 
lacked data to determine the overall effectiveness of NNSA' s security 
program.[Footnote 17] These factors, which contributed to weaknesses in 
NNSA's oversight of security at its laboratories and production 
facilities, persist. Specifically, as of February 2009, the Los Alamos 
Site Office employed two full-time equivalents (FTE) to oversee LANL's 
cyber security programs. According to NNSA officials, this staffing 
level is not sufficient to effectively oversee and ensure the 
sustainability of LANL's actions to satisfy the Compliance Order. In 
their view, the number of federal staff for cyber security oversight 
needs to be doubled to four FTEs. However, the site office had not 
conducted a comprehensive staffing review to determine the number of 
FTEs needed to conduct effective oversight and, according to the site 
office manager, additional federal cyber security staff is not needed. 

LANL Has Spent More Than $400 Million to Operate and Support Its 
Classified Computer Network Since Fiscal Year 2001, but LANL and DOE 
Officials Believe That Resources Are Inadequate to Mitigate Risks: 

LANL spent approximately $433 million from fiscal years 2001 through 
2008 (in constant 2009 dollars) to operate, maintain, protect, and 
procure equipment for its classified computer network. The laboratory 
receives funds for its classified computing operations from two primary 
sources: (1) NNSA's Advanced Simulation and Computing program, which 
supports stockpile stewardship by providing computer simulation 
capabilities to predict weapons' performance, safety, and reliability; 
and (2) NNSA's Office of the Chief Information Officer, which is 
responsible for leading the management of NNSA's information technology 
and adequately protecting its information technology systems and 
information.[Footnote 18] 

The $433 million was used for four principal efforts: 

* High-performance computing expenditures were for purchasing costs, 
hardware and software maintenance, and facility costs to house 
supercomputers that support the nuclear weapons stockpile. 

* Classified computer network expansion expenditures were for the 
infrastructure that provides classified computing capabilities and 
includes the deployment of diskless technologies across the 
laboratory's classified computing environment.[Footnote 19] 

* Core classified cyber security program expenditures were for 
activities such as the implementation of NNSA policies and procedures, 
security plan development, perimeter protection, certification and 
accreditation, defense in depth, configuration management, and 
training. 

* Special initiatives expenditures were for the laboratory's Integrated 
Cyber Security Initiative and Multi-Platform Trusted Copy program. 
[Footnote 20] 

Figure 1 depicts LANL's annual expenditures for each of the four 
efforts from fiscal years 2001 through 2008 in constant 2009 dollars. 

Figure 1: Annual Expenditures for LANL's Classified Computer Network, 
Fiscal Years 2001 through 2008 (dollars in millions of constant 2009 
dollars): 

[Refer to PDF for image: stacked vertical bar graph] 

Fiscal year: 2001; 
Core classified Cyber Security Program: $3.19; 
Special initiatives: $1.47; 
Classified network expansion: $0; 
High-performance computing: $15; 
Total: $19.66. 

Fiscal year: 2002; 
Core classified Cyber Security Program: $10.33; 
Special initiatives: $2.68; 
Classified network expansion: $0; 
High-performance computing: $51.44; 
Total: $64.45. 

Fiscal year: 2003; 
Core classified Cyber Security Program: $8.97; 
Special initiatives: $2.23; 
Classified network expansion: $0; 
High-performance computing: $53.67; 
Total: $64.87. 

Fiscal year: 2004; 
Core classified Cyber Security Program: $5.13; 
Special initiatives: $1.57; 
Classified network expansion: $0; 
High-performance computing: $23.48; 
Total: $30.18. 

Fiscal year: 2005; 
Core classified Cyber Security Program: $4.88; 
Special initiatives: $2.48; 
Classified network expansion: $21.63; 
High-performance computing: $31.37; 
Total: $60.36. 

Fiscal year: 2006; 
Core classified Cyber Security Program: $3.49; 
Special initiatives: $2.86; 
Classified network expansion: $13.48; 
High-performance computing: $48.42; 
Total: $68.25. 

Fiscal year: 2007; 
Core classified Cyber Security Program: $4.56; 
Special initiatives: $2.91; 
Classified network expansion: $6.21; 
High-performance computing: $31.87; 
Total: $45.55. 

Fiscal year: 2008; 
Core classified Cyber Security Program: $4.45; 
Special initiatives: $2.84; 
Classified network expansion: $6.66; 
High-performance computing: $66.31; 
Total: $80.26. 

Source: GAO analysis of LANL expenditure data for the classified 
network. 

[End of figure] 

As shown in figure 1, LANL's annual expenditures for its classified 
computer network increased from about $20 million to $80 million 
between fiscal years 2001 and 2008. The largest expenditure for the 
classified computer network was for high-performance computing, which 
accounted for $322 million (or 74 percent) of total expenditures. For 
the period, expenditures for high-performance computing ranged from 
about $15 million to $66 million and included a marked reduction, more 
than 50 percent, in fiscal year 2004. This reduction occurred 
principally because of a $29 million decrease in purchasing costs, 
which resulted from the lag between procurements of the next generation 
of high-performance computers used by the laboratory. In fiscal year 
2006, high-performance computing costs significantly increased because 
LANL purchased the Roadrunner supercomputer, which provides a large 
computing resource for LANL's weapons simulations. Purchasing costs for 
this high-performance computer totaled approximately $98 million, with 
$51.5 million spent in fiscal year 2008. 

LANL began to aggressively expand the classified computer network in 
fiscal year 2005, accounting for $48 million (or 11 percent) of total 
expenditures during the fiscal year 2001 through fiscal year 2008 
period. Since every high-profile security incident at the laboratory 
involved classified removable electronic media, LANL has reduced the 
volume of this media, transferring an ever-increasing volume of 
information to the classified computer network. Expansion of the 
classified computer network initially began in fiscal year 2003, using 
the laboratory's infrastructure funds. In fiscal years 2005 and 2006, 
Congress appropriated a total of $40 million to assist in completing 
this effort. 

Expenditures for special initiatives, such as the Integrated Cyber 
Security Initiative and Multi-Platform Trusted Copy program, accounted 
for $19 million (or 4 percent) of total expenditures. These 
expenditures have remained relatively stable throughout period. 

The core classified cyber security program, which serves as the 
foundation of LANL's protection strategy for the classified cyber 
security program, accounted for $45 million (or 10 percent) of total 
expenditures over the period.[Footnote 21] However, according to a LANL 
official, expenditures for the classified cyber security program have 
fluctuated significantly because of funding allocations. 

Although total expenditures for the classified computer network 
increased from fiscal years 2001 through 2008, in the laboratory's 
view, funding for its core classified cyber security program, in 
particular, has been inadequate for implementing an effective program. 
In a September 27, 2006, letter to the NNSA Administrator, the 
directors of LANL, Lawrence Livermore National Laboratory, and Sandia 
National Laboratories stated that proposed reductions in the cyber 
security budget would expose the laboratories and NNSA to an 
unacceptable level of security and operational risk. The laboratory 
directors emphasized that the inevitable effect of cuts in cyber 
security funding would be to forgo improvements in the classified 
computing environment, while also reducing support for the unclassified 
computing networks. For example, in fiscal year 2007, LANL requested 
more than $17 million to implement its classified and unclassified 
cyber security program operations but received $15 million from NNSA. 
In fiscal year 2008, the laboratory requested $27 million but received 
$18 million from NNSA. According to LANL's analysis for fiscal years 
2007 and 2008, the impacts of failing to fully fund the laboratory's 
classified cyber security program would limit the laboratory's ability 
to: 

* provide forensics capabilities in support of the laboratory's cyber 
security incident management capabilities, 

* implement an effective inventory and patch management program, 

* integrate two-factor authentication, and: 

* integrate identity management software with computer operating 
systems. 

In 2007, DOE's Office of Independent Oversight reported that NNSA had 
not provided adequate funding for LANL's cyber security program because 
NNSA lacked a formal, risk-based process for allocating cyber security 
funds across the nuclear weapons complex. This contributed to 
weaknesses in LANL's overall cyber security program. 

According to NNSA's Chief Information Officer, funding decisions for 
cyber security programs were based on available resources and risk 
evaluations conducted complex-wide and at individual sites, including 
LANL. As part of its budget process, NNSA determined that LANL's 
request exceeded available resources and, as a result, NNSA only 
partially funded the laboratory's cyber security budget requests. 

Conclusions: 

Preventing the unauthorized disclosure of sensitive information stored 
on and transmitted over LANL's classified computer network is critical 
to national security. While the laboratory has taken steps to protect 
information on its classified computer network, a number of security 
weaknesses remain. These weaknesses include, among other things, (1) 
lack of an inventory of critical information stored on the classified 
computer network and (2) the inability to effectively monitor and 
maintain accountability for certain actions taken by individual users 
on the classified computer network. Identifying and inventorying 
documents on the classified computer network and monitoring user 
activities are essential to appropriately controlling the 
confidentiality, integrity, and availability of information stored on 
the classified computer network. Although the laboratory has taken 
steps to isolate the classified computer network from external access, 
the weaknesses we identified could be exploited by a knowledgeable 
insider, making it imperative that a number of steps be taken to 
strengthen the technical controls protecting the classified computer 
network. 

Securing information on LANL's classified computer network requires 
that the laboratory effectively establish, implement, and enforce 
security policies, procedures, and guidance. The establishment of such 
policies and procedures lay the foundation for an effective and 
sustainable cyber security culture. LANL has instituted components of a 
laboratory-wide information security program for its classified 
computer network and has successfully implemented several NNSA cyber 
security policy requirements. However, key activities, such as the 
assessment of information security risks, the enforcement of compliance 
with the laboratory's policies and procedures, and the periodic testing 
of the effectiveness of information security policies and procedures, 
were not fully implemented. Until LANL fully implements a laboratory- 
wide information security program for its classified computer network--
including establishing practices for marking the classification level 
of information stored on the network, comprehensive risk assessments, 
security plan development and testing, and a continuity of operations 
process--it has limited assurance that information on the classified 
computer network will be adequately protected. 

Regardless of the improvements the laboratory makes to strengthen the 
security controls protecting its classified computer network, the lack 
of centralized management will impede efforts to sustain improvements 
over the long term. Further, LANL cannot make these improvements on its 
own. This effort will require the laboratory to work in concert with 
its federal counterparts--NNSA and the Los Alamos Site Office--to 
enhance implementation of its cyber security objectives. Federal 
oversight must include adequate staffing, training, and resources to 
provide effective oversight and reinforce program sustainability, 
including a comprehensive review of the laboratory's implementation of 
the Compliance Order. 

Recommendations for Executive Action: 

To improve LANL's information security program for its classified 
computer network, we recommend that the Administrator for the National 
Nuclear Security Administration direct the Director of Los Alamos 
National Laboratory to take the following 12 actions: 

* Ensure that the risk assessments for systems connected to the 
classified computer network evaluate all known threats and 
vulnerabilities. 

* Ensure that cyber security policies and procedures applicable to the 
classified computer network are comprehensive and contain specific 
instructions on how to implement federal and departmental requirements. 

* Develop and implement a policy to (1) mark the classification level 
of information in documents and files stored on the classified computer 
network and (2) develop and maintain an inventory of documents and 
files stored on the network. 

* Implement specialized training requirements for all users with 
significant security-related responsibilities on the classified 
computer network. 

* Ensure that security plans for systems connected to the classified 
computer network are revised to sufficiently document technical 
security controls. 

* Strengthen the security testing and evaluation process for the 
systems connected to the classified computer network by conducting 
comprehensive vulnerability scans and expanding technical testing to 
cover new areas that might be vulnerable. 

* Ensure that plans of action and milestones include all system-and 
program-level cyber security weaknesses and required information so 
that they are an effective management tool for tracking security 
weaknesses and identifying budgetary resources needed to protect the 
classified computer network. 

* Develop comprehensive contingency plans for all computer systems 
connected to the classified computer network. 

* Annually test the contingency plans for the systems connected to the 
classified computer network to determine if the laboratory's proposed 
actions will function as intended during emergency situations. 

* Take steps to centralize security management of the classified 
computer network to enforce compliance with laboratory policies, 
procedures, and practices for each computer system connected to the 
classified computer network. 

* Develop a sustainability plan, in collaboration with NNSA, that 
details, among other things, (l) how the laboratory plans to maintain 
recent cyber security improvements, (2) how these improvements will be 
supported on a long-term basis, and (3) the resource requirements 
needed to sustain and improve on recent cyber security improvements. 

To ensure sustainability efforts are properly implemented and effective 
federal oversight is provided, we recommend that the Administrator of 
the National Nuclear Security Administration take the following 
actions: 

* Undertake a comprehensive review of federal cyber security staffing 
requirements at the Los Alamos Site Office to determine if additional 
staff is needed. Should a determination be made that additional federal 
cyber security staff is needed, actions should be taken by the Manager 
of the Los Alamos Site Office to acquire sufficient cyber security 
staff, ensure that staff receive adequate training, and maintain the 
skills necessary to perform adequate oversight and enforce compliance 
with NNSA cyber security requirements. 

* Assess LANL's sustainability capabilities 12 months after it 
implemented the Compliance Order, and periodically review LANL's 
sustainability plan in order to increase accountability for and improve 
performance of the laboratory's cyber security operations. 

In a separate classified report, we also made 21 recommendations to 
correct specific weaknesses identified. 

Agency Comments and Our Evaluation: 

In written comments on a draft of this report, the Associate 
Administrator for Management and Administration stated that NNSA 
generally agreed with the report and will provide its detailed 
corrective actions to the Committee on Energy and Commerce through its 
formal Management Decision process. The Associate Administrator also 
stated that the laboratory has shown improvement and that this change 
should be reflected in the report. However, at the time of our site 
visits, we determined that significant information security control 
weaknesses remained on LANL’s classified computer network, and although 
NNSA states the laboratory has shown improvement, we did not test these 
reported corrective actions to determine whether they effectively 
resolved the weaknesses we identified. Therefore, these reported 
actions are not reflected in this report. Furthermore, the Associate 
Administrator stated that enough time has not passed since the 
implementation of the Compliance Order to properly assess LANL’s 
sustainability measures, and requested that we add a recommendation 
directed to NNSA to assess the laboratory’s sustainability capabilities 
12 months after the laboratory implemented the Compliance Order. We 
agree that NNSA should reassess LANL’s sustainability capabilities 
given the laboratory’s historical inability to sustain information 
security improvements, and have modified our recommendation 
accordingly. NNSA’s comments on our draft report are presented in 
appendix II. In addition, NNSA provided several technical comments, 
which we have incorporated as appropriate. 

As agreed with your offices, unless you publicly announce the contents 
of this report earlier, we plan no further distribution until 30 days 
from the report date. At that time, we will send copies to the 
Secretary of Energy, the Administrator of NNSA, and the Director of 
LANL. Copies of the report will also be available to others at no 
charge on the GAO Web site at [hyperlink, http://www.gao.gov]. 

If you or your staffs have any questions about this report, please 
contact Gene Aloise at (202) 512-3841, or aloisee@gao.gov; Nabajyoti 
Barkakati at (202) 512-641 or barkakatin@gao.gov; or Gregory C. 
Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. Contact points for 
our Offices of Congressional Relations and Public Affairs may be found 
on the last page of this report. GAO staff who made major contributors 
to this report are included in appendix III. 

Signed by: 

Gene Aloise
Director, Natural Resources and the Environment: 

Signed by: 

Nabajyoti Barkakati: 
Director, Center for Technology and Engineering: 

Signed by: 

Gregory C. Wilshusen: 
Director, Information Security Issues: 

[End of section] 

Appendix I: Objectives, Scope, and Methodology: 

The objectives of our review were to (l) assess the effectiveness of 
security controls Los Alamos National Laboratory (LANL) used to protect 
information stored on and transmitted over its classified computer 
network, (2) assess whether LANL had fully implemented an information 
security program to ensure that controls were effectively established 
and maintained for its classified computer network, and (3) identify 
the expenditure of funds used to support LANL’s classified computer 
network from fiscal years 2001 through 2008. 

To determine the effectiveness of security controls that the laboratory 
had implemented for its classified computer network and to identify 
interconnectivity and key control points, we gained an understanding of 
the overall network control environment of LANL. Our evaluation is 
based on our Federal Information System Controls Audit Manual, which 
provides guidance for reviewing information system controls that affect 
the confidentiality, integrity, and availability of computerized 
information.[Footnote 22] Using National Institute of Standards and 
Technology (NIST) standards and guidance, and Department of Energy 
(DOE) and National Nuclear Security Administration (NNSA) policies, 
procedures, and standards, we focused our review on five computer 
systems connected to the classified computer network. We focused on 
these five computer systems because they are critical to the laboratory’
s achievement of its nuclear weapons missions. We performed 
vulnerability assessments on these computer systems to evaluate 
authentication and authorization controls, encryption mechanisms, 
network monitoring processes, and configuration management controls for 
the classified computer network. In addition, we obtained the views of, 
and analyzed documentation on these issues from cognizant security 
officials at DOE, NNSA, the Los Alamos Site Office, and LANL. 

To assess whether LANL had fully implemented an information security 
program to ensure that controls were effectively established and 
maintained for its classified network, we determined whether LANL’s 
security procedures and their implementation adhered to NNSA, DOE, and 
other federal guidance in areas such as risk assessment, security 
awareness training, information security plans, security testing and
evaluation, corrective action plans, and continuity of operations. 
Specifically, we: 

* reviewed LANL’s risk assessment process and risk assessments for the 
classified computer network to determine whether risks and threats were 
documented consistently with federal guidance; 

* analyzed LANL’s policies on securing information stored on 
information systems connected to the classified computer network to 
determine if they provided sufficient guidance to personnel responsible 
for security information and information systems; 

* examined training records for personnel with significant security 
responsibilities to determine if they received training commensurate 
with those responsibilities; 

* analyzed security plans for systems connected to the classified 
computer network to determine if management, operational, and technical 
controls were in place or planned and that security plans were updated; 

* analyzed security testing and evaluation results for the classified 
computer network to determine whether management, operational, and 
technical controls were tested at least annually and whether the 
controls tested were based on the risks posed if they were to fail;
* examined corrective action plans to determine whether they addressed 
vulnerabilities identified in LANL’s security testing and evaluations; 
and; 

* examined disaster recovery and contingency plans for the classified 
network to determine whether those plans had been tested or updated. 

We also met with key security representatives and officials responsible 
for information security management at DOE, NNSA, the Los Alamos Site 
Office, and LANL and discussed whether information security controls 
were in place, adequately designed, and operating effectively. In 
addition, we met with officials from DOE’s Office of independent 
Oversight, to discuss any related prior, ongoing, or planned work in 
these areas. 

To identify the expenditure of funds used to operate and support LANL’s 
classified computer network from fiscal years 2001 to 2008, we 
determined and analyzed financial data detailing classified cyber 
security program expenditures in constant 2009 dollars. We chose this 
time period because, beginning in fiscal year 2001, NNSA assumed 
programmatic responsibility for the nuclear weapons complex. In 
addition, we met with cyber security officials from NNSA, the Los 
Alamos Site Office, and LANL. To assess the reliability of expenditure 
data, we (1) reviewed existing documentation related to the data 
sources; (2) performed basic reasonableness checks of the data; and (3) 
assessed responses to a series of data reliability questions from 
responsible LANL officials related to data entry, internal control 
procedures, and the accuracy and completeness of the data. We 
determined that the data were sufficiently reliable for the purposes of 
this report. 

We conducted this performance audit from November 2008 to July 2009 in 
accordance with generally accepted government auditing standards. Those 
standards require that we plan and perform the audit to obtain 
sufficient, appropriate evidence to provide a reasonable basis for our 
findings and conclusions based on our audit objectives. We believe that 
the evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives. 

[End of section] 

Appendix II: Comments from the National Nuclear Security 
Administration: 

Department of Energy: 
National Nuclear Security Administration: 
Washington, DC 20585: 

October 2, 2009: 

Gregory C. Wilshusen: 
Director, Information Security Issues: 
Government Accountability Office: 
Washington, D.C. 20548: 

Dear Mr. Wilshusen: 

The National Nuclear Security Administration (NNSA) appreciates the 
opportunity to review the Government Accountability Office's (GAO) 
draft report, GAO-10-28, Information Security: Actions Needed to Better 
Manage, Protect, and Sustain Los Alamos National Laboratory's 
Classified Computer Network. This is a series of reports requested by 
the House Committee on Energy and Commerce to determine the issues 
associated with the Los Alamos National Laboratory's (LANL) cyber 
security program. We understand that this report is the public version 
to the classified report that GAO issued in July 2009. 

NNSA generally agrees with the report. However, we believe that LANL 
has shown improvement and this change should be reflected in the 
report. During the GAO evaluation of the Los Alamos National 
Laboratory's classified computer infrastructure, it was noted by GAO 
that a number of weaknesses remain in LANL's ability to provide 
confidentiality, integrity, and availability of information stored on 
and transmitted over its infrastructure. Many of these weaknesses had 
already been identify by NNSA Headquarters, Los Alamos Site Office and 
LANL during their implementation of the Secretary Compliance of 
Energy's Order issued in FY 2007. To the LANL's credit, during the 
implementation of the Compliance Order a number of key technical issues 
and policy implementation concerns have been or are currently being 
address with Correction Action Plans. Although LANL capability to 
sustain security improvements over the long-term has been in question 
in the past, there has not been enough time to measure sustainability 
after the implementation of the Compliance Order to determine if the 
problem has been resolved. We believe it would be helpful if GAO would 
recommend to NNSA leadership that 12 months after the implementation of 
the Compliance Order, NNSA should again assess LANL sustainability 
capability. Enclosed are further comments for your consideration. 

Because of the extent of the recommendations contained in this draft 
report, NNSA will provide its detailed corrective actions to the 
Committee on Energy and Commerce through our formal Management Decision 
process. Los Alamos has made significant progress in correcting the 
issues you identified and most actions have been completed. 

NNSA continues to exercise its leadership to correct deficiencies noted 
and to implement a dynamic framework of controls and processes that can 
be implemented complex-wide. These processes and controls will provide 
a level of confidence that NNSA is successfully managing risk. 

Should you have any questions about this response, please contact 
JoAnne Parker, Acting Director, Policy and Internal Controls Management 
at 202-586-1913. 

Sincerely, 

Signed by: 
Michael C. Kane: 
Associate Administrator for Management and Administration: 

Enclosure: 

[End of section] 

Appendix III: GAO Contacts and Staff Acknowledgments: 

GAO Contacts: 
Gene Aloise, (202) 512-3841 or aloisee@gao.gov. 

Nabajyoti Barkakati, (202) 512-6412 or barkakatin@gao.gov. 

Gregory C. Wilshusen, (202) 512-6244 or wilshuseng@gao.gov. 

Staff Acknowledgments: 

In addition to the individuals named above, Glen Levis; Jeffrey Knott; 
Edward M. Glagola, Jr.; Duc Ngo; Harold Lewis (Assistant Directors); 
Preston S. Heard; Jennifer R. Franks; John A. Spence; and Eugene 
Stevens were key contributors to this report. Allison B. Bawden, Omari 
Norman, Rebecca Shea, and Carol Hermstadt Shulman also made key 
contributions to this report. 

[End of section] 

Footnotes: 

[1] LANL, a multidisciplinary national security laboratory, conducts 
some of the nation’s most sensitive activities, including designing, 
producing, and maintaining the nation’s nuclear weapons; conducting 
efforts for other military or national security applications; and 
performing research and development in advanced technologies for 
potential defense applications. The laboratory covers 40 square miles, 
with 2,700 buildings covering 9.4 million square feet; employs more 
than 12,000 personnel; and has an annual operating budget of about $2 
billion, with about $1.5 billion devoted to nuclear weapons work. 

[2] Los Alamos National Security, LLC (LANS) is a consortium of 
contractors that includes Bechtel National Inc.; the University of 
California; the Babcock and Wilcox Company; and the Washington Division 
of URS. In June 2006 LANS replaced the University of California, which 
had been the exclusive management and operating contractor of LANL 
since the 1940s. 

[3] National Nuclear Security Administration (NNSA) was established in 
2000 in response to management difficulties with DOE’s nuclear weapons 
programs. These difficulties included security programs at the 
department’s national laboratories and significant cost overruns in the 
management of projects. NNSA is a separately organized agency within 
DOE and is responsible for the nation’s nuclear weapons, 
nonproliferation, and naval reactors programs. 

[4] The Nuclear Emergency Search Team provides technical capabilities 
to respond to potential and actual nuclear and radiological threats and 
incidents. See GAO, Combating Nuclear Terrorism: Federal Efforts to 
Respond to Nuclear and Radiological Threats and to Protect Emergency 
Response Capabilities Could be Strengthened, [hyperlink, 
http://www.gao.gov/products/GAO-06-1015] (Washington, D.C.: Sept. 21, 
2006). 

[5] Investigations revealed that management deficiencies of both 
contractors were a central contributing factor in a laboratory 
subcontractor employees unauthorized reproduction and removal of 
classified matter from the site. 

[6] The Secretary of Energy has authority under 10 C.F.R. 824.4(b) of 
DOE’s Procedural Rules for the Assessment of Civil Penalties for 
Classified Information Security Violations to issue compliance orders 
that direct management and operating contractors to take specific 
actions to remediate deficiencies that contributed to security 
violations. The July 2007 Compliance Order directed LANS to correct 
management deficiencies that contributed to the October 2006 incident 
and address long-standing deficiencies in the laboratory’s classified 
information and cyber security programs by December 2008. Violation of 
the Compliance Order would subject LANS to civil penalties of up to 
$100,000 per violation per day until compliance was reached. In January 
2009, NNSA’s Los Alamos Site Office formally validated that LANL 
successfully implemented all actions required by the Compliance Order 
in a timely manner and no additional civil penalties were levied. 

[7] GAO, Information Security: Actions Needed to Better Manage, 
Protect, and Sustain Improvements to Los Alamos National Laboratory’s 
Classified Computer Network, [hyperlink, 
http://www.gao.gov/products/GAO-09-745C] (Washington, D.C.: July 24, 
2009). 

[8] In the absence of nuclear testing, NNSA’s Stockpile Stewardship 
Program was established to ensure that nuclear warheads and bombs in 
the U.S. nuclear weapons arsenal are safe, secure, and reliable. This 
effort uses several approaches, including test data and computer 
modeling, to detect any potential problems with nuclear weapons that 
affect their performance. 

[9] The Secret-Restricted Data classification level generally protects 
nuclear weapon design information. Sigma categories provide additional 
need-to-know protections related to Restricted Data concerning the 
theory, design, manufacture, storage, characteristics, performance, 
effects, or use of nuclear weapons, nuclear weapon components, or 
nuclear explosive devices or materials. Sigma 14 or Top Secret data are 
not allowed to be received, processed, or stored on the laboratory’s 
classified computer network. In addition, individuals that have access 
privileges to this type of information must possess the appropriate 
security clearances. 

[10] For the purposes of this report, we are including LANL’s 
classified cyber and computer network security programs as a key 
component of the laboratory’s overall information security program. 

[11] GAO, Information Security: Actions Needed to Better Protect Los 
Alamos National Laboratory’s Unclassified Computer Network, [hyperlink, 
http://www.gao.gov/products/GAO-08-1001] (Washington, D.C.: Sept. 9, 
2008) and GAO, Information Security: Actions Needed to Better Protect 
Los Alamos National Laboratory’s Unclassified Computer Network, GAO-08-
961SU (Washington, D.C.: Sept. 9, 2008). 

[12] FISMA was enacted as title III, E-Government Act of 2002, Pub. L. 
No. 107-347, 116 Stat. 2946 (Dec. 17, 2002). 

[13] Privileged users may include system administrators, cyber security 
officers, and line managers responsible for security. 

[14] GAO, Information Security Management: Learning from Leading 
Organizations, [hyperlink, http://www.gao.gov/products/GAO-AIMD-98-68] 
(Washington, D.C.: May 1998). 

[15] LANL’s Office of the Chief Information Officer cyber security 
group is responsible for security policies and program management. 

[16] GAO, Los Alamos National Laboratory: Long-Term Strategies Needed 
to Improve Security and Management Oversight, [hyperlink, 
http://www.gao.gov/products/GAO-08-694] (Washington, D.C.: June 13, 
2008). 

[17] GAO, National Nuclear Security Administration: Additional Actions 
Needed to Improve Management of the Nation’s Nuclear Programs, 
[hyperlink, http://www.gao.gov/products/GAO-07-36] (Washington, D.C.: 
Jan. 19, 2007). 

[18] Part of NNSA’s mission to ensure the safety and reliability of the 
nuclear weapons stockpile, the Advanced Simulation and Computing 
program was established in 1995 to help shift from test-based 
certification of weapons in the nuclear stockpile to a simulation-based 
certification effort. The Advanced Simulation and Computing program 
provides supercomputing capabilities that run multi-dimensional codes 
to simulate all the physics involved in a nuclear detonation. These 
capabilities allow researchers to integrate past weapons test data, 
materials, studies, and current experimental data in simulations of 
unprecedented size. These capabilities leverage the computing expertise 
and resources of the three NNSA nuclear weapons laboratories (Los 
Alamos, Sandia, and Lawrence Livermore) and enable weapons scientists 
and engineers to gain a comprehensive understanding of the weapons’ 
entire life cycle. 

[19] LANL’s classified computer network initially serviced a very 
specific area within the laboratory’s boundaries, but because of the 
need to reduce the use of classified removable electronic media, such 
as compact disks and removable hard drives, the network was expanded 
across the laboratory’s geographic area. 

[20] The Integrated Cyber Security Initiative provides a secure network 
infrastructure to support NNSA’s scientific, business, and engineering 
efforts related to the nuclear weapons stockpile. The Multi-Platform 
Trusted Copy is a cyber security software application that is used to 
sanitize documents for hidden, classified, or sensitive data before 
they are released to the public. 

[21] According to LANL officials, expenditures for classified cyber 
security program management—such as NNSA policy implementation 
planning, local policy development, self-assessments, and the 
development of corrective action plans in response to internal and 
external audits—were not included in the total expenditures because 
they could not differentiate between the amount of funds expended for 
the laboratory’s classified and unclassified computer networks. The 
inability to differentiate between the amount of funds spent for 
classified and unclassified computer network protection makes it 
difficult to report on the actual amount of funds spent to protect the 
laboratory’s classified computer network. 

[22] GAO, Federal Information System Controls Audit Manual, [hyperlink, 
http://www.gao.gov/products/GAO-09-232G] (Washington, D.C.: February 
2009). 

[End of section] 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "E-mail Updates." 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s Web site, 
[hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional 
information. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: