Skip to main content

Nuclear Security: Los Alamos National Laboratory Faces Challenges In Sustaining Physical and Cyber Security Improvements

GAO-08-1180T Published: Sep 25, 2008. Publicly Released: Sep 25, 2008.
Jump To:
Skip to Highlights

Highlights

Los Alamos National Laboratory (LANL) is one of three National Nuclear Security Administration (NNSA) laboratories that designs and develops nuclear weapons for the U.S. stockpile. LANL employees rely on sensitive and classified information and assets that are protected at different levels, depending on the risks posed if they were lost, stolen, or otherwise compromised. However, LANL has experienced several significant security breaches during the past decade. This testimony provides GAO's (1) views on physical security at LANL, as discussed in Los Alamos National Laboratory: Long-Term Strategies Needed to Improve Security and Management Oversight, GAO-08-694 (June 13, 2008); (2) preliminary observations on physical security at Lawrence Livermore National Laboratory; and (3) views on cyber security at LANL as discussed in Information Security: Actions Needed to Better Protect Los Alamos National Laboratory's Unclassified Computer Network, GAO-08-1001 (Sept. 9, 2008). To conduct this work, GAO analyzed data, reviewed policies and procedures, interviewed laboratory officials, and conducted site visits to the two laboratories.

Full Report

Media Inquiries

Sarah Kaczmarek
Managing Director
Office of Public Affairs

Topics

Access controlAccess control listAgency missionsClassified informationComputer networksComputer securityComputer security policiesConfidential communicationsCyber securityData collectionData destructionFacility securityInformation managementInformation securityInformation security managementInformation security regulationsInformation technologyInternal controlsMission essential operationsPerformance measuresPhysical securityPolicy evaluationProgram evaluationProgram managementRisk assessmentRisk managementSecurity assessmentsSecurity policiesSecurity regulationsSecurity threatsStrategic planningSystem vulnerabilitiesCorrective actionPolicies and proceduresProgram goals or objectivesProgram implementation