Users continue to compromise federal computer networks, says tech community

More than half of government IT professionals know of violations in security protocols, according to a recent survey. Funding challenges hinder agencies' ability to put proper security measures in place, while lack of systems and requirements standardization creates confusion in the market, said an industry official.

Of 474 federal IT professionals, 56 percent reported witnessing or hearing about a security violation, according to a survey by Washington-based research firm Pursuant on behalf of Quest Software Public Sector. The nature of violations vary depending on the requirements of the agency, but could include improper access to an application, or failing to encrypt data downloaded to a mobile device. Identity management solutions can help prevent violations, but only if properly and fully implemented.

"Beyond technology, there has to be operational processes in place to secure information," said Paul Garver, Quest Software's public sector vice president. "Education is hugely important. [Agencies can't] just do this to meet requirements of HSPD 12 [Homeland Security Presidential Directive] ," the 2004 directive issued by the Office of Management and Budget that requires new identity cards to replace the standard employee flash-card badges by Oct. 27. The credentials, which include biometric information such as fingerprints, will provide a common identification standard to allow employees and contractors to access federal buildings and computer networks securely. However, specifications are not in place for monitoring information users access once inside.

While mandates like HSPD 12 drive identity management solutions in agencies -- 45 percent of survey respondents confirmed that their agencies already have an identity management system -- results show that various agency requirements blunt impact. More than 50 percent of respondents reported that a heterogeneous application environment that includes Microsoft Windows, as well as Linux and Unix for example, creates challenges in information security efforts because centralized identity management becomes more complex.

"There's a lot of work to do," said Scott Hastings, a partner at the federal IT consulting firm Deep Water Point and former chief information officer for the U.S. Visitor and Immigrant Status Indicator Technology Program Management Office. "Frankly, I don't think we've done a good job nailing down what's in the box," in terms of software. At the same time, he said, different agencies implement different requirements. "There are a lot of definitions for identity management. Up to this point, agencies have just reacted to an OMB advisory. But it doesn't seem like anyone has really decided how best to [protect information]; what's the expectation?"

Growth in the identity management market is expected, driven by high-profile security breaches and government mandates like HSPD 12, the 2002 Federal Information Security Management Act, and the Federal Information Processing Standards Publication 201, which specifies personal identity verification requirements for federal employees and contractors. According to the survey, 69 percent of respondents believed the identity market was very important to their organization or agency, and 72 percent expected identity management to grow in importance in the next five years. Lack of funding stood as the primary obstacle to implementing security measures, according to 31 percent of respondents. Insufficient staffing resources and technology complexity also posed challenges.

"This survey is a baseline, before the big wave and people start paying more attention," Hastings said. "It will be interesting next year, with the change of administration and probably a whole bunch more publicity around some of the threats we've been dealing with. This is an issue that will be huge. People are searching for how to attack this."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care


When you download a report, your information may be shared with the underwriters of that document.