Independent Evaluation of DNFSB’s Implementation of the Federal Information Security Modernization Act of 2014 For Fiscal Year 2019
Report Information
Recommendations
Implement procedures and define roles for reviewing configuration change activities to the DNFSB information system production environment by those with privileged access to verify the activity was approved by the system CCB and executed appropriately
Complete and document a risk-based justification for not implementing an automated solution (e.g. Splunk) to help maintain an up-to-date, complete, accurate, and readily available view of the security configurations for all information system components connected to the organization’s network.
Continue efforts to meet milestones of the DNFSB ICAM Strategy necessary for fully transitioning to DNFSB’s “to-be" ICAM architecture.
OIG Analysis: The OIG confirmed that the agency has met the milestones of the DNFSB ICAM Strategy necessary for fully transitioning to DNFSB’s “to-be" ICAM architecture. Hence, this recommendation is now closed.<br />
<br />
Status: Open: Resolved. DNFSB continues to implement its zero-trust architecture, which encompasses the majority of DNFSB’s “to-be” ICAM infrastructure. Without guidance on what specific additional actions the OIG feels need to be taken, the DNFSB cannot close out this recommendation.
Complete current efforts to refine existing monitoring andassessment procedures to more effectively support ongoingauthorization of the DNFSB system.
Identify and fully define requirements for the incident response technologies DNFSB plans to utilize in the specified areas and how these technologies respond to detected threats (e.g. cross-site scripting, phishing attempts, etc.).