Independent Evaluation of the DNFSB’S Implementation of the Federal Information Security Modernization Act of 2014 for FY 2021
Report Information
Recommendations
Integrate the Configuration management plan with risk management and continuous monitoring programs and utilize lessons learned to make improvements to this plan.
Implement automated mechanisms (e.g., machine-based, or user-based enforcement) to support the management of privileged accounts, including for the automatic removal/disabling of temporary, emergency, and inactive accounts, as appropriate.
Continue efforts to implement data loss prevention functionality for the Microsoft Office 365 environment.
Update agency strategic planning documents to include clear milestones for implementing strong authentication, the Federal ICAM architecture and OMB M-19-17, and phase 2 of DHS's Continuous Diagnostics and Mitigation (CDM) program.
<br />
Agency Response Dated February 27, 2025: DNFSB published its Enterprise Architecture that includes the agency’s “to-be” ICAM architecture in December 2024 and published OP 411.1-7, Identification and Authentication Operating Procedures in September 2024.<br />
OIG Analysis: The OIG reviewed the evidence and concluded that it is not sufficient to show corrective actions have been taken to address this recommendation. The OIG will close this recommendation when the DNFSB provides evidence demonstrating the clear milestones for implementing strong authentication, Federal ICAM, OMB M-19-17, and CDM Phase 2, and actions taken by the agency to support the achievement of these requirements and CDM Phase 2.<br />
<br />
Status: Open: Resolved. DNFSB has defined clear milestones for implementing strong authentication in “Pillar I – Identity” of its Zero Trust Architecture Implementation Plan. DNFSB currently participates in DHS/CISA’s CDM Shared Service offering (DEFEND F) and has already implemented all of the available capabilities (hardware asset management, software asset management, configuration settings management, vulnerability management, enterprise mobility management, and endpoint detection & response) and is participating with CDM IDAM capabilities as they are being developed and plan to implement them when they become available. DNFSB requests clarification from the OIG regarding what additional actions need to be taken to close this recommendation.
Conduct the agency’s annual breach response plan exercise for FY 2021.