General Controls Over The Standard Accounting, Budgeting .

Transcription

Report No. D-2008-101June 6, 2008General Controls Over the StandardAccounting, Budgeting, and ReportingSystem (SABRS)

Additional CopiesTo obtain additional copies of this report, visit the Web site of the Department ofDefense Inspector General at http://www.dodig.mil/audit/reports or contact theSecondary Reports Distribution Unit at (703) 604-8937 (DSN 664-8937) or fax(703) 604-8932.Suggestions for Future AuditsTo suggest ideas for or to request future audits, contact the Office of the DeputyInspector General for Auditing at (703) 604-9142 (DSN 664-9142) or fax (703)604-8932. Ideas and requests can also be mailed to:ODIG-AUD (ATTN: Audit Suggestions)Department of Defense Inspector General400 Army Navy Drive (Room 801)Arlington, VA PMOSABRSTASOUSMCChief Information OfficeDefense Finance and Accounting ServiceDefense Information Systems AgencyDepartment of Defense Information Technology SecurityCertification and Accreditation ProcessFederal Information Security Management ActInformation TechnologyNational Institute of Standards and TechnologyOffice of Management and BudgetProgram Management OfficeStandard Accounting, Budgeting, and Reporting SystemTerminal Area Security OfficerUnited States Marine Corps

INSPECTOR GENERALDEPARTMENT OF DEFENSE400 ARMY NAVY DRIVEARLINGTON, VIRGINIA 22202-4704June 6,2008MEMORANDUM FOR DIRECTOR, DEFENSE FINANCE AND ACCOUNTINGSERVICENAVAL INSPECTOR GENERALASSISTANT DEPUTY COMMANDANT FOR PROGRAMS ANDRESOURCES (FISCAL), UNITED STATES MARINE CORPSSUBJECT: General Controls Over the Standard Accounting, Budgeting, and ReportingSystem (SABRS) (Report No. D-2008-101)Weare providing this report for review and comment. We considered comments fromthe Defense Finance and Accounting Service when preparing the final report.DoD Directive 7650.3 requires that all recommendations be resolved promptly. TheDefense Finance and Accounting Service comments were partially responsive. We requestadditional comments on Recommendations A.1.a, A.1.d, A.2.a, A.2.b, A.2.d, A.2.e, B.1.a,B.1.b, B.2.b, B.2.c, B.2.d, B.2.e., B.2.f, B.3, B.4.b, and C. Therefore, we request that theChief Information Officer, Defense Finance and Accounting Service provide comments byJuly 7,2008.If possible, please send management comments in electronic format (Adobe Acrobatfile only) to AudDFS@dodig.mii. Copies of the management comments must contain theactual signature of the authorizing official. We cannot accept the / Signed / symbol in place ofthe actual signature. If you arrange to send classified comments electronically, they must besent over the SECRET Internet Protocol Router Network (SIPRNET).We appreciate the courtesies extended to the staff. Questions should be directed toEdward A. Blair at (216) 706-0074 ext. 226 or Ms. Cecelia M. Ball at (816) 926-8501 ext. 222(DSN 465-8501). The team members are listed inside the back cover. See Appendix C forthe report distribution. a,!r) Patricia A. Marsh, CPAAssistant Inspector GeneralDefense Financial Auditing Service

Department of Defense Office of Inspector GeneralReport No. D-2008-101June 6, 2008(Project No. D2006-D000FC-0068.000)General Controls Over the Standard Accounting,Budgeting, and Reporting System (SABRS)Executive SummaryWho Should Read This Report and Why? DoD personnel who manage and use theStandard Accounting, Budgeting, and Reporting System (SABRS) should read thisreport. This report discusses whether the SABRS general controls were adequatelydesigned and operating effectively.Background. SABRS is the accounting system used by the Defense Finance andAccounting Service Kansas City to standardize accounting, budgeting, and reportingprocedures for the United States Marine Corps (USMC) general fund. The USMCreported 27,155 million in assets and 2,255 million in liabilities on its FY 2006Balance Sheet. This audit was conducted to determine whether the Defense Finance andAccounting Service Kansas City ensures general control standards issued by the Office ofManagement and Budget, the National Institute of Standards and Technology, and DoDwere implemented and operating effectively for SABRS.Results. Controls over SABRS security management and operations are ineffectivebecause the Defense Finance and Accounting Service Chief Information Officer did notassign clear security responsibilities to the SABRS Program Management Office(finding A), the SABRS Program Management Office did not provide assurance thatSABRS security was effective because it did not coordinate with all responsible parties(finding B), and Defense Finance and Accounting Service Accounting Services-MarineCorps and Defense Information Systems Agency did not have an approved Service LevelAgreement because Defense Finance and Accounting Service did not sufficientlycoordinate with the Defense Information Systems Agency to complete the approvalprocess (finding C). See the Findings section of the report for the detailedrecommendations.Management Comments. The Director, Information and Technology, Defense Financeand Accounting Service concurred with all recommendations except one. We consideredsome corrective actions responsive to the intent of the recommendations. No furthercomments are required for those recommendations. We reiterated otherrecommendations to the Chief Information Office, Defense Finance and AccountingService and the Program Management Office because comments were nonresponsive andpartially responsive.

We request that the Chief Information Office, Defense Finance and Accounting Serviceand the Program Management Office comment on the final report by July 7, 2008. Seethe Findings section of the report for a discussion of management comments and theManagement Comments section of the report for the complete text of the comments.ii

Table of ContentsExecutive SummaryiBackground1Objectives2FindingsA. Standard Accounting, Budgeting, and Reporting System SecurityManagementB. Program Management Office Security CoordinationC. Defense Finance and Accounting Service and Defense InformationSystems Agency Service Level Agreement31522AppendixesA. Scope and MethodologyB. Security Plan ComparisonC. Report Distribution242632Management CommentsDefense Finance and Accounting Service35

BackgroundThe Chief Financial Officers Act of 1990 (Public Law 101-576), as amended,mandates that agencies prepare and conduct audits of financial statements. UnderSecretary of Defense (Comptroller) guidance implementing the Chief FinancialOfficers Act of 1990, as amended, requires the United States Marine Corps(USMC) complete stand-alone General Fund and Working Capital Fund financialstatements.The Defense Finance and Accounting Service (DFAS) Kansas City is responsiblefor reporting the USMC financial statement data to the Department of the Navy.These financial statement data are ultimately included in the DoD consolidatedfinancial statements. The USMC relies on DFAS Kansas City’s assurancesregarding the controls used to prepare the USMC financial reports and itsfinancial statements. The USMC reported 27,155 million in assets and 2,255 million in liabilities on its FY 2006 Balance Sheet.The Standard Accounting, Budgeting, and Reporting System (SABRS) is acomputer-based information system designed to standardize accounting,budgeting, and reporting procedures for all general funds accounted for by theUSMC. SABRS produces general data to support automated and auditablefinancial statements. It facilitates the preparation of financial statements andother financial reports in accordance with Federal accounting and reportingstandards.DFAS Kansas City, Accounting Systems Branch owns and manages SABRS. Asthe owner, it is required to review and maintain the SABRS security policy. TheUSMC Fiscal Director is the functional sponsor. As a functional sponsor, USMCuses SABRS to record and account for financial data that it owns and processes.DFAS Technology Service Organization developed and maintains the SABRSsystem. The System Management Center, Mechanicsburg, Pennsylvania,provides SABRS processing support, and the System Management Center, St.Louis, Missouri, provides SABRS hardware support.Federal agencies, Congress, and the public rely on computer-based informationsystems to provide data about agency programs, manage Federal resources, andreport program costs and benefits. The Federal Information SecurityManagement Act of 2002 (FISMA) assigns specific responsibilities to Federalagencies, the National Institute of Standards and Technology (NIST), and theOffice of Management and Budget (OMB) to strengthen information systemsecurity.FISMA requires the head of each agency to implement policies and procedures tocost-effectively reduce Information Technology (IT) security risks to an1

acceptable level. Additionally, the head of each agency is to appoint a ChiefInformation Officer (CIO) responsible for developing and maintaining anagency-wide information security program. Agency-wide information securityprograms should include subordinate plans for providing adequate informationsecurity for networks, facilities, and systems or groups of information systems, asappropriate. The DFAS CIO has tasked the SABRS PMO with ensuring adequateinformation security for SABRS.FISMA directs NIST to develop IT security standards and guidelines and directseach agency to implement an information security program. FISMA requires thatthe OMB oversee IT security policies and practices across all Federal agencies.NIST works collaboratively with OMB to develop standards and guidelines toachieve cost-effective security and privacy of sensitive information in Federalcomputer systems. Agencies, like DFAS, must follow NIST standards andguidance for non-national security programs and systems.The Office of the Assistant Secretary of Defense directed the Defense-WideInformation Systems Security Program to create standardized requirements andprocesses for accreditation of computers, systems, and networks. DoDInstruction 5200.40 established the DoD Information Technology SecurityCertification and Accreditation Process (DITSCAP). The DITSCAP Manual(DoD 8510.1-M) presents the detailed requirements for completing thecertification and accreditation process.Computer-related controls help ensure the reliability, confidentiality, andavailability of automated information. General controls are the policies andprocedures that apply to an entity’s information systems and help ensure theirproper operation. Primary objectives for general controls include safeguardingdata, protecting computer application programs, preventing system software fromunauthorized access, and ensuring continued computer operations in case ofunexpected interruptions. The effectiveness of general controls is a significantfactor in determining the effectiveness of application controls. Without effectivegeneral controls, application controls may be rendered ineffective bycircumvention or modification. General and application controls become morecritical when functions are transferred to other DFAS locations as DFAS KansasCity is scheduled to close under the Base Realignment and Closure.ObjectivesOur overall audit objective was to assess the integrity, confidentiality, andavailability of data reported by SABRS. Specifically, we determined whether thegeneral controls over SABRS were adequate. We did not evaluate the application2

controls over SABRS because of the lack of general controls identified. SeeAppendix A for a discussion of the scope and methodology.3

A. Standard Accounting, Budgeting, andReporting System SecurityManagementControls over SABRS security management and operations wereineffective because the CIO did not assign clear security responsibilities tothe Program Management Office (PMO). Specifically: the SABRS security management structure did not ensureproper segregation of duties and security responsibilities; the CIO did not clearly delegate the authority and duty toresponsible parties to develop approved policies andprocedures for SABRS IT security operations; the CIO did not clearly assign an office the responsibility forthe IT security and control requirements; and software waivers and license agreements were not maintainedto assure personnel that only authorized software was loadedon computers which can be used to access SABRS.Ineffective controls over SABRS security management and operationsincrease the vulnerability of SABRS IT resources and are detrimental toan effective information security program.Proper Segregation of Duties and ResponsibilityThe SABRS security management structure lacks proper segregation of duties andsecurity responsibilities. The CIO did not ensure that the Terminal Area SecurityOfficer (TASO) duties were independent from operations. The CIO did notinclude clear security responsibilities in the PMO personnel job expectations.TASO Segregation of Duties. TASOs create and assign user IDs and set userprivileges for SABRS. TASOs report to DFAS operations instead of to a separateDFAS office. The current reporting hierarchy has TASOs reporting to DFASoperations instead of to a separate function outside of operations. DFASattempted to segregate duties when it moved PMO reporting to the CIO, but theTASOs, who had reported to the PMO, remained in DFAS operations. Thisstructure allows security controls to be circumvented to provide certain servicesto customers, including to USMC. For example, TASOs can grant access rights4

to personnel that allow them to bypass or change security controls. NIST advisesthat computer security embedded in operations lacks independence, has minimalauthority, receives little management attention, and has few resources.Assigned Security Responsibilities. We reviewed the performance plans for thePMO personnel to determine each employee’s specific security responsibilities.The performance plans for PMO personnel did not have security responsibilitiesincluded as part of their job expectations from the CIO. According to NIST, theassignment of security responsibilities should be in writing to ensure that asystem’s application has adequate security. It would be appropriate to useperformance plans to formally communicate the security responsibilities to PMOpersonnel.Security Policies and ProceduresControls over SABRS security management and operations are ineffectivebecause the CIO did not clearly delegate the authority and duty to responsibleparties to develop approved policies and procedures for SABRS IT securityoperations. Policies and procedures did not exist or were not formally approvedfor access authorizations, periodic reviews of access authorizations, and dataencryption. Management’s requirements or actual intent is not known and cannotbe enforced if the policies and procedures have not been formally approved.Access Authorizations. The PMO, as a component of the CIO, provided deskprocedures, but not formal policies, for granting system access authorizations.The desk procedures were not properly approved by DFAS management.According to NIST, approved policies are needed to provide sufficientinformation or direction to be used in establishing an access control list. Inaddition, the Government Accountability Office Federal Information SystemControls Audit Manual states management is responsible for developing thedetailed policies, procedures, and practices to fit an agency’s operations.Management should also ensure these policies are built into and are an integralpart of IT security operations. Documented and approved access control policieswill make these operations substantially easier to follow and will improve systemaccess control.Periodic Reviews of Access Authorizations. The PMO, as a component of theCIO, provided desk procedures, but not formal policies, for periodic reviews ofaccess authorizations. The desk procedures were not properly approved by DFASmanagement, and they did not provide for periodic review of access rights foreach user. According to NIST, it is necessary to periodically review useraccounts on a system to ensure proper authorizations and manage system access.Application managers (and data owners, if different) should review all access5

levels of all application users every month and sign a formal access approval list,which will provide a written record of the approvals. The PMO is often the onlyindividual in a position to know current access requirements.Informal policies and procedures lack the weight of authority provided by thewritten approval of a senior management official, the CIO. Managementofficials’ approval provides clear evidence to employees and contractors thatmanagement is in agreement with the stated policies and procedures and thatadherence is required.Effective administration of users' access is essential to maintaining systemsecurity. User account management focuses on identification, authentication, andaccess authorizations. This process should include periodic verification of useraccounts and access authorizations. User accounts must also be timely changedfor modification or removal of access and associated issues for employees whoare reassigned, promoted, terminated, or who retire.Data Encryption. The PMO, as a component of the CIO, could not identify itsdata encryption procedures. PMO personnel stated encryption is not under theirdirect control so they do not believe they need to know this information.According to NIST, an organization should use encryption to protect theconfidentiality of remote access sessions. During our audit, NIST was updated(December 2006); however, the requirement to use encryption did not change andstill applies. The requirements for encryption and remote access policies arecritical because they address the security of data transmission. The PMO hasprimary responsibility for the security of SABRS. It should be aware of theencryption used for their application.SABRS Security and Control RequirementsControls over SABRS security management and operations are ineffectivebecause the CIO did not clearly assign responsibility for the IT security andcontrol requirements. Specifically, the SABRS security environment did notinclude: a complete risk assessment; an adequate security plan, also called a System Security AuthorizationAgreement; identification of information and resources critical to the operations ofSABRS in its contingency plan;6

implementation of intrusion detection and incident responseprocedures; and assurance that users completed required security awareness training.Risk Assessments. The PMO, as a component of the CIO, did not complete arequired risk assessment because the CIO did not clearly assign securityresponsibilities to the PMO. Although the PMO identified some potential risks, itdid not perform a risk assessment of natural threats or rank the probability ofidentified threats occurring, as required by NIST, OMB, and DoD Instructions.“Department of Defense Information Technology Security Certification andAccreditation Process (DITSCAP) Application Manual,” July 31, 2000, states:The SSAA 1 should clearly state the nature of the threat that is expectedand wherever possible, the expected frequency of occurrence. Genericthreat information is available but it must be adapted to clearly state theexpected threats to be encountered by the system. DITSCAP alsorequires the risk analysis to identify appropriate cost-effectivecountermeasures to mitigate the risk.The PMO did not adequately complete the risk assessment and, therefore, did notinclude appropriate countermeasures in its security plan. DoD Instruction 8500.2requires agencies to ensure that DoD Component-owned or controlled DoDinformation systems are assessed for information assurance vulnerabilities on aregular basis, and that appropriate information assurance solutions areimplemented to eliminate or otherwise mitigate identified vulnerabilities.Without adequate risk assessments and appropriate countermeasures, the SABRSapplication could be at risk for a security event (for example, flood, loss of power,or intrusion) to occur that cannot be promptly mitigated. Ultimately, SABRScould be unable to perform its mission of financial accounting and reporting forthe USMC.Security Plans. Although the PMO prepared a security plan for SABRS, it didnot conform to NIST, OMB, and DITSCAP standards. Of the 65 sections in the2003 security plan, 26 sections did not comply with standards; of 65 sections forthe 2006 security plan, 27 did not comply with standards. Specific areas ofnoncompliance are listed in Appendix B. In addition, the 2003 security plan wasout of date. A major modification to SABRS was completed in October 2005, butthe PMO waited until May 2006 to update the security plan. This met the 3-yearminimum update, but it did not meet the NIST requirement to update the securityplan when a major modification was completed on the system. Managementauthorizes a system to process information or to operate based on the security1The SSAA (System Security Authorization Agreement) is the Security Plan.7

plan when completing the certification and authorization process. Authorizing asystem to process information provides an important quality control, and, byauthorizing processing in a system, the manager accepts its associated risks.Because the security plan for SABRS was not up to date, management may beunaware of the risks they are accepting within SABRS when certification andauthorization is completed.Contingency Planning. The SABRS contingency plan did not define theinformation resources criticality in accordance with NIST guidance and DoDInstruction 8500.2. Both standards require the identification of mission andbusiness essential functions for priority restoration planning along with all assetssupporting mission or business essential functions.The PMO provided the contingency plan and results of testing performed. Thecriticality of data and business essential functions were not identified as part ofthe plan. Contingency plan testing identified the users’ inability to obtain remoteaccess to the contingency site. Remotely accessing the contingency site could becritical during an emergency or system disruption.Intrusion Detection and Incident Response Procedures. The PMO, as acomponent of the CIO, provided policies and procedures to employees forreporting intrusions; however, the policies and procedures did not address howmonitoring within SABRS detects security violations. NIST recommends abaseline level of logging and auditing on all systems. That is, all systems shouldhave a minimum level of recording and reviewing of all system activity.Furthermore, NIST recommends all critical systems have a higher baseline level.The logs frequently provide value during incident analysis, particularly if auditingis enabled. The PMO did not have procedures established for monitoring,through logging and auditing, for SABRS to detect security violations.SABRS is considered a major application, and according to DoDInstruction 8500.2 major applications require intrusion detection systems. TheDoD Instruction requires an incident response plan that identifies the responsibleComputer Network Defense Service Provider, defines reportable incidents,outlines a standard operating procedure for incident response, identifies usertraining, and establishes an incident response team. The plan should be exercisedat least annually. The PMO did not have an intrusion detection system as part ofan incident response plan.Application-level audit trails should record user activities, such as opening andclosing data files; reading, editing, and deleting records or fields; and printingreports. Without this security control, security violations could occur withinSABRS that would not be detected, investigated, or corrected.8

Security Awareness Training. The PMO did not verify that all SABRS usersattended the required annual computer security awareness training. FISMArequires each agency to develop, document, and implement an agency-wideinformation security program that includes security awareness training. Thistraining applies to all personnel, contractors and other users of informationsystems that support the operations and assets of the agency. Additionally, DoDand OMB require employees receive mandatory periodic training. NISTstandards, which are directed by OMB and are considered best practices, requireannual training for all users.An effective IT security program requires significant attention be given totraining IT users on security policy, procedures, and techniques. We compared anincomplete list of SABRS users to a list of employees who attended annual ITsecurity training and determined that 2,946 of 3,148 SABRS users were notidentified as having completed the required training. Because the PMO did notverify that SABRS users completed the required IT security training, SABRS isvulnerable to greater security risk.Software Waivers or License AgreementsDFAS Technology Services Organization, as a component of the CIO, did notmaintain waivers or license agreements for selected software loaded on theircomputers. The CIO did not clearly assign those security responsibilities to theTechnology Services Organization. Waivers or license agreements authorize thesoftware for use. Unauthorized software could degrade SABRS processing.DFAS Technology Services Organization was unable to provide waivers orlicense agreements for 8 of 12 auditor sampled software programs. DFASInstructions require that only software that is part of the DFAS standard suite ofsoftware may be loaded onto a Government computer. All other software must beapproved for installation in writing by the DFAS Technology ServicesOrganization. The DFAS CIO should require that the Technology ServicesOrganization maintain software waivers and license agreements. These waiversand license agreements provide assurance that only authorized software isoperating on DFAS computers.9

Recommendations, Management Comments, and AuditResponseA.1 We recommend the Chief Information Officer, Defense Finance andAccounting Service:a. Separate the Terminal Area Security Officer functions fromDefense Finance and Accounting Service Operations to ensure segregation ofduties.Management Comments. The Director, Information and Technology, DFAS 2nonconcurred. He stated that TASOs 3 assist in implementing informationassurance provisions for local users and systems so they have to be physicallylocated in the same work area or organization as the users. He added that systemaccess procedures involve multiple roles and people, all of which provide anappropriate measure of segregation of duties.Audit Response. The Director, Information and Technology, DFASnonconcurred and the comments were nonresponsive. We recommended that theTASO functions be separated from operations to ensure segregation of duties.We do not agree that DFAS provides the appropriate measure of segregation ofduties between TASOs and operations. TASO functions should not be embeddedin DFAS Operation’s chain of command regardless of where the TASOs arephysically located.We request that the Director, Information and Technology, DFAS provide thecorrective actions taken to segregate TASO functions from operations and theassociated implementation dates.b. Develop performance plans that:(1) Incorporate security duties as performance measurementsfor personnel with security responsibilities, including but not limited to theProgram Management Office, and(2) Management can use to evaluate personnel and hold themaccountable for security operations.Management Comments. The Director, Information and Technology, DFASconcurred. He explained that the requirement to develop performance plans thatincorporate security duties as performance measurements for personnel withsecurity responsibilities will be added to the DFAS Information AssuranceWorkforce Improvement Program. The estimated completion date for this actionis September 30, 2008.2Defense Finance and Accounting Service (DFAS).3Terminal Area Security Officer (TASO).10

Audit Response. Comments from the Director, Information and Technology,DFAS are responsive and no additional comments are required.c. Identify and clearly delegate to specific offices the responsibility forestablishing and executing policy and procedural authorities over StandardAccounting, Budgeting, and Reporting System information technologysecurity operations.Management Comments. The Director, Information and Technology, DFASconcurred. The Director, Information and Technology, DFAS stated that heupdated DFAS 8500.1-R, Information Assurance, November 2007. This updatedpolicy assigns clear security responsibilities to program managers, systemmanagers, system information assurance managers, site information assurancemanagers, and other security officials.Audit Response. Comments from the Director, Information and Technology,DFAS are responsive and no additional comments are required.d. Direct applicable offices to create, document, implement, andapprove policies and procedures in accordance with National Institute ofStandards and Technology, DoD, and Government Accountability Officeguidance to address: access authorizations, periodic reviews of access authorizations, data encryption, and detecting and investigating security violations and activities.Management Comments. The Director, Information and Technology, DFASconcurred.The Director, Information and Technology, DFAS described the procedures thatDFAS uses for access authorizations and periodic review of access authorizations.He explained that an automated process identifies monthly ACIDs 4 that haveSABRS 5 access. A systems task documents the validation, showing accessidentifications and entries that were removed. He added that the SABRS PMO 6 isnotified of the monthly validation. He also stated that all ACIDs are reviewedwhen DFAS receives a request for SABRS access.For data encryption, the Director, Information and

Jun 06, 2008 · Officers Act of 1990, as amended, requires the United States Marine Corps (USMC) complete stand-alone General Fund and Working Capital Fund financial statements. The Defense Finance and Accounting Service (DFAS) Kansas City is responsible for reporting the USMC financi