Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Facilities That Lost Data Center Status at Increased Risk of Cyberattacks: GAO

Federal agencies participating in the Office of Management and Budget’s (OMB) Data Center Optimization Initiative (DCOI) report that they are on track with previously announced plans to close hundreds of outdated data centers, but many of the facilities that will continue to operate are at increased risk of being hacked, the U.S. Government Accountability Office (GAO) warned last week.

Federal agencies participating in the Office of Management and Budget’s (OMB) Data Center Optimization Initiative (DCOI) report that they are on track with previously announced plans to close hundreds of outdated data centers, but many of the facilities that will continue to operate are at increased risk of being hacked, the U.S. Government Accountability Office (GAO) warned last week.

As of August 2019, 23 of the 24 agencies participating in the initiative said they had met or were on track to meet their fiscal year 2019 closure goals. Thus, out of more than 2,700 government-wide facilities, 286 were planned for closure, with 37 more expected to close within the next couple of years.

A total of 102 facilities had been closed by August 2019, with 184 more planned to be closed by the end of fiscal year 2019. Additionally, 31 data centers are planned for closure in fiscal year 2020, five in 2021, and one in 2022.

“Based on our past work reviewing agencies’ DCOI strategic plans, this total number of planned closures is likely to increase when agencies submit their annual DCOI strategic plans in the spring of 2020,” GAO notes in a newly published report (PDF).

However, over 2,000 facilities that will continue to operate face increasing security risks as the agencies that use them are no longer required to report about cyber-threats and vulnerabilities, meaning that the OMB’s visibility into them is significantly diminished.

This is due to the fact that, in June 2019, OMB issued revised guidance that narrowed the scope of the type of facilities considered data centers, thus eliminating reporting requirements for over 2,000 facilities. However, this increases the chances of agencies losing track of the vulnerabilities affecting these facilities, making them an easier target for malicious hackers.

The new GAO study reveals that due to the lack of reporting requirements for key facilities and lack of proper documentation of decisions on which facilities are exempt from DCOI, agencies might remain exposed to vulnerabilities and oversight of consolidation, and optimization efforts may be impaired.

“While OMB previously acknowledged that these types of facilities inefficiently consume resources and pose security risks, agencies are no longer required to report these locations in their inventories. Further, there is currently no documentation of OMB’s decisions on agency requests to remove data centers from reporting, or to exempt mission critical data centers from closure targets,” GAO says.

Advertisement. Scroll to continue reading.

The OMB, however, contested GAO’s claims that the removal of some facilities from DCOI oversight increased cybersecurity risks, and OMB even advised GAO to remove cybersecurity references from its report.

“In raising these objections, OMB’s comments stated that DCOI is focused on consolidating and optimizing the federal data center portfolio and that cybersecurity is not a primary driver of the initiative. OMB added that DCOI was never designed to track or directly address cybersecurity risks,” GAO said in its report. “Specifically, OMB’s comments took issue with our finding that data centers not tracked within DCOI are at a greater risk for a cybersecurity incident. These comments noted that many other laws, policies, and procedures directly deal with the cybersecurity posture of all federal IT systems, and that OMB’s DCOI guidance does not affect the applicability of those requirements.”

Related: GAO Says Electric Grid Cybersecurity Risks Only Partially Assessed

Related: GAO Makes Recommendations to Improve Security of Taxpayer Data

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.