CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?


Incident Response

GAO Blasts IRS Over Information Security Weaknesses

GAO Issues Scathing Report IRS’s Security Posture, Says it Failed to a Meet Majority of Security Recommendations

GAO Issues Scathing Report IRS’s Security Posture, Says it Failed to a Meet Majority of Security Recommendations

The Government Accountability Office (GAO) has blasted the Internal Revenue Service (IRS) for failing to implement stronger security measures after a succession of dismal reports on the subject. In a report issued to the Secretary of the Treasury last week, the GAO said that the IRS had met just 15 percent of the 105 previously reported recommendations where information security is concerned.

IRS Information Security WeakTaking a blunt approach, the GAO said that the IRS “lacks reasonable assurance as to the accuracy of financial information or the adequate protection of sensitive taxpayer information.”

The GAO said that while the IRS is trying, “the agency made limited progress in correcting information security weaknesses” identified in previous audits. As such, the IRS addressed approximately 15 percent of the 105 open recommendations that were previously reported.

“IRS informed us that it had addressed 29 of the 105 previously reported information systems security–related recommendations we made. However, we determined that 13 (about 45 percent) of the 29 recommendations had not yet been fully resolved. This was due in part to the fact that while 6 of the 29 recommendations related to multiple systems, IRS had not yet implemented corrective actions for all of the affected systems,” the report said.

When it comes to what they’ve done right, the IRS has implemented cross-functional working groups, including a roster of staffers with knowledge of the IRS internal systems in order to address areas considered at risk. These working groups took steps to address problems with encrypted data transfers for its Integrated Financial System (IFS) for example, limiting the chance that sensitive information can be captured in transit.

Yet, despite the movement forward, there is plenty of room to grow according to the GAO’s report. While IFS implemented encryption, sensitive data is still transferred unencrypted. Also, certain database security controls were not yet in place for systems such as IFS, and the Electronic Federal Payment Posting System (EFPPS).

In addition, access control weaknesses persist, and database software maintenance has not yet been performed, the GAO said. According to the watchdog, the agency’s strategy to address these weaknesses is to replace the existing system. However, implementation of the replacement system has been repeatedly delayed and is not expected until the third quarter of fiscal year 2012. Further, several physical security–related issues remain unresolved, including issues concerning management validation of access to restricted areas, proximity cards allowing inappropriate access, and unlocked cabinets containing network devices.

But there’s more. “The agency uses automated tools to test compliance with IRS’s security policies for its three major computing environments -Windows, UNIX, and mainframes,” the report added.

Advertisement. Scroll to continue reading.

“However, the UNIX tool does not test whether appropriate security patches have been applied, and the mainframe tool only tests compliance with a limited subset of the agency’s policies. Thus, results from IRS’s use of these tools do not provide management the information necessary to allow it to arrive at appropriate conclusions about the security status of these systems.”

Host-based intrusion detection systems deployed to monitor financial applications were configured to spot attack patterns for network security incidents, but were not correctly configured to flag attacks on the specific financial applications themselves.

IRS IT Security Problems, GAO Says

Other security issues, according to the GAO include:

• A key application used for processing tax payment information employs a system design that exposes the configuration used to control logon to alterations by its users, allowing circumvention of the application’s controls; additionally, insecurely configured software used to support this application exposed it to unauthorized users.

• Servers supporting important financial management applications were not patched in a timely manner.

• A major system used to facilitate user access to IFS relied upon operating system software that was no longer supported by its vendor and was not receiving security updates, leaving these servers and systems exposed to known vulnerabilities.

• A system used to process tax accounts had database and server weaknesses similar to weaknesses identified in previous audits for other systems that exposed the system and data to unauthorized access.

• Unit Security Representatives, who perform important security duties for the IRS’s Integrated Data Retrieval System, did not complete either the required initial training prior to assuming their responsibilities nor the required annual refresher training at the IRS visited by GAO officials.

“Until IRS takes additional steps to implement more-comprehensive testing and effective validation processes and to implement effective corrective actions to address the identified vulnerabilities, its facilities, computing resources, and information will remain vulnerable to inappropriate use, modification, or disclosure, and agency management will have limited assurance of the integrity and reliability of its financial and taxpayer information,” the GAO concluded.

“Considered collectively, the unresolved deficiencies from prior audits, combined with less-than-fully effective compensating and mitigating controls and the additional control deficiencies identified in fiscal year 2011, impair IRS’s ability to ensure that its financial and taxpayer information is secure from internal threats…”

The GAO said that it plans to issue a separate report to the IRS on the information security control deficiencies identified during fiscal year 2011 and the status of actions to address previous recommendations. It also said it would issue a limited distribution report to the IRS that addresses details omitted from this most recent report due to the sensitivity of the information.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...