Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Most NASA Systems at Risk From Insider Threats: Audit

Most of the IT systems at the National Aeronautics and Space Administration (NASA) are exposed to higher-than-necessary risks from internal threats, a recent audit has concluded.

Most of the IT systems at the National Aeronautics and Space Administration (NASA) are exposed to higher-than-necessary risks from internal threats, a recent audit has concluded.

A report from NASA’s Office of Inspector General (OIG) reveals that, while the agency has efficiently implemented an insider threat program that covers classified systems, most of the agency’s systems are unclassified, thus potentially exposed.

Insider threats may include accidental leaks originating from phishing attacks or erroneously forwarded emails, the misuse of network or database access, and data theft – when an employee intentionally copies data with the intent of sharing it with third parties.

As part of its fully operational insider threat program, NASA monitors the classified network for anomalous user activity, it conducts mandatory threat training and it has established a website to help employees and contractors identify potential threats, and it has strengthened procurement controls.

However, “the vast majority of its IT systems—including many containing high-value assets and critical infrastructure—are unclassified and are therefore not covered by its current insider threat program. Consequently, the Agency may be facing a higher-than-necessary risk to its unclassified systems and data,” the report reads.

[ READ: NASA Identified Over 6,000 Cyber Incidents in Past 4 Years ]

The audit has concluded that NASA’s insider threat program – which was established in 2014 and validated as fully operational in 2018 – meets federal requirements, and that adding the unclassified systems to the program could provide an additional level of maturity.

According to the report, the current maturity of NASA’s classified insider threat program should be considered adequate for keeping systems protected from both unwitting and witting insiders, especially since the agency mandates annual insider threat awareness training.

Advertisement. Scroll to continue reading.

However, the auditors also note that most of NASA’s systems are unclassified, underlining that the insider threat risk for these systems is higher, given that many contain sensitive and valuable information, including scientific data, personal information, and procurement data.

“At NASA, valuable data including information related to critical infrastructure and other high-value assets resides in unclassified systems. Consequently, an insider threat incident on an unclassified system could pose serious jeopardy to Agency operations,” the report reads.

[ READ: Mozilla Publishes Results of VPN Security Audit ]

Although it does limit access to high-value assets and critical infrastructure, NASA does not monitor access to unclassified data related to intellectual property and high-value assets. While unclassified systems are assigned to users with limited privileges, over the past three years NASA received over 12,000 requests for elevated privileges that enable the download of task-specific software.

“Without proper monitoring of the purpose and source of this software, NASA systems are vulnerable to the introduction of malicious artifacts that can sabotage systems or collect and deliver information to outside sources. Additionally, accessing IT systems with elevated user privileges greatly increases the risks of cybersecurity incidents by introducing unintended, detrimental changes to system configurations,” the report says.

While NASA officials believe that the agency’s cybersecurity posture would greatly benefit from expanding the insider threat program to unclassified systems, there are staffing and technology limitations that should be addressed first, to support such an effort. Even so, the program should be expanded, the report says.

The auditors recommend that NASA establishes a cross-discipline team to conduct an insider threat risk assessment of unclassified systems and determine whether the insider threat program should be expanded to cover these systems as well, and that the agency ensures improved cross-discipline communication.

Related: IoT Protocol Used by NASA, Siemens and Volkswagen Can Be Exploited by Hackers

Related: Tech Audit of Colonial Pipeline Found ‘Glaring’ Problems

Related: SecureDrop Workstation Gets Post-Audit Security Refresh

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...