Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Over 12,000 Cyber Incidents at DoD Since 2015, But Incident Management Still Lacking

The US Government Accountability Office (GAO) this week has published a report detailing issues identified in the Department of Defense’s (DoD) cyber incident management processes.

The US Government Accountability Office (GAO) this week has published a report detailing issues identified in the Department of Defense’s (DoD) cyber incident management processes.

The report represents the conclusion of a year-and-half audit (March 2021 to November 2022) of DoD’s implementation of reporting and notification capabilities related to cyber incidents.

The audit focused on in-place processes for reporting and notifying leadership, for reporting incidents involving the defense industrial base (DIB), and for notifying individuals when personally identifiable information (PII) has been exposed in a data breach.

DIB includes entities that are outside the federal government but which deliver goods or services for meeting U.S. military requirements.

“To conduct this work, GAO reviewed relevant guidance, analyzed samples of cyber incident artifacts and cyber incident reports submitted by the DIB and privacy data breaches reported by DoD, and surveyed 24 DoD cyber security service providers. In addition, GAO interviewed officials from DoD and cyber security service providers and convened two discussion groups with DIB companies,” GAO notes.

The information systems that DoD and DIB rely on to carry out their operations are susceptible to cyberattacks, with more than 12,000 cyber incidents experienced since 2015. While the DoD did establish two processes for managing cyber incidents (one for all incidents and another for critical incidents), it failed to fully implement either of them, GAO says.

“Despite the reduction in the number of incidents due to DOD efforts, weaknesses in reporting these incidents remain. For example, DOD’s system for reporting all incidents often contained incomplete information and DOD could not always demonstrate that they had notified appropriate leadership of relevant critical incidents,” GAO’s report reads.

GAO says that one of the reasons for the identified weaknesses is that DoD has not assigned an organization in charge with proper incident reporting and compliance with guidance, and that assigning such responsibility would also ensure that the DoD leadership would be better informed on the department’s cybersecurity posture.

The report also notes that, because DoD has yet to decide “whether DIB cyber incidents detected by cybersecurity service providers should be shared with all relevant stakeholders, […] there could be lost opportunities to identify system threats and improve system weaknesses”.

Another identified issue is related to the DoD’s established process for notifying individuals of data breaches involving their PII. The process involves risk assessments related to the PII and the type of data breach, but notifications are not documented, because they are often made verbally or by email, meaning that DoD cannot verify that people were informed about the incident.

The report makes six recommendations meant to improve DoD’s cyber incident management: to assign responsibility for overseeing incident reporting and notification, to implement enterprise-wide visibility into cyber incident reporting, to provide guidance on incident reporting, to ensure that information on DIB-related cyber incidents is shared with relevant parties, to encourage cyber incident reporting from DIB companies, and to document data breach notifications.

Related: U.S. Department of State Approves New Cyberspace Security Bureau

Related: GAO Criticizes Pentagon Over Cyber Hygiene Efforts

Related: How to Prepare for New SEC Cybersecurity Disclosure Requirements

Related: Hacked US Companies to Face New Reporting Requirements

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Funding/M&A

Twenty-one cybersecurity-related M&A deals were announced in December 2022.