The US Government Accountability Office (GAO) this week has published a report detailing issues identified in the Department of Defense’s (DoD) cyber incident management processes.
The report represents the conclusion of a year-and-half audit (March 2021 to November 2022) of DoD’s implementation of reporting and notification capabilities related to cyber incidents.
The audit focused on in-place processes for reporting and notifying leadership, for reporting incidents involving the defense industrial base (DIB), and for notifying individuals when personally identifiable information (PII) has been exposed in a data breach.
DIB includes entities that are outside the federal government but which deliver goods or services for meeting U.S. military requirements.
“To conduct this work, GAO reviewed relevant guidance, analyzed samples of cyber incident artifacts and cyber incident reports submitted by the DIB and privacy data breaches reported by DoD, and surveyed 24 DoD cyber security service providers. In addition, GAO interviewed officials from DoD and cyber security service providers and convened two discussion groups with DIB companies,” GAO notes.
The information systems that DoD and DIB rely on to carry out their operations are susceptible to cyberattacks, with more than 12,000 cyber incidents experienced since 2015. While the DoD did establish two processes for managing cyber incidents (one for all incidents and another for critical incidents), it failed to fully implement either of them, GAO says.
“Despite the reduction in the number of incidents due to DOD efforts, weaknesses in reporting these incidents remain. For example, DOD’s system for reporting all incidents often contained incomplete information and DOD could not always demonstrate that they had notified appropriate leadership of relevant critical incidents,” GAO’s report reads.
GAO says that one of the reasons for the identified weaknesses is that DoD has not assigned an organization in charge with proper incident reporting and compliance with guidance, and that assigning such responsibility would also ensure that the DoD leadership would be better informed on the department’s cybersecurity posture.
The report also notes that, because DoD has yet to decide “whether DIB cyber incidents detected by cybersecurity service providers should be shared with all relevant stakeholders, […] there could be lost opportunities to identify system threats and improve system weaknesses”.
Another identified issue is related to the DoD’s established process for notifying individuals of data breaches involving their PII. The process involves risk assessments related to the PII and the type of data breach, but notifications are not documented, because they are often made verbally or by email, meaning that DoD cannot verify that people were informed about the incident.
The report makes six recommendations meant to improve DoD’s cyber incident management: to assign responsibility for overseeing incident reporting and notification, to implement enterprise-wide visibility into cyber incident reporting, to provide guidance on incident reporting, to ensure that information on DIB-related cyber incidents is shared with relevant parties, to encourage cyber incident reporting from DIB companies, and to document data breach notifications.
Related: U.S. Department of State Approves New Cyberspace Security Bureau
Related: GAO Criticizes Pentagon Over Cyber Hygiene Efforts
Related: How to Prepare for New SEC Cybersecurity Disclosure Requirements
Related: Hacked US Companies to Face New Reporting Requirements

More from Ionut Arghire
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
Latest News
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
