Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Report Slams Department of Energy For Lack of Cyber Incident Management

The Department of Energy (DoE) still lacks a department-wide cyber-security incident management system, five years after auditors flagged problems in how the department manages cyber-security incidents.

The Department of Energy (DoE) still lacks a department-wide cyber-security incident management system, five years after auditors flagged problems in how the department manages cyber-security incidents.

Department of Energy LogoThe fact that the Energy Department doesn’t have a unified cyber-security incident management prevents timely incident response and leads to unnecessary spending, according to an office of inspector general report released Dec. 11. Since the DoE does not include the National Nuclear Security Administration, a semi-autonomous agency within the department, the NNSA and DOE agencies are spending over $30 million annually on duplicate or overlapping incident management capabilities, the report (PDF) found.

The Department’s Joint Cybersecurity Coordination Center provided response and advisory services and maintained capabilities supporting computer forensics and assistance in investigating and preserving cyber evidence. However, the report found that at least two other organizations provided similar capabilities to the department.

“Continued operation of independent capabilities could hinder the Department’s ability to maintain an effective incident management program and result in unnecessary expenditures,” Gregory H. Friedman, the inspector general, wrote in the memorandum accompanying the report.

The gaps adversely impact the ability of law enforcement agencies when investigating incidents, the report said. Various DoE sites haven’t always reported cyber-security incidents because the instructions for reporting them from the Energy Joint Cyber-Security Coordination Center are not very detailed or clear, the report found. Investigators were also hampered by the fact that incident reporting to law enforcement was not always timely or complete.

Advertisement. Scroll to continue reading.

“The fragmentation of cyber security incident response centers could limit the exchange of needed information and delay decision-making in response to security incidents,” Friedman wrote.

The 2008 report from the office of the inspector general previously highlighted the separation between NNSA and DoE. Shortly after the report was released, Energy and NNSA officials agreed to establish a joint incident management operation, but the latest report found that disparate functions still exist.

While it is reassuring to know that overall number of vulnerabilities at the DoE has declined from 56 to 38 since 2011, it turned out 16 of those were originally flagged in the inspector general’s 2011 report and remain unresolved.

CybersecurityThe department reported over 2,300 cyber-security incidents between October 2009 and March 2012, Friedman said. The incidents included unauthorized access to systems, improper use of computing resources, and the installation of malicious software, according to the memo.

“Our review of the Offices of the Under Secretary for Nuclear Security, Under Secretary for Science and Under Secretary of Energy organizations identified various control weaknesses related to access controls, vulnerability management, system integrity of web applications, planning for continuity of operations and change control management,” the report said.

Auditors found problems with physical security controls, as people could access areas they weren’t supposed to be able to go at six DoE facilities. Networks and computers at some facilities had weak passwords. Of the 1,952 desktop computers inspected, a little over half had unpatched software. Several servers were also missing updates. The report also found that 29 Web applications dealing with financial, human resources, and “general support” at eight locations were vulnerable to hackers.

Energy officials told the office of inspector general the DoE would implement a new enterprise-wide policy for incident categorization and reporting, as well as rolling out a department-wide incident management system which includes NNSA, by Sept. 30, 2013.

Related: Smart Grids Need to be Updated to Reduce Vulnerabilities

Related: Digital Certificates and Encryption Play Key Role in Smart Grid Security

Related: How to Make the Smart Grid Smarter than Cyber Attackers

Related: Smart Power Grids a Prime Target in Cyber Warfare

 Related: The Increasing Importance of Securing The Smart Grid

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...