Audit of Marshals Service Prisoner Tracking System, IG, 2004
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
REVIEW OF THE UNITED STATES MARSHALS SERVICE’S PRISONER TRACKING SYSTEM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 04-29 August 2004 REVIEW OF THE UNITED STATES MARSHALS SERVICE’S PRISONER TRACKING SYSTEM EXECUTIVE SUMMARY The United States Marshals Service (USMS) is responsible for housing federal prisoners awaiting trial in federal courts. On any given day, the USMS maintains custody of approximately 40,000 federal prisoners in local jails, contract facilities, and federal Bureau of Prisons (BOP) facilities throughout the country. Depending upon the length of a prisoner’s court trial, time spent in USMS custody may run from several days to several years. The USMS uses the Prisoner Tracking System (PTS) application to maintain tracking information for federal prisoners in USMS custody. The PTS contains information that is specific to each individual prisoner, including the prisoner’s personal data, property, medical information, criminal information, and location. Additionally, the USMS uses the application as an informational and scheduling tool to assist USMS personnel in locating prisoners for court appearances. Prisoners’ records are created using information obtained from key source documents, and this information is entered into the PTS. The PTS information is critical to processing and transporting prisoners because the USMS relies on the confidentiality, availability, and integrity of this information to ensure the safety of both the prisoners and the law enforcement officers charged with their care. The objectives of this audit were to assess the effectiveness of select general controls for the PTS at the entity-wide level, review PTS’s application controls, and perform data integrity testing. The Office of the Inspector General (OIG) performed this audit in accordance with the Government Auditing Standards. We used the Federal Information System Controls Audit Manual (FISCAM), Department of Justice (Department) policies and procedures, National Institute of Standards and Technology (NIST) Special Publications (SP), Office of Management and Budget (OMB) Guidelines, and the USMS’s policies for prisoner processing and cellblock operations as criteria for this audit.1 Specific details of our audit objectives, scope, and methodology appear in Appendix 1. 1 The General Accounting Office’s (GAO) FISCAM provides a methodology for guiding auditors in evaluating general and application controls used by information systems to protect the integrity, confidentiality, and availability of data. Descriptions of the FISCAM select general control and application control areas tested during this audit can be found in Appendix 3. The USMS divides its operations into four regions with 94 district offices (DOs). To gain a nationwide represent ation of PTS operational activities, we elected to review DOs in each of the four USMS regions. We judgmentally selected the following sites: Alexandria, Virginia; Washington, D.C.; New York, New York; Houston, Texas; Philadelphia, Pennsylvania; Chicago, Illinois; Miami, Florida; and Phoenix, Arizona. During our audit, we reviewed select general controls designed to protect the PTS application against unauthorized use, loss, or modification of its data.2 Additionally, we reviewed application controls within the PTS that are used to ensure the validity, proper authorization, and completeness of transactions when entering prisoners’ data into the PTS. We also tested output reports from the PTS application against source documents contained in prisoner file folders to assess the data integrity within the PTS. SUMMARY RESULTS OF THE AUDIT Select General Controls Our review of the PTS identified weaknesses within each of the six general control categories designed to protect the PTS’s system environment. Specifically, we found deficiencies within PTS’s entity-wide security program planning and management, access controls, application software development and change control, system software, segregation of duties, and service continuity controls. 2 General controls are entity-wide controls used to protect a system’s environment. The PTS application can only be accessed via the USMS’s Marshals Network (MNET); therefore, MNET serves as the PTS application’s system environment. We reviewed the select general controls recommended by the FISCAM for evaluating and testing application controls because general controls for MNET were assessed during the OIG’s January 2004 Federal Information Security Management Act (FISMA) review. The results of this assessment can be found in the OIG’s Audit Report No. 04-11. ii Following the chart below we summarize each vulnerability. GENERAL CONTROL AREAS VULNERABILITIES NOTED Entity-wide Security Program Planning & Management Assess risks periodically Document an entity-wide security program plan Establish a security management structure and clearly assign security responsibilities Implement effective security-related personnel policies Monitor the security program’s effectiveness and make changes as needed √ √ Access Controls Classify information resources according to their criticality and sensitivity Maintain a current list of authorized users and ensure that their access is authorized Establish physical and logical controls to prevent and detect unauthorized access Monitor access, investigate apparent security violations, and take appropriate remedial action √ √ Application Software Development & Change Control Authorize processing features and modifications √ Test and approve all new and revised software Control software libraries System Software Limit access to system software Monitor access to and use of system software √ Control system software changes Segregation of Duties Segregate incompatible duties and establish related policies √ Establish access controls to enforce segregation of duties Control personnel activities through formal operating procedures and supervision and review √ Service Continuity Assess the criticality and sensitivity of computerized operations and identify supporting resources Take steps to prevent and minimize potential damage and interruption Develop and document a comprehensive contingency plan Test the contingency plan periodically and adjust it as appropriate iii √ √ √ Entity-wide Security Program Planning and Management Within the area of entity-wide security program planning and management, a security manager for the PTS application was not appointed and employees lacked adequate training and expertise. These deficiencies could negatively impact the USMS’s ability to assess risks and provide protection for sensitive PTS data. Access Controls The USMS did not properly maintain the PTS authorized user list and allowed accounts to remain on the list for employees who no longer required access. Active but invalid accounts could enable an unauthorized user to gain access to sensitive information. Ineffective access controls diminish the reliability of data and subject the system to unauthorized use, loss, or modification. Additionally, the USMS did not enforce physical access controls to protect data entry terminals from access by unauthorized users. Physical access to computer facilities that house data entry terminals could allow unauthorized individuals to obtain confidential printed reports, view sensitive data displayed on computer screens, and steal or damage equipment. Application Software Development and Change Control Interviews conducted during our site visits disclosed that program modifications were not properly authorized. Application users are generally responsible for requesting and authorizing system changes. However, we found that the PTS application end-users were either unfamiliar with or unaware of the process for requesting changes to the application. Inadequacies with controls that protect application software from unauthorized changes could result in the USMS allowing unauthorized modifications to be made to the PTS application. System Software The effectiveness of the PTS’s system software controls were jeopardized because the USMS is using outdated programming and database management software to support the application. The use of such outdated software prevents the USMS from implementing new security enhancements that are designed to protect the application. This deficiency also increases the risk that without timely software updates that enhance functionality and iv security, data could be improperly processed by the application or insufficiently protected. Segregation of Duties Policies and procedures are not in place to segregate incompatible duties for personnel performing critical functions, such as prisoner intake and record creation processes. Compounding this problem, the USMS has no formal procedures to guide personnel performing activities that directly affect the reliability of the PTS data. Without the segregation of duties, and in the absence of formal procedures, the USMS cannot ensure the confidentiality, integrity, and availability of PTS data during the prisoner processing cycle. Service Continuity Backup tapes were not being rotated off-site, and the contingency plan for the PTS had not been tested. We also found that key personnel responsible for emergency response activities lacked sufficient training and expertise. System administrators were not familiar with the current version of the software supporting the PTS application or the location of their local DOs database files. Consequently, the USMS may lose the capability to restore the PTS’s application software and data because it is relying on insufficient preventative measures to mitigate service disruptions. Moreover, the USMS is depending on inadequately trained individuals to respond appropriately in the case of an emergency and to assist in restoring the application software and data files of this mission critical operation. v Application Controls In addition to the general controls findings previously mentioned, our review of the PTS identified deficiencies within each of the four application control areas we tested. Following the chart below is a summary of each vulnerability indicated in the chart. APPLICATION CONTROL AREAS VULNERABILITIES NOTED Authorization Controls All data are authorized before entering the application system Restrict data entry terminals to authorized users for authorized purposes Master files and exception reporting help ensure all data are processed and are authorized √ √ Completeness Controls All authorized transactions are entered into and processed by the computer √ Reconciliations are performed to verify data completeness Accuracy Controls Data entry design features contribute to data accuracy Data validation and editing are performed to identify erroneous data Erroneous data are captured, reported, investigated, and corrected Output reports are reviewed to help maintain data accuracy and validity √ √ Controls Over Integrity of Processing and Data Files Procedures ensure that the current version of production programs and data files are used during processing Programs include routines to verify that the proper version of the computer files is used during processing Programs include routines for checking internal file header labels before processing Mechanisms within the application protect against concurrent file updates √ Authorization Controls We found problems with authorization controls that ensure the validity of transactions. The USMS has not formally established baseline requirements for key source documents used to create prisoner records in the PTS or for the proper authorization of source documents. This lack of standards from the USMS headquarters for key source documents resulted in vi inconsistent data collection, record creation, and file maintenance practices throughout the USMS sites audited. Formal standards would help to ensure, at a minimum, that each prisoner file folder contains photographs, medical information, and fingerprint cards. Also, such standards would help to ensure that critical identifying information is collected from a reliable source. These standards could also provide reasonable assurance against the misidentification or mishandling of a prisoner due to inaccurate, unauthorized, or unreliable data. Additionally, supervisory or independent reviews to ensure the proper authorization of source documents and transactions were not being performed prior to the data being entered into the PTS. This occurred because the USMS has not implemented adequate authorization standards for source documents or required that supervisory reviews be performed on a consistent basis. This precautionary measure would help ensure that transactions are properly authorized and supported by a reliable source document that has been signed. It would also assist with the prevention of unauthorized, inappropriate, or incorrect transactions from being entered that could negatively impact the integrity of data within the PTS. Controls for ensuring that data entry terminals are used for authorized purposes, such as audit logs, were weak. Audit logs that help to recreate events and track user activity were not being maintained for the PTS application. The USMS management does not require that audit logs be maintained for the PTS to track the occurrence of unauthorized activities. In our opinion, this condition increases the risk to the USMS that covert activity by a user, such as entering an unauthorized transaction resulting in the early release of a prisoner, may go undetected. The risks to the safety of the USMS personnel who process and transport prisoners and the general public are increased when coupled with weak authorization controls over source documents and the lack of supervisory reviews of transactions. Completeness Controls The PTS application does not effectively use a completeness control known as computer sequence checking to automatically perform global database searches. Computer sequence checking would identify or prevent the assignment of multiple USMS numbers to the same prisoner. 3 At present, each of the 94 DOs maintains a local PTS database 3 Computer sequence checking helps identify missing or duplicate numbers in a series. USMS numbers are assigned sequentially to prisoners processed by a DO; however, database searches are conducted by prisoner name rather than USMS number. vii and the application is only programmed to automatically perform searches for existing name and USMS number information within a user’s own local database. The current configuration does not provide assurance that the prisoner does not have an existing USMS number in any one of the other 93 local USMS databases. Without the capability to perform global searches of all existing databases, the USMS cannot ensure that it complies with its own policies prohibiting the multiple assignment of USMS numbers to the same prisoner. Accuracy Controls Within the area of accuracy controls, we found that the USMS management does not have an effective means of determining the existence of erroneous data, such as uncorrected errors, or the severity of errors in data entered into or processed by the application. Information regarding erroneous data was not collected and reported back to the USMS management for investigation or correction. This occurred because the USMS did not require that information regarding such data be collected. This type of oversight could negatively impact the reliability of the PTS’s data through the propagation of undetected errors throughout the application. We also found that the PTS’s accuracy controls were impacted because the USMS did not adequately control the production and distribution of sensitive PTS output reports. Specifically, authorized users of the PTS print sensitive output reports to shared network printers used by non-authorized employees. This practice exposes sensitive system data at a level above that which employees are required to perform their duties. Without adequate controls over the distribution of output reports, unauthorized individuals may inadvertently gain access to output reports and divulge sensitive and confidential information. Controls Over Integrity of Processing and Data Files Controls over integrity of processing and data files for the PTS application were deficient. This was due to the USMS not ensuring that each installation of the PTS application at the 94 DOs nationwide protects against simultaneous updates. We observed that the application allowed two users to update the same file concurrently, which raises doubt as to which user’s information was accurately recorded and processed by the application. This type of system malfunction could negatively impact the reliability of data within the PTS application. viii Data Integrity In addition to the deficiencies discovered within PTS’s general and application controls, our audit disclosed weaknesses within PTS’s data integrity. We tested the two factors that contribute to data integrity: completeness of prisoner records and accuracy of information. Our review discovered weaknesses within both areas tested. A summary of each vulnerability follows the chart. Data Integrity Assessment Factors VULNERABILITIES NOTED Completeness of Information Records contain all of the data elements and documents used as support for the transactions Accuracy of Information Output reports reflect the data obtained from the source documents √ √ Completeness of Information Our findings revealed deficiencies in the completeness of prisoner records. Many of the prisoner file folders we reviewed were missing key source documents used to validate data entry transactions and to substantiate the actions taken by USMS personnel.4 This occurred because the USMS did not establish and implement standards regarding data collection in order to comply with federal records retention requirements. Incomplete prisoner file folders pose a significant risk to the USMS’s ability to validate the PTS transactions, verify information, and justify the actions of its employees. Additionally, maintaining adequate and proper documentation of program activities enables the USMS to protect the federal government’s legal and financial interests. Accuracy of Information Reviews of output reports produced by the PTS application disclosed discrepancies in the accuracy of information. Output reports help to maintain the accuracy and validity of data within a system and determine the completeness of processing. We found that prisoner identifying information, such as a prisoner’s date of birth, appearing on the PTS output reports did not match source documents contained in the prisoner’s file folder. 4 The GAO defines a source document as any form of information that serves as the basis for entry of data into a computer system. ix Additionally, critical dates, such as a prisoner’s custody date, did not correlate with dates on source documents in the prisoner’s file folder. Inaccurate PTS information could result in the overpayment of jail bills, the untimely release of a prisoner, or the misidentification of a prisoner requiring special handling within the prisoner population. CONCLUSION AND RECOMMENDATIONS We consider our findings in the areas of select general controls, application controls, and data integrity to be major weaknesses. We further conclude that the state of the PTS’s existing controls poses a high risk to the protection of its data from unauthorized use, loss, or modification.5 We conclude that these weaknesses occurred because the USMS did not fully comply with current Department policies and procedures, NIST standards, OMB guidelines, or its own procedures for prisoner processing and cellblock operations. If not corrected, these security vulnerabilities could impair the USMS’s ability to fully ensure the integrity, confidentiality, and availability of data within the PTS. This report contains 20 recommendations for improving select general controls, application controls, and the integrity of data for the PTS. In general, we recommend that the USMS: • Appoint a security manager responsible for the PTS application; • Develop a training program to ensure that PTS users receive specialized training before being granted access to the application and ensure that system administrators are trained in their responsibilities; • Review access authorizations for the PTS application and update the PTS authorized user list in a timely manner; • Ensure that existing measures, such as door locks, are used to provide protection against unauthorized access to sensitive areas; 5 NIST SP 800-18 defines risk as the possibility of harm or loss to any software, information, hardware, administrative, physical, communications, or personnel resource within an automated information system or activity. Additionally, NIST categorizes the requirements for protecting the confidentiality, integrity, and availability of system information into three basic categories – high, medium, and low – according to the system’s sensitivity level. Specifically, a high risk is considered a critical concern of the system. x • Inform users regarding policies and procedures for requesting changes to the application and update the PTS’s production environment by replacing outdated software with current software; • Develop and enforce policies and procedures to segregate duties among staff performing critical PTS functions; • Identify and train employees involved in emergency response procedures in their roles and responsibilities; maintain emergency contact lists on-site; rotate and store backup tapes off-site; and test the PTS contingency plan annually; • Standardize the record creation process throughout the USMS for the PTS and establish key source document requirements for data collection; • Implement a control, such as requiring the supervisory authorization of data, to ensure that before information is entered into the system, transactions are supported by properly authorized source documents; • Maintain and review audit trails for the PTS application; • Modify PTS to perform automatic global database searches to assist with the prevention of assigning multiple USMS numbers to the same prisoner, report erroneous data to the PTS users department for investigation and correction, and protect the PTS output reports containing sensitive privacy information from access by unauthorized persons; • Ensure each installation of the PTS application protects against simultaneous updates of the same record by more than one end-user; and • Maintain adequate source documents in prisoners’ file folders to substantiate employee activities and implement quality control measures to ensure data integrity. xi TABLE OF CONTENTS Page I. BACKGROUND ...................................................................... 1 PTS Application System Environment ..................................... 2 II. FINDINGS AND RECOMMENDATIONS........................................ 3 1. Select General Controls ................................................... 3 Entity-wide Security Program Planning and Management ....... 3 Access Controls.............................................................. 7 Application Software Development and Change Control.........11 System Software............................................................13 Segregation of Duties .....................................................15 Service Continuity ..........................................................17 2. Application Controls ........................................................21 Authorization Controls.....................................................22 Completeness Controls....................................................27 Accuracy Controls...........................................................29 Controls Over Integrity of Processing and Data Files .............33 3. Data Integrity Testing .....................................................34 Completeness of Information............................................35 Accuracy of Information ..................................................37 III. CONCLUSION ......................................................................40 APPENDIX 1 OBJECTIVES, SCOPE, AND METHODOLOGY .................43 APPENDIX 2 FIELDWORK SITE VISIT MAP....................................45 APPENDIX 3 FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL, SELECT GENERAL CONTROLS AND APPLICATION CONTROLS.........................................46 APPENDIX 4 GENERAL ACCOUNTING OFFICE, ASSESSING THE RELIABILITY OF COMPUTER-PROCESSED DATA, DATA INTEGRITY ASSESSMENT FACTORS...................48 APPENDIX 5 GENERAL ACCOUNTING OFFICE, FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL, GENERAL CONTROLS REVIEW GUIDELINES ................49 APPENDIX 6 GENERAL ACCOUNTING OFFICE, FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL, APPLICATION CONTROLS REVIEW GUIDELINES...........67 APPENDIX 7 GENERAL ACCOUNTING OFFICE, ASSESSING THE RELIABILITY OF COMPUTER-PROCESSED DATA, DATA INTEGRITY ASSESSMENT GUIDELINES ..............76 APPENDIX 8 ACRONYMS AND ABBREVIATIONS.............................77 APPENDIX 9 GENERAL CONTROLS CRITERIA ................................78 APPENDIX 10 APPLICATION CONTROLS CRITERIA...........................79 APPENDIX 11 DATA INTEGRITY ASSESSMENT CRITERIA ..................81 APPENDIX 12 AUDITEE RESPONSE ...............................................82 APPENDIX 13 ANALYSIS AND SUMMARY OF ACTIONS NECECESSARY TO CLOSE REPORT.............................92 REVIEW OF THE UNITED STATES MARSHALS SERVICE’S PRISONER TRACKING SYSTEM I. BACKGROUND The United States Marshals Service (USMS) is responsible for housing federal prisoners awaiting trial in federal courts. On any given day, the USMS maintains custody of approximately 40,000 federal prisoners in local jails, contract facilities, and federal Bureau of Prisons (BOP) facilities throughout the country. Depending upon the length of a prisoner’s court trial, time spent in USMS custody may run from several days to several years. The USMS Prisoner Tracking System (PTS) supports the USMS’s responsibility to maintain custody of individual federal prisoners while criminal proceedings are pending. This period of custody extends from the time of their arrest or remand to the USMS by the court until the prisoner is sentenced, released from custody, or returned to the custody of the U.S. Parole Commission or the BOP. The PTS was implemented by the USMS in March 1993 to maintain tracking information for federal prisoners and to monitor federal prisoners in state and local detention facilities under contract to the USMS. The PTS replaced the Prisoner Population Management System. The PTS captures information necessary to complete the administrative processing, housing, safekeeping, health care, and disposition of federal prisoners in USMS custody.6 From fiscal year (FY) 2001 to FY 2004, the PTS’s total operating costs were $3,370,000, with annual operating costs averaging $842,500. Another $1,070,000 is projected for FY 2005 and a project to upgrade the PTS application’s functionality, funded at $5 million over a 5-year period, is currently underway. 7 The PTS is also used as an informational and scheduling tool. As an informational tool, the PTS provides identifying data specific to each prisoner, including the prisoner’s personal data, property, medical information, criminal information, location, and time spent at a facility. As a scheduling tool, PTS information assists USMS personnel in locating prisoners to be transported for court appearances. 6 USMS System Security Plan for the Prisoner Tracking System (PTS)/USMS Automated Booking System (USMS-ABS), June 2003. 7 Operating costs were obtained from budget requests submitted to the Office of Management and Budget by the Justice Management Division. 1 In addition, the PTS also contains records of court proceedings generated during the day-to-day processing and disposition of prisoners in the USMS’s custody. Prisoners’ records contained within the PTS are created using information obtained from key source documents, such as the individual custody and detention form, intake photos, Federal Bureau of Investigation (FBI) finger print cards, and the prisoners’ medical form. PTS Application System Environment The PTS application software runs on a local server in each of the 94 USMS district offices (DOs) located throughout the U.S. and its territories. In addition to the application, a database is maintained on the local server that contains information relative to prisoners processed by the DO. Thus, the USMS PTS environment consists of 94 copies of the PTS application along with 94 individual databases. At each DO, PTS client workstations connect to their local PTS application server to gain access to database information. PTS users initially log into the Marshals’ Network (MNET) located at the USMS headquarters in Arlington, Virginia, in order to log into the PTS application server at the ir location. Additionally, remote users can gain access to the PTS server in their district by dialing into the remote access server located at the USMS headquarters. The user is required to provide additional remote access user identification information in order to log into MNET. The following diagram depicts the PTS’s access configuration. PTS Access Configuration PTS Users PTS Laptop Users HQ Remote Access Server HQ MNet PTS Servers 94 District Offices 2 II. FINDINGS AND RECOMMENDATIONS Our review of select general controls designed to protect the PTS’s system environment identified weaknesses with the PTS’s entity-wide security program planning and management, access controls, application software development and change control, system software, segregation of duties, and service continuity controls. We also identified deficiencies with the PTS’s application controls that are used to help ensure the validity of transactions and proper authorization of data. These deficiencies included inadequate authorization controls, completeness controls, accuracy controls, and controls over integrity of processing and data files. Our findings relative to data integrity included deficiencies with the completeness of prisoner records and the accuracy of information contained within the PTS. In our judgment, these findings are major weaknesses in the PTS. We consider the system overall to be at a high risk to the protection of its data from unauthorized use, loss, or modification. These weaknesses occurred because the USMS did not develop or fully enforce its own policies or comply with the Department policies, NIST standards, and OMB guidelines. If not corrected, these weaknesses could impair the USMS’s ability to fully protect the integrity, confidentiality, and availability of data contained within the PTS database. 1. SELECT GENERAL CONTROLS General controls are entity-wide access controls used to safeguard a system’s environment. Our review of select general controls for the PTS application identified weaknesses in all six of the Federal Information System Controls Audit Manual (FISCAM) general controls areas – entity-wide security program planning and management, access controls, application software development and change control, system software, segregation of duties, and service continuity controls. Entity-wide Security Program Planning and Management Entity-wide security program planning and management allows an organization to establish a security control structure that enables senior 3 management to identify and address security risks. An effective plan requires that an organization: • • • • • Assess risks periodically; Document an entity-wide security program plan; Establish a security management structure and clearly assign security responsibilities; Implement effective security-related personnel policies; and Monitor the security program’s effectiveness and make changes as needed. We confirmed that the USMS adequately assessed risks, documented an entity-wide security program plan, and monitored the security program’s effectiveness. However, vulnerabilities were noted as indicated in the following chart: Entity-wide Security Program Planning & Management CONTROL AREAS VULNERABILITIES NOTED Assess risks periodically Document an entity-wide security program plan Establish a security management structure and clearly assign security responsibilities Implement effective security-related personnel policies Monitor the security program’s effectiveness and make changes as needed √ √ Establish a Security Management Structure and Clearly Assign Security Responsibilities Security managers are an essential component of an organization’s security control structure and are responsible for reporting compliance issues to senior management. Security managers perform specific functions to ensure the effectiveness of security plans established to protect systems that maintain sensitive data. These functions include assessing and managing risks to protect the confidentiality, availability, and integrity of system data. Security managers are also actively involved in addressing threats posed by authorized internal users and unauthorized outsiders attempting to gain access to system data, and implementing logical and physical access controls to prevent breaches in security. Our review of the PTS’s entity-wide security program planning and management revealed that no security manager for the PTS application had 4 been formally appointed. This occurred because USMS did not establish a security management structure and clearly assign security responsibilities. The PTS’s system security plan, included in the application’s certification and accreditation documentation, lists an individual as the “Computer Systems Security Officer (CSSO).” However, when we interviewed the individual designated as the CSSO, we found that he was not actively involved in providing security manager duties for the PTS application and did not know he had been officially appointed. Subsequent interviews with USMS management officials confirmed that the USMS had not officially appointed a security manager to address computer security practices specific to the PTS application. OMB Circular A-130 requires that an entity “assign responsibility for security for each major application to a management official.” Furthermore, the guidance recommends that the individual be “assigned the responsibility in writing to assure the application has adequate security.” Without the appointment of a security manager for the PTS application, the USMS cannot ensure that the application has adequate security or that security-related tasks are carried out. Such tasks include properly authorizing system access, communicating security policies to the user population, and monitoring risk management activities. Recommendation: We recommend that the USMS: 1. Appoint a security manager responsible for the PTS application and ensure the appointment is documented. Implement Effective Security-Related Personnel Policies The USMS did not implement effective security-related personnel policies to assure that employees possess adequate training and expertise. The USMS’s Prisoner Services Division (PSD) offers specialized PTS training at a federal government facility in Glynco, Georgia. However, users of the PTS application who perform critical functions such as record creation and record updating were not required by management to attend the specialized training prior to being granted access to the system. OMB Circular A-130 states that users of an application should receive specialized training prior to being granted access, and that the specialized training should focus on their responsibilities and rules of expected behavior 5 for the application. We found that no policy existed that required users to receive specialized training prior to or within a reasonable period after hire, and that the majority of PTS users had never received the specialized training offered by the USMS. Additionally, we determined that USMS personnel functioning as system administrators for the application did not have adequate training and expertise. According to the system administrator position description provided by the USMS, system administrators are responsible for “operating, troubleshooting, repairing, and maintaining IT systems.” Additionally, the document states that employees must possess the requisite technical knowledge to sustain the availability of the hardware and software environment. The system administrator must also be competent to maintain operating systems, applications, and data elements. However, we found that some system administrators were unfamiliar with their hardware and software environment and lacked specific knowledge, such as what version of the application was running on their server, what files supported the application, or where the PTS database they were responsible for protecting was located. OMB Circular A-130 requires that an aspect of an entity’s information management policy should require that employees, such as system administrators, are trained in skills appropriate to the management and protection of system information and that this training shall be an ongoing part of the information life cycle.8 These deficiencies could negatively impact the USMS’s ability to assess risks and provide protection for sensitive PTS data. Recommendations: We recommend that the USMS: 2. Develop a training program to ensure that users of the PTS application receive specialized training before being granted access to the application. 3. Ensure that individuals performing system administrator duties are properly trained in their responsibilities. 8 OMB defines the term "information life cycle" as the stages through which information passes, typically characterized as creation or collection, processing, dissemination, use, storage, and disposition. 6 Access Controls Access controls are designed to limit or detect access to computer programs, data, and equipment to protect these resources from unauthorized modification, disclosure, loss, or impairment. Access controls are both logical and physical. These controls are used to ensure that staff duties and responsibilities are implemented in a way that safeguards programs. In order to successfully implement the critical elements of access controls, an organization must: • • • • Classify information resources according to their criticality and sensitivity; Maintain a current list of authorized users and ensure that their access is authorized; Establish physical and logical controls to prevent or detect unauthorized access; and Monitor access, investigate apparent security violations, and take appropriate remedial action. We found that the USMS successfully classified information resources and investigated apparent security violations. However, vulnerabilities were identified as indicated in the chart below: Access Controls VULNERABILITIES NOTED CONTROL AREAS Classify information resources according to their criticality and sensitivity Maintain a current list of authorized users and ensure that their access is authorized Establish physical and logical controls to prevent and detect unauthorized access Monitor access, investigate apparent security violations, and take appropriate remedial action √ √ Maintain a Current List of Authorized Users and Ensure That Their Access is Authorized We found that the PTS’s list of authorized users contained multiple errors and inaccurate information. This resulted because USMS headquarters did not properly maintain a current list of authorized users that was coordinated with information maintained by the DOs. Additionally, the USMS did not regularly review the PTS authorized user list, validate the levels of access authorized to users, or update the user list accordingly. 7 We obtained a consolidated user list for all authorized PTS users from USMS headquarters. Officials at USMS headquarters informed us that system administrators at each DO were responsible for maintaining their respective user list by adding and deleting names. Therefore, we sorted the headquarters list by DO location to produce a list for each of the following sites we visited: Eastern District of Virginia (E/VA) in Alexandria, Virginia; the District Court for the District of Columbia (DC/DC) in Washington, D.C.; the Southern District of New York (S/NY) in New York, New York; the Southern District of Texas (S/TX) in Houston, Texas; Eastern District of Pennsylvania (E/PA) in Philadelphia, Pennsylvania; the Northern District of Illinois (N/IL) in Chicago, Illinois; the Southern District of Florida (S/FL) in Miami, Florida; and the District of Arizona (D/AZ) in Phoenix, Arizona. Our review of the eight DO lists disclosed that: a) the USMS allowed accounts to remain on the application’s authorized user list for employees who no longer required access to the PTS; and b) the authorized user list generated by USMS headquarters did not match the authorized user lists maintained at the DOs. The following chart represents specific deficiencies noted during our review of the authorized user list at each site we visited. The “total number of user accounts” column represents the total number of names appearing on the PTS authorized user list obtained from the USMS headquarters for each site visited. The figures in the “number determined invalid or unknown” column represent accounts that could not be confirmed as “valid” by the responsible system administrator. User accounts in this category were determined to be “invalid” if the names had not been removed from the user list although the user had departed the site or was no longer authorized access to the PTS application. User accounts were determined to be “unknown” if the system administrator could not attest to the users’ identity or their authority to access the application. PTS Authorized User List Sites Visited E/VA DC/DC S/NY E/PA S/TX N/IL S/FL D/AZ Totals: Total Number of User Accounts According to HQ 76 111 144 94 346 88 143 138 1140 Number Determined Invalid or Unknown by Comparing DO to HQ 16 64 33 35 113 41 45 45 392 Source: The OIG’s analysis of user lists workpapers for eight sites visited. 8 Percentage of Invalid Accounts 21% 58% 23% 37% 33% 47% 31% 33% 34% A further review of the authorized user list for each site visited revealed that erroneous or invalid entries appeared on the user list obtained from USMS headquarters. However, the system administrators provided evidence that they were properly maintaining the user list at their site. We surmised that the discrepancies involving erroneous entries and unknown accounts occurred because the consolidated user list generated by USMS headquarters was not incorporating the additions, deletions, and changes made at the DO level. The DO user lists extracted from the HQ consolidated user list contained various column headings such as userID, name, and date of the user’s last login. In addition to the deficiencies previously noted, the following deficiencies contributed to rendering accounts “invalid:” • • • • Employees’ official titles and their DO locations were improperly entered in the “name” field of the user list; Descriptions of the employees’ positions appeared in the “name” field of the user list as opposed to the users’ proper name; UserID information (e.g., last name, first initial) frequently did not match the actual user’s name that appeared on the DO list; and Entries were “missing name information,” because userIDs did not have an accompanying user name. Prior to our departure from each site, the system administrators agreed to remove entries deemed “invalid or unknown users” from their PTS-authorized user list. The above conditions do not comply with the Department’s Order 2640.2E, “Information Technology Security,” which requires that each user be identified as unique. The Department’s Order further requires access controls to ensure sys tem users can only access the resources necessary to accomplish their duties and no more. Additionally, OMB Circular A-130 requires agencies to implement the practice of “least privilege,” whereby user access to systems is restricted to the minimum level possible. Allowing “invalid and unknown” user accounts to remain on the PTS authorized user list could jeopardize the effectiveness of security features designed to restrict the user's access to only that information which is necessary for operations and for which the user has a need to know. The existence of active but invalid accounts could enable an unauthorized user to gain access to sensitive information. For example, accounts represented by an employee’s official title or position description, as opposed to a specific userID, are equivalent to generic or “guest” accounts. Guest accounts could allow various members of a DO to share the same userID and password 9 information to gain access to and make changes within a system. Any actions performed by these accounts, detrimental or otherwise, would be difficult to trace back to a specific user. OMB Circular A-130 sets forth personnel controls that strengthen access authorizations, provides for individual accountability, and emphasizes the need to hold users accountable for their actions. Ineffective access authorizations, such as allowing generic accounts to remain on an authorized user list, diminish the reliability of data and subject the system to unauthorized use, loss, or modification. Recommendation: We recommend the USMS: 4. Ensure that access authorizations for the PTS are reviewed and that USMS headquarters update its authorized PTS users list in a timely manner to incorporate changes from the DOs. Establish Physical and Logical Controls to Prevent and Detect Unauthorized Access Physical access controls consist of measures such as locking doors to facilities housing computers that process sensitive information and posting guards at entrance points to those facilities. Logical access controls involve the use of computer hardware and security software programs to prevent or detect unauthorized access by requiring users to input unique user identifications, passwords, or other identifiers that are linked to predetermined access privileges. Additionally, controls are designed to reduce the risk of errors or fraud from occurring and going undetected. Policies outlining the supervision and assignment of responsibilities to groups and related individuals should be documented, communicated, and enforced. Such controls keep individuals from subverting a critical process. As discussed previously, we determined that the PTS’s access authorizations or logical access controls were weak because USMS headquarters did not properly maintain a current list of authorized users. Physical access controls were adequately enforced at seven of the eight sites visited. However, we encountered an instance where physical access controls were not enforced to prevent or detect unauthorized access. We observed that the locks on the door to a restricted area at one location were not engaged. Adequate physical access controls to the building were provided by armed guards; however, the door to the restricted area housing 10 data terminals and sensitive PTS information was left unlocked and potentially accessible by unauthorized visitors to the building. NIST Special Publication (SP) 800-18, “Guide for Developing Security Plans for Information Technology Systems” explains that physical access controls protect computer resources and “restrict the entry and exit of personnel.” By not enforcing adequate physical access controls, the USMS exposed the PTS to the risk that unauthorized individuals could gain access to sensitive information. Additionally, the USMS’s ability to protect sensitive printed data or equipment from theft or inadvertent disclosure would be compromised if an unauthorized person entered a restricted facility containing sensitive PTS equipment and data. Recommendation: We recommend that the USMS: 5. Ensure that existing measures, such as door locks, are used to provide protection against unauthorized access to sensitive areas. Application Software Development and Change Control Application software development and change control is an essential component of an application’s system development life cycle (SDLC). These measures allow managers responsible for seeing that software supporting their operation meets the requirement of the organization and produces reliable data. An entity should institute policies, procedures, and techniques to ensure responsible individuals: • • • Authorize processing features and program modifications properly; Test and approve all new and revised software; and Control software libraries. 11 We determined that the USMS adequately tested new software and controlled its software libraries. However, our review disclosed a deficiency as indicated in the chart below: Application Software Development & Change Control CONTROL AREAS Authorize processing features and modifications VULNERABILITIES NOTED √ Test and approve all new and revised software Control software libraries Authorize Processing Features and Modifications An entity should ensure that its SDLC policies provide a structured approach that identifies who can authorize modifications to the system, and the policies should be distributed to all users. Ultimately, application end users have the primary responsibility for taking part in the design and implementation of processing features and approving subsequent changes made to the application. Although the USMS had a documented SDLC for the PTS that included instructions for requesting changes to the application, many of the PTS users at the DOs we visited were not aware of the policy and were not aware of how to formally request changes to the application. This condition exists because the USMS has not adequately disseminated established change control policies throughout the organization. The Department’s Order 2640.2E, Chapter 1, “Security Program Management,” directs components to develop a process to integrate security into various stages of a system’s life cycle and to ensure that changes to any system are controlled. Ineffective management over modifications to application software could hamper an entity’s ability to prevent knowledgeable programmers from covertly changing program code to access sensitive data. Additionally, the entity could risk the likelihood of implementing incorrect or outdated versions of operating system and application software. Failure to establish such controls could allow the introduction of malicious code that could lead to the loss or destruction of sensitive data. 12 Recommendation: We recommend that the USMS: 6. Ensure PTS users are informed of the policies and procedures for requesting changes to the application. System Software Often referred to as a “utility,” system software is used by programmers to configure a system and manage the input, processing, output, and data storage associated with all of the applications that run on a system. System software operates at a higher level than application software and can thus be used to read, modify, or delete critical or sensitive information and to bypass security controls built into application programs. Moreover, some system software can change data and program code without leaving an audit trail, such as programming software and database management systems (DBMS). 9 Weakness in controls over system software could negatively impact the reliability of information produced by applications supported by the computer system. An organization can protect the integrity of system software in the following ways: • • • Limiting access to system software; Monitoring access to and use of system software; and Controlling system software changes. Although the USMS effectively limited access to system software and monitored its use, deficiencies were noted in the area indicated in the following chart: System Software CONTROL AREAS VULNERABILITIES NOTED Limit access to system software Monitor access to and use of system software √ Control system software changes 9 DBMSs organize data in a database and manage actions such as queries and updates. 13 Control System Software Changes The PTS application consists of a database controlled by a DBMS and application programming software. The database is used to store data pertaining to the USMS’s prisoner operations and prisoner identifying information. The application’s user interface and functionality are modified using a commercial-off-the shelf programming language. We determined that the controls for the PTS’s system software changes were deficient. The USMS is using an outdated version of the database management software and programming language to support the PTS application in its production environment. According to the DBMS and application programming software vendor, the company no longer provides technical support for these products and has not done so for over five years. This condition exists because the USMS has not updated and patched these critical components although the vendor has produced three version updates since the release of the version currently used by the USMS. OMB Circular A-130 recommends that entities periodically review security controls and seek ways to improve security such as utilizing technical tools to look for security problems and installing the latest software patches. NIST SP 800-40 specifically addresses procedures for handling security patches. NIST warns that not patching information systems in a timely manner can impact operations and degrade the confidentiality, availability, and integrity of a system’s information. The USMS’s use of outdated programming and database management software could prevent the USMS from implementing security enhancements such as system security patches designed to protect the PTS application from malicious software. This deficiency also increases the risk that without timely updates, data entered into the PTS could be improperly processed by the application. Recommendation: We recommend that the USMS: 7. Remove outdated versions of the PTS’s application programming software and database management system from the production environment and replace with current versions that are supported by the vendor. 14 Segregation of Duties Segregation of duties is the practice of dividing the steps in a critical function among different individuals. In a computer processing environment, such a control assists in the prevention of one individual having complete control of the input, processing, and output stages of the information cycle and keeps a single individual from subverting a critical process. Organizations should take steps to ensure that they: • • • Segregate incompatible duties and establish related policies; Establish access controls to enforce segregation of duties; and Control personnel activities through formal operating procedures and supervision and review. Controls that sustain the proper segregation of duties enable management to maintain control over personnel activities. Additionally, segregation of duties requires the establishment of formal operating procedures as well as active supervision and review of these activities.10 We found that the USMS had adequately established access controls to enforce segregation of duties. However, deficiencies were noted within other control areas affecting segregation of duties as indicated below: Segregation of Duties CONTROL AREAS Segregate incompatible duties and establish related policies Establish access controls to enforce segregation of duties Control personnel activities through formal operating procedures and supervision and review VULNERABILITIES NOTED √ √ Segregate Incompatible Duties and Establish Related Policies Our review of the PTS disclosed that the USMS had not properly segregated incompatible duties and established related policies to ensure personnel understand their roles and responsibilities. Duties and responsibilities associated with the USMS’s PTS system life cycle were not 10 OMB Circular A-130 defines procedures as detailed steps to be followed by users, system operations personnel, or others to accomplish a particular task (e.g., preparing new user accounts and assigning the appropriate privileges). It adds that procedures normally assist in complying with applicable security policies, standards, and guidelines. 15 properly segregated among staff. At the USMS’s headquarters, only one individual is assigned to code, test, and implement changes to the PTS application. The same individual is authorized to move changes into the production environment and distribute those changes to the 94 DO servers. This condition allows a single individua l to have complete control over application programming and change control processes that should be divided among two or more individuals. The Department’s Order 2640.2E, Chapter 2, specifies the requirement for segregation of duties. The Order states that system duties should be “defined and documented.” OMB Circular A-130 discusses the requirement for personnel security and recommends that an application’s security plan incorporate measures for the separation of duties. Furthermore, NIST SP 800-12, “Computer Security Handbook” describes separation of duties as “dividing roles and responsibilities so that a single individual cannot subvert a critical process.” Control Personnel Activities Through Formal Operating Procedures and Supervision and Review We found that the USMS has not developed formal policies and procedures to guide PTS users in performing their duties. Although the USMS has published a user manual for the PTS application, the manual falls short of providing formal operating procedures to be followed during critical processes such as the record creation process and subsequent record updates. These processes directly affect the confidentiality, integrity, and availability of the PTS data. Due to the lack of policies and procedures, we found that the record creation process was not standardized at any of the DOs we visited and that this condition exists throughout the USMS. Following our site visits, we conferred with program managers for the PTS application who informed us that USMS headquarters has not provided formal operating policies and procedures to standardize the record creation process nor has it established standards for the collection of source information used to create prisoner records in the PTS. In the absence of formal policies and procedures, USMS headquarters and DOs had not formally established compensating controls such as requiring adequate supervision or review of information once a record is created or updated in the system. We observed that all DOs we visited operated differently with respect to the record creation process. We also found that while some DOs performed minimal supervisory reviews, others did not perform any supervisory reviews because they were not required to do so. Supervisory reviews, performed on a consistent basis, would help to detect the types of completeness and accuracy errors we found during our review of PTS data. 16 Without proper segregation of duties, the USMS increases the risks that erroneous or fraudulent transactions could be processed by the PTS and that computer resources could be damaged or destroyed. Additionally, without the USMS providing adequate controls over personnel activities, mistakes within the PTS could occur and go undetected and expose the application and its data to unauthorized use, loss, or modification. Recommendation: We recommend that the USMS: 8. Ensure policies and procedures for segregating duties are developed and enforced to provide assurance that distinct functions are performed by different individuals and that no individual has complete control over the PTS’s processing functions. Service Continuity Service continuity measures provide for the capability to protect information resources and minimize the risk of unplanned interruptions. Service continuity controls involve ensuring that when unexpected events occur, critical operations continue without interruption or are promptly resumed and the organization’s sensitive data are protected. To review the adequacy of its service continuity control, an entity should: • • • • Assess the criticality and sensitivity of computerized operations and identify supporting resources; Take steps to prevent and minimize potential damage and interruption; Develop and document a comprehensive contingency plan; and Test the contingency plan periodically and adjust it as appropriate. 17 The USMS had developed a contingency plan for the PTS application. However, we found other deficiencies within service continuity controls for the PTS application as indicated below: Service Continuity CONTROL AREAS VULNERABILITIES NOTED Assess the criticality and sensitivity of computerized operations and identify supporting resources Take steps to prevent and minimize potential damage and interruption Develop and document a comprehensive contingency plan Test the contingency plan periodically and adjust it as appropriate √ √ √ Assess the Criticality and Sensitivity of Computerized Operations and Identify Supporting Resources We determined that the USMS successfully assessed the criticality and sensitivity of the PTS. However, we found that the USMS was deficient in identifying supporting resources within the DOs, which according to FISCAM includes human resources. Specifically, the USMS had not implemented a means to identify employees with service continuity responsibilities to users within the DOs, such as making an emergency contact list available to users at each site. Although the USMS maintained emergency contact lists at its headquarters, this deficiency occurred because the USMS did not require the DOs to maintain emergency contact lists to identify supporting resources on-site. Consequently, we found that the majority of the DOs did not maintain lists or make this information available to users. NIST SP 800-34, “Contingency Planning Guide for Information Technology Systems,” identifies contact lists as an element of an effective contingency plan and recommends the frequent review of such lists. We also found that the USMS did not distribute its contingency plan, which contains emergency contact information, to supporting resources at the DOs – although execution of the contingency plan requires support from the system administrators assigned to the DOs. NIST SP 800-34 states that copies of contingency plans are typically provided to persons with service continuity responsibilities, such as the system administrators at the DOs. 18 We found that the information regarding emergency notifications was contradictory. The USMS PTS contingency plan identifies the Help Desk as the point -of-contact for service disruptions. The plan also states that the system administrator is responsible for maintaining the PTS servers at each field location and for reporting failures.11 However, the plan presents an emergency response scenario wherein the system administrator would notify the Help Desk if the PTS server in the DO were disabled or unavailable. This scenario implies that system administrators, who are assigned to the DOs, are logically the first responders to users within the DOs and would most likely be contacted in case of emergency. The absence of an emergency contact list to identify individuals at the DOs with service continuity responsibilities could cause users to become confused as to who should be notified in the event of an emergency, especially during non-duty hours. Additionally, without a copy of the USMS contingency plan for the PTS, individuals identified as supporting resources could become confused as to their service continuity roles and responsibilities. In addition to our findings regarding the clear identification of supporting resources, we also found problems with the competence of those individuals involved in emergency response procedures. This occurred because the USMS had not required or provided sufficient training for employees with service continuity responsibilities. NIST SP 800-18 provides guidance for developing security plans for information technology (IT) systems. The guidance states that responsible individuals should be designated as points-of-contact for a system and that the individuals should be knowledgeable about the system. We reviewed the system administrator position description and verified that the system administrators are designated as the primary representative at the DOs for IT functions and are responsible for responding to emergency situations. The position description specifically states that the employee must possess knowledge of IT systems “recovery” methods and practices. However, we found that system administrators, who were expected to assist with service continuity functions, lacked sufficient training to support the restoration of the application and its data files. Many of the system administrators at the sites we visited did not know specific characteristics of the system that would enable them to respond appropriately in case of an emergency. Specifically, system administrators did not know the version of the application running on their server or the location of their PTS database. 11 According to the USMS PTS Contingency Plan dated June 2003. 19 In the event of an emergency or system abnormality, system administrators who are not properly trained could impede restoration of the data files and software by failing to respond appropriately. Recommendation: We recommend that the USMS: 9. Ensure that: a) employees involved in emergency response procedures are identified and trained in their emergency roles and responsibilities; and b) emergency contact lists are maintained on-site. Take Steps to Prevent and Minimize Potential Damage and Interruption Two aspects of preventing and minimizing damage or interruption of service to users of the PTS application include ensuring that: a) data and program backup procedures have been implemented; and b) staff have been trained to respond to emergencies. Our review disclosed that backup tapes created at three of the DOs we visited were not consistently rotated off-site. This occurred because the USMS did not take steps to prevent and minimize potential damage and interruption by securing backup data away from the processing facility. Additionally, the USMS did not enforce its own guidelines for backup operations. The PTS security plan addresses contingency planning and states that backups should be created nightly and transferred off-site once a month. NIST SP 800-34, “Contingency Planning Guide for Information Technology Systems,” addresses backup methods. The guidance requires that backup policies be established and backup data stored off-site. Consequently, the USMS may lose the capability to restore the PTS’s application software and data by relying on insufficient preventative measures to mitigate service disruptions if tapes are not properly secured at an off-site location. We also found that the USMS did not effectively ensure that staff had been trained to respond to emergencies, another aspect of minimizing 20 service interruptions. As discussed in the previous section regarding identifying supporting resources, we found that system administrators lacked sufficient knowledge of their system environment to provide support of recovery functions and that copies of the contingency plan that specified emergency roles and responsibilities had not been distributed to the DOs. Therefore, we recommended the USMS provide training for employees involved in emergency response procedures in Recommendation 9. Recommendation: We recommend that the USMS: 10. Ensure the PTS’s backup tapes are properly rotated and stored at an off-site location. Test the Contingency Plan Periodically and Adjust It As Appropriate Although the USMS has developed and documented a contingency plan for the PTS application, it has not tested the plan. The Department’s Order 2640.2E, Chapter 1, sets standards for contingency planning. It directs components to develop a contingency plan and test the plan annually. Furthermore, OMB Circular A-130 advises that untested contingency plans “may create a false sense of ability to recover in a timely manner.” The USMS places the PTS application and its data at risk by having an untested contingency plan for PTS. This deficiency could prevent the USMS from achieving timely restoration of critical PTS system information and diminish the assurance for continuity of operations in the event of a disaster. Recommendation: We recommend that the USMS: 11. Perform annual testing of the PTS contingency plan as required by the Department. 2. APPLICATION CONTROLS Application controls are the structures, policies, and procedures that apply to application systems. Application controls include both the routines built into the computer program code and the external safeguards provided by users. External safeguards include manual measures performed by the 21 user such as reviewing output reports to determine that the computer processes data accurately. Application controls help make certain that transactions are valid, properly authorized, and completely and accurately processed by the computer during all three phases of a processing cycle – input, processing, and output. At the time of input, data should be authorized, converted to an automated form, and entered into the system. This transaction is expected to be accurate, complete, and occur in a timely manner. For the processing phase, the computer accepts the data entered and files are updated in the system’s database. Lastly, in the output phase, files and reports are generated by the system and the results are expected to yield an accurate processing of the data entered into the system. Controls should be in place to ensure that system outputs are controlled and distributed only to authorized persons. To assess the effectiveness of application controls for the PTS, we reviewed authorization, completeness, accuracy, and integrity of processing controls. We identified deficiencies within all of the application control areas. Authorization Controls Authorization controls are designed to ensure the validity of system transactions, and that the transactions performed represent an event that actually occurred during a given period. These controls regulate access to network resources and ensure that data is properly converted to an automated form so it can be processed accurately, completely, and timely. Effective authorization controls should protect the data input process and include the following critical elements: • • • All data are authorized before entering the application system; Restrict data entry terminals to authorized users for authorized purposes; and Master files and exception reporting help ensure all data processed are authorized. 22 The USMS effectively used master files to help ensure that all data are processed. However, the following deficiencies were noted as indicated below: Authorization Controls CONTROL AREAS All data are authorized before entering the application system Restrict data entry terminals to authorized users for authorized purposes Master files and exception reporting help ensure all data are processed and are authorized VULNERABILITIES NOTED √ √ All Data Are Authorized Before Entering the Application System In order to ensure that all data are authorized before entering the application system, the FISCAM recommends that entities should implement measures to: a) control source documents and require authorizing signatures; and b) ensure supervisory reviews of data occur before entering the application system. The guidance acknowledges that paper source documents continue to play an important role during the data collection process. It cautions, however, that source documents should be controlled at the earliest point in the process and the data should be approved for use prior to entering the system. FISCAM also outlines requirements for performing independent or supervisory reviews of data regardless of the source. Our review disclosed deficiencies within both areas designed to ensure the proper authorization of data. Control source documents and require authorizing signatures We found that the USMS had not established controls over source documents, nor provided for their proper authorization. The GAO defines a source document as information that serves as the basis for the entry of data into a computer system. At all sites visited, we experienced difficulty in verifying the validity of the transactions we reviewed on PTS output reports due to the absence of source documents or because of inconsistencies with the collection and authorization of source documents. Therefore, the USMS was not able to attest to the validity of many transactions entered into the PTS or support the actions taken by its employees. This condition occurred because the USMS had not formally established baseline requirements for source documents to provide a 23 reasonable assurance that critical identifying information is collected from a reliable source and is properly authorized. Additionally, the USMS had not implemented effective controls to ensure the proper authorization of data obtained from source documents prior to that data being used in PTS transactions. Because baseline requirements for source documents had not been established by the USMS, we consulted the USMS employees performing record creation duties at the sites visited to determine what documents were used as source documents during the record creation process for the PTS. According to these employees, “key” source documents us ed to support the record creation process included: the individual custody and detention form (USM-129); FBI fingerprints card (FD-129); intake photo; and medical form (USM-552). However, we found that because the USMS did not require employees to collect these source documents on a consistent basis, some DOs were not creating records based on documentation, but rather on interviews with prisoners. This occurred because the USMS had not formally established baseline requirements for source documents, such as the ones identified by USMS personnel, to provide a reasonable assurance that critical identifying information is collected from a reliable source and is properly authorized. The USMS Cellblock Operations Directive advises employees to interview the prisoner during the initial intake process and collect identifying, arrest, prosecution, and medical information from the prisoner. The directive instructs employees to then enter the information obtained from the prisoner into the PTS to create a prisoner record. Under these conditions, the USMS is basing the reliability of the information collected on the integrity of the prisoner. Furthermore, the directive does not require that information be approved by an authorizing official or verified from other presumably more reliable sources such as court documents or forms completed by arresting officers. OMB Circular A-130 advises federal agencies of the requirement for records management and states that agencies should “create and keep adequate and proper documentation of their activities.” 12 OMB also warns that the lack of sufficient record keeping weakens agencies’ ability to 12 According to OMB, the term "records management " involves those managerial activities that support records creation, records maintenance and use, and records disposition. Records management allows agencies to achieve adequate and proper documentation of the policies and transactions of the federal government and effective and economical management of agency operations. (44 U.S.C. 2901(2)) 24 responsibly perform their missions. OMB emphasizes the importance of record-keeping activities in each stage of a system’s life cycle and directs agencies to document their procedures for information collection. By failing to establish standards and controls over source documents and provide for the proper authorization of data, the USMS is jeopardizing the reliability of information collected during the record creation process. The reliability of data that serves as the basis for creating records in the PTS has a direct impact on the confidentiality, availability, and integrity of the data within the PTS. Throughout our review, we also found inconsistencies with the collection of source documents, the authorization of data, and the maintenance of source documents within each prisoner’s file folder. We noted that each DO essentially performed data collection, record creation, and file maintenance functions differently. These inconsistent practices resulted in the deficiencies discovered during our assessment of the PTS’s data integrity. Specifically, we discovered findings within the PTS’s completeness of information and accuracy of information. This occurred because the USMS had not standardized the record creation process throughout the USMS to aid in establishing control over source documents. The GAO’s guidance for assessing data reliability emphasizes the need for organizations to establish and adhere to standardized rules for the collection and use of data in computer processing environments. Additionally, adherence to the consistent interpretation of data rules, or the use of standardized processes, contributes to data reliability. The guidance stresses that standardization and consistency are particularly important to systems where data is entered at multiple sites, such as the PTS. The guidance asserts “inconsistent interpretation of data rules can lead to data that, taken as a whole, are unreliable.” Failure to establish and enforce standardized procedures during critical processes, such as the record creation process for the PTS, could negatively affect the reliability of data within the PTS and impact the mission of the USMS. We determined that the USMS’s cellblock directive and user manual do not provide adequate data rules for employees or set standards for consistency during the record creation process. In the case of the PTS, formal standards would ensure, at a minimum, that each prisoner file folder contains photographs, medical information, and fingerprint cards; and that critical identifying information is collected from a reliable source such as a court document or agent arrest form. These standards could also provide reasonable assurance against the misidentification or mishandling of a prisoner due to inaccurate, unauthorized, or unreliable data. 25 Recommendation: We recommend that the USMS: 12. Develop policies and procedures to: a) establish key source document requirements; and b) standardize the record creation process throughout the USMS for the PTS. Ensure supervisory reviews of data occur before entering the application system We also found that supervisory or independent reviews of source document information were not being performed on a consistent basis prior to the information being entered into the PTS. This was evidenced by the fact that handwritten “Individual Custody and Detention” (USM-129) forms, when used, did not always contain an authorizing signature. We observed that some DOs provided supervisory reviews during the record creation process while others did not. In addition, our review of prisoner file folders for accuracy of information disclosed discrepancies between information on source documents and information on the PTS output reports. We determined that these inaccuracies could have been prevented through the use of compensating controls such as supervisory reviews. This condition existed because the USMS did not require DOs to perform supervisory reviews of source documents and transactions. In the absence of policies and procedures, supervisory reviews serve as a compensating control to ensure the proper authorization of source documents and transactions. OMB Ci rcular A-130 prescribes the use of controls that monitor individual accountability and prevent and detect harm caused by “authorized individuals engaged in improper activities, whether intentional or accidental.” Recommendation: We recommend that the USMS: 13. Implement a control, such as requiring the supervisory authorization of data, to ensure that before information is entered into the system, transactions are supported by properly authorized source documents. 26 Restrict Data Entry Terminals to Authorized Users for Authorized Purposes The USMS has not implemented automated controls to trace actions on the system or ensure that data entry terminals are restricted to authorized users for authorized purposes. In our judgment, this weakness exists because the USMS does not maintain sufficient audit trails for the PTS application or require exception reports generated from audit logs. These reports could help identify unauthorized activities such as excessive errors made by an employee, record deletions, or attempts to gain access to resources to which the user is not authorized. The Department’s Order 2640.2E, Chapter 2, “Security Requirements” (Accountability and Audit Trails), requires that audit logs be maintained and reviewed for activities that could modify, bypass, or negate the system's security safeguards. Audit logs provide a measure of assurance to enforce individual user accountability. The USMS has not implemented automated controls to trace the occurrence of unauthorized activities or look for patterns of behavior by users of the PTS application. Therefore, USMS management has reduced its ability to monitor unauthorized attempts by users who have access to sensitive data above their access levels, unauthorized changes or deletions to prisoner records, or activities of users with privileged accounts. These vulnerabilities could impact the integrity of data within the PTS application. Recommendation: We recommend that the USMS: 14. Maintain and review audit trails for the PTS application as required by the Department. Completeness Controls Completeness controls are designed to ensure that all authorized transactions are processed and completed prior to being entered into the computer. These controls include the use of record counts and control totals, computer sequence checking, computer matching of transaction data with data in a master or suspense file, and checking of reports for transaction data. 27 Completeness controls in an application provide safeguards for ensuring that: • • All aut horized transactions are entered into and processed by the computer; and Reconciliations are performed to verify data completeness. Our review of the USMS’s completeness controls for the PTS disclosed a deficiency as indicated in the following chart: Completeness Controls CONTROL AREAS All authorized transactions are entered into and processed by the computer VULNERABILITIES NOTED √ Reconciliations are performed to verify data completeness All Authorized Transactions Are Entered Into and Processed by the Computer In our review of completeness controls, we found that mechanisms built into the PTS application to perform computer sequence checking were inadequate for the PTS environment. This condition exists because the current configuration of the PTS application is restrictive in that the default system configuration confines sequence checking to the information contained in the local database and does not automatically extend the search to other DO databases. The USMS Cellblock Operations Directive dictates that a prisoner will be assigned only one USMS number throughout their history with the agency. This would require that all 94 DO databases be searched to determine if the prisoner being processed has an existing USMS number assigned by another district before a district issued a USMS number. The PTS application’s current software configuration is not conducive to automatically facilitate global database searches for prisoners’ USMS tracking numbers and name information because the USMS maintains a separate PTS database at each of its 94 DOs. Under the current configuration, PTS users can (by default) search only their local database to determine if a prisoner has been previously assigned a USMS number in their district. The PTS application is not programmed to automatically extend the search to other DO databases. 28 In order to determine if a prisoner has an existing USMS number that was assigned in another district, the PTS user must manually connect to the PTS database where the original USMS number and prisoner information is maintained. In the absence of knowing where the USMS number originated, the PTS user would have to manually perform 93 additional database searches to determine if a USMS number exists for the prisoner in another DO. In its own directive regarding cellblock operations, the USMS advises PTS users to exit the application and go to the Federal Bureau of Prisons’s (BOP) SENTRY application to search for the existence of a previously assigned USMS number. 13 This workaround solution is impractical because it forces PTS users to seek USMS information outside their own component that should be readily available on USMS systems. Additionally, not all users of the PTS application have access to BOP SENTRY; therefore, those users are restricted from performing the search within SENTRY to check for a preexisting USMS number before assigning a new USMS number. The current configuration of the PTS application constrains a name search to the local database. This constraint threatens compliance with the USMS’s own directives regarding multiple USMS numbers. Additionally, it does not provide adequate assurance to the USMS that multiple USMS numbers will not be assigned to the same individual. Recommendation: We recommend the USMS: 15. Ensure that the PTS application is modified to perform automatic global database searches of all its DO databases to prevent the assignment of more than one USMS number to the same prisoner. Accuracy Controls Accuracy controls are implemented to ensure that data recording is valid and accurate in order to produce reliable results. The implementation of these controls includes well-designed data entry processes, easy-to-follow data entry screens, limit and reasonableness checks, and validation of 13 The OIG conducted a Review of Select Application Controls for the BOP SENTRY application in its Audit Report No. 03-25, July 2003. SENTRY is BOP’s primary mission support database. The system collects, maintains, and tracks critical inmate information, including inmate location, medical history, behavior history, and release data. 29 override actions for appropriateness and correctness. Without accuracy controls, invalid data may enter the system and produce unreliable results. Entities can take steps to strengthen the effectiveness of accuracy controls by making sure that: • • • • Data entry design features contribute to data accuracy; Data validation and editing are performed to identify erroneous data; Erroneous data are captured, reported, investigated, and corrected; and Output reports are reviewed to help maintain data accuracy and validity. We determined that the PTS’s data entry design and data validation and editing features were adequate. However, our review identified weaknesses with accuracy controls within the PTS application as indicated below: Accuracy Controls CONTROL AREAS VULNERABILITIES NOTED Data entry design features contribute to data accuracy Data validation and editing are performed to identify erroneous data Erroneous data are captured, reported, investigated, and corrected Output reports are reviewed to help maintain data accuracy and validity √ √ Erroneous Data Are Captured, Reported, Investigated, and Corrected Our review of accuracy controls for the PTS application disclosed that erroneous data within the system was not identified, reported, investigated, nor corrected. Information on erroneous data is useful in forming a basis from which management can review and analyze the levels and types of transaction errors and formulate plans for corrective action. However, we found that information on rejected transactions and erroneous data was not analyzed because the USMS management did not require erroneous data to be collected and reported back for investigation and correction. NIST SP 800-12, Chapter 4, “Common Threats,” warns that errors and omissions can threaten data and system integrity. It classifies some errors 30 as threats, because users frequently make errors that result in security problems. The guidance recommends that because application programs cannot detect all types of input errors or omissions, erroneous data should be reviewed to determine if errors cause threats to a system or result in vulnerabilities. The NIST Federal Information Processing Standards Publication 73, Section 3.1.3, states that checking of input data during processing and validation of data that is generated by the application system are essential for assuring data integrity. Errors in PTS data should be detected and corrected as soon as possible in order to prevent the propagation of invalid data throughout the system and the potential contamination of the system application. Without the USMS effectively implementing measures to strengthen accuracy controls, invalid data may be entered in the system, be processed by the system, and cause production results that are unreliable to the system users. Our review of the PTS output reports for accuracy of the information reflects the existence of errors and omissions that accuracy controls are designed to detect. Recommendation: We recommend that the USMS: 16. Ensure erroneous data are collected and reported back to USMS management for investigation and correction. Output Reports Are Reviewed to Help Maintain Data Accuracy and Validity A critical element of accuracy controls includes the review of output reports to help maintain data accuracy and validity. An aspect of enforcing the review of output reports consists of maintaining control over system output production and distribution. We determined that the controls over system output production and distribution for the PTS application were weak because the USMS did not enforce strict controls to prevent the exposure of sensitive PTS output to non-authorized employees. The USMS allows authorized PTS users and non-authorized USMS employees to share the same network printers. This poses a problem with the district office’s ability to adequately protect sensitive output production and distribution from non-authorized employees who have physical access to network printers. We also observed that cover pages are not used to 31 safeguard sensitive PTS data from viewing by unauthorized individuals when the output is printed on network printers. Cover pages could serve as a mitigating control to identify the owner of the printed output on shared printers. NIST SP 800-53, “Recommended Security Controls” provides guidance for protecting sensitive information to prevent the unauthorized receipt of paper media. It cautions that entities should provide adequate supervision of personnel and develop detailed procedures to ensure that unauthorized individuals cannot read, copy, alter, or destroy information generated by the information system in printed form. Additionally, the guidance stresses assurances that “Output from the information system is given only to authorized users.” The Department’s Order 2640.2E, “Access Control,” requires that users only have access to information necessary to perform their duties and no more. Moreover, it requires that controls be in place to ensure that users can only access resources critical to the accomplishment of their duties. OMB Circular A-130 also provides requirements for information safeguards. It states that information protected by the Privacy Act of 1974 should be collected, maintained, and protected to prevent disclosure of personal information and intrusion into the privacy of individuals. The Circular holds agencies responsible to see that appropriate information safeguards are instituted and that employees are trained in the protection of privacy. By allowing authorized PTS users to print sensitive PTS output on network printers shared by non-authorized USMS employees, the USMS is neglecting critical physical security measures that protect against unauthorized access. This vulnerability poses a threat to the USMS’s ability to comply with federal regulations that require protection of privacy information from unauthorized disclosure. It also undermines the USMS’s efforts to effectively enforce appropriate access control and segregation of duties. Recommendation: We recommend the USMS: 17. Ensure that PTS output reports containing sensitive privacy information are protected from unauthorized persons. 32 Controls Over Integrity of Processing and Data Files Controls over integrity of processing and data files are used to ensure that the current versions of production programs and data files are made available to users during system processing. These controls prevent users from accessing outdated versions of software that may be present in the production environment. Controls over integrity of processing and data files include: • • • • Procedures that ensure that the current version of production programs and data files are used during processing; Programs with routines that verify that the proper version of the computer file is used during processing; Programs with routines that check for internal file header labels before processing; and Mechanisms within the application that protect against concurrent file updates. We found that procedures existed to ensure that the current versions of production programs, data files, and computer files are used during processing and that programs check internal file header labels before processing. However, we discovered the following deficiency in the control area indicated below: Controls Over Integrity of Processing and Data Files CONTROL AREAS Procedures ensure that the current version of production programs and data files are used during processing Programs include routines to verify that the proper version of the computer files is used during processing Programs include routines for checking internal file header labels before processing Mechanisms within the application protect against concurrent file updates VULNERABILITIES NOTED √ Mechanisms Within the Application Protect Against Concurrent File Updates Our review of the PTS application disclosed deficiencies within the controls that prevent concurrent updates of files. According to USMS headquarters, the PTS application is distributed to each of the 94 DOs. USMS headquarters also asserted that system administrators at each site cannot modify the PTS’s functionality and that the application should 33 function uniformly. However, we discovered malfunctions with the controls built into the application to prevent concurrent file updates. We performed testing at all DO locations visited, and at four locations we observed that the controls against concurrent updates did not work consistently. PTS users were able to access the same prisoner record and make changes to the database simultaneously. OMB Circular A-130 recommends that entities periodically review security controls and seek ways to improve security such as utilizing technical tools to look for security problems and installing the latest software patches. NIST SP 800-40 specifically addresses procedures for handling security patches and confirms that many organizations fail to keep software updated and patched. It warns that not patching information systems in a timely manner can impact operations and degrade the confidentiality, availability, and integrity of a system’s information. Weaknesses with controls that protect against the concurrent update of records within an application threaten the integrity of its data. When multiple users of the application can access the same prisoner record and make changes to the database simultaneously, there is no assurance that the information in the record is correct or that the application has processed the information properly. It appears that this weakness occurred because the USMS did not ensure that all of its DOs received identical versions of the PTS application or that the existing versions were not patched in a timely manner. Specifically, USMS should confirm that the version of the PTS application in production at each site contains the full security controls, including those designed to prevent simultaneous updates to protect the integrity of data. Recommendation: We recommend the USMS: 18. Ensure that each installation of the application protects against simultaneous updates of the same record by more than one end-user. 3. DATA INTEGRITY TESTING The goal of maintaining data integrity is the assurance that information processed by the computer is reasonably complete and accurate and meets the needs of the organization. Completeness and accuracy of information reflect how well data integrity is maintained. 34 • • Completeness of information. This requires that the PTS records contain all necessary data elements and transactions are supported by source documents; and Accuracy of information. Information on the PTS output reports reflect the data entered into the PTS from source documents. Our review of the factors that contribute to data integrity disclosed deficiencies within the areas indicated below: Data Integrity Assessment Factors VULNERABILITIES NOTED Completeness of Information Records contain all of the data elements and documents used as support for the transactions Accuracy of Information Output reports reflect the data obtained from the source documents √ √ Completeness of Information Completeness is achieved when data elements are processed as intended and source documents are maintained to support the results of processing. We evaluated the completeness of prisoner file folders to determine if PTS data were properly authorized and supported by adequate and proper documentation. Our review for completeness of information focused on the existence of key source documents in prisoner records as discussed earlier in the authorization controls section of this report. Records contain all of the data elements and documents used as support for the transactions We found that many of the prisoner file folders reviewed were missing information used to validate data entry transactions and to substantiate the actions taken by USMS personnel. This occurred because the USMS did not establish and implement standards regarding data collection and comply with federal records retention requirements. 35 The chart below details the number of occurrences for source document discrepancies found during the review of 25 records at each site, and the percentages were calculated against the total number of records (200) reviewed at all sites. PTS’s Prisoner File Folder Completeness Analysis Sites Visited E/VA DC/DC S/NY E/PA S/TX N/IL S/FL D/AZ Totals: Percentage: Source: Missing Original USM-129 & 312 7 2 2 5 7 5 1 9 38 19% Missing Photos 3 5 1 10 3 0 0 3 25 13% Missing Fingerprint Cards (FD-129) 1 2 2 1 3 0 0 6 15 8% Missing USM-552/553 (medical form) 2 22 4 24 11 24 3 2 92 46% The OIG’s analysis of record completeness. OMB Circular A-130 outlines an information management policy that includes records retention requirements and advises agencies to record sufficient information to ensure the management and accountability of its programs. Additionally, the guidance directs agencies to incorporate records management functions into a system’s SDLC that include maintaining adequate and proper documentation of agency activities. Furthermore, OMB directs agencies to provide training and guidance to all employees regarding their records management responsibilities, especially with respect to maintaining adequate and proper documentation of program activities to protect the federal government’s legal and financial interests. Incomplete prisoner file folders pose a significant risk to the USMS’s ability to validate PTS transactions, verify information, and justify the actions of its employees. Recommendation: We recommend the USMS: 19. Ensure that adequate and proper source documents are maintained in prisoner file folders to substantiate employee activities. 36 Accuracy of Information Information is considered accurate if the results of computer processing reflect the contents of source documents. Accuracy of information can be verified by the periodic spot-checking of system output reports to validate and confirm that the application has processed the data entered into it correctly. Output reports reflect the data obtained from the source documents System output is evidence of the results of the input and processing functions of an application and reflects the effectiveness of such operations. If reviewed, output reports help to maintain the accuracy and validity of data within a system and determine the completeness of processing. The USMS’ form 129 (USM-129) is the PTS application’s output report resulting from prisoner record creation and subsequent record updates. After performing the analysis for the existence of key source documents used to create and update prisoner records, we reviewed the same prisoner file folders for accuracy of information. This review included the manual inspection of source documents contained in prisoner file folders. The source documents were then compared against the information appearing on the prisoner’s USM-129 form (PTS’s output report) to determine data accuracy. Our review of output reports produced by the PTS application disclosed discrepancies in the accuracy of information. We found that prisoner identifying information, such as a prisoner’s date of birth (DOB) and social security number (SSN), appearing on the PTS output reports did not always match the source documents contained in the prisoner’s file folder. Additionally, critical dates, such as a prisoner’s custody date, did not always correlate with dates on source documents in the prisoner file folders. Such dates are used by the USMS to calculate expenditures for reimbursements to contract jail facilities. We noted common deficiencies in eight areas. These areas included: • • • • • • • • Incorrect DOB; Incorrect SSN; Misfiled documents; Concurrent jail days; Misnumbered file jackets (prisoner’s file folder); Missing transactions; Wrong dates (such as custody and sentence dates); and No supporting documentation. 37 The chart below illustrates the results of our review of the PTS’s output reports. The numbers in each column represent the number of inaccuracies found during the review of 25 records at each site. The percentages were calculated against the total number of records (200) reviewed. Accuracy of PTS’s Output Reports Incorrect DOB Incorrect SSN Misfiled Documents Concurrent Jail Days Misnumbered File Jackets Missing Transactions Wrong Dates No Supporting Documentation E/VA 2 1 1 1 0 7 8 18 DC/DC 1 2 0 1 1 7 10 23 S/NY 0 0 0 0 0 1 8 5 E/PA 0 1 2 0 3 0 2 21 S/TX 4 0 0 0 3 0 12 20 N/IL 1 1 0 0 0 0 7 25 S/FL D/AZ 0 1 1 0 0 1 0 0 5 0 2 1 7 1 24 15 Total: 9 6 4 2 12 18 55 151 5% 3% 2% 1% Percentage: 6% 9% 28% 76% Source: The OIG’s analysis of data accuracy. DOB and SSN information. This information is used to distinguish between prisoners with identical names. We found instances where documents in the prisoners’ file folders did not match the DOB or SSN information appearing on the PTS’s USM-129 report. Misfiled documents. We discovered documentation pertaining to one USMS prisoner erroneously filed inside another prisoner’s file folder. Prisoner file folders contain records of court proceedings such as writs,14 judgment and commitment orders, and warrants that are used to initiate and substantiate updates to prisoner records. A document filed in the wrong prisoner’s file folder could delay or prevent the processing of a time-sensitive prisoner action such as a release, movement, or designation to a BOP facility. Concurrent jail days. These represent instances where entries in the chronological prisoner history section of the USM-129 indicated that a prisoner was housed at two different jail facilities on the same dates. USMS uses the number of jail days to calculate monthly obligations to state and local contract jail facilities. Therefore, jail day discrepancies could negatively 14 Writs are formal legal documents that order or prohibit some action. For exa mple, a “Writ Ad Testificandum” is a legal document ordering a witness to testify in a court proceeding. 38 impact the accurate payment of bills causing the USMS to pay for contract jail services it did not receive. Misnumbered file jackets. At one site visited, we experienced difficulty locating a prisoner’s file folder because the USMS number on the file folder did not match the prisoner’s USMS number. We also observed what appeared to be a re-constructed file folder because the prisoner’s USM-129 showed substantial confinement history, but the file folder had little or no contents and was missing the minimal source documents such as photographs and fingerprint cards. An error of this nature could prevent USMS personnel from locating records in a timely manner or result in the need to “reconstruct” a prisoner file folder for the prisoner in custody. Missing transactions. We identified occurrences where documentation existed in the prisoner’s file folder that changed the prisoner’s status, but the transaction was not entered into the PTS. Specifically, the prisoner’s file folder contained documentation that would trigger an update action such as the receipt of a judgment and commitment order, but the appropriate transaction to update the record was not entered into the PTS (WT-J/C).15 Again, this type of discrepancy could prevent or delay a time-sensitive transaction from being entered into the PTS. Wrong dates. These were identified when comparing the PTS’s system output (USM-129 report) with the agent’s arrest form source document. Incorrect entries were identified for critical dates – the prisoner’s arrest date and USMS custody date. Discrepancies with the prisoner’s arrest date and USMS custody date directly affect the credit a prisoner receives for time served and also factor in the calculation for jail days used to reconcile jail bills and other expenditures. No supporting documentation. At all sites visited, we found that prisoners’ file folders were missing documents that were needed to substantiate record update actions taken by the USMS personnel. In these instances, we determined that documentation did not exist for many of the status code transactions and the majority of the facility history transactions that chronicled prisoner movements. Specifically, key documents, such as prisoner manifest forms, were not consistently maintained in the prisoner’s 15 The code “WT-J/C” is the status code for a sentenced prisoner for whom the district has not yet received the Judgment/Commitment (J&C) papers to confirm the sentence information. Upon receipt of the J&C, the district may send a request to BOP in order to determine which BOP facility the prisoner will serve the period of confinement. 39 file folder or filed in the DOs for longer than one year. 16 Other supporting documents, such as “requests for designation” or correspondence from the BOP that justified prisoner movements, were also not maintained in the prisoner file folders we reviewed. We found a significant number of errors with respect to the accuracy of information on system output and with the completeness of prisoner file folders records. We attributed the existence of these conditions to the lack of policies and procedures to standardize the intake process, as well as the lack of supervisory review of data before it is entered into the PTS application. Recommendation: We recommend that the USMS: 20. Ensure that data integrity assurances and quality control measures are developed and implemented to: a) require the periodic spot-checking and validation of output from the PTS; and b) confirm that the processing of information is correct. III. CONCLUSION The weaknesses identified in our review of select general controls included problems with entity-wide security planning and management. We found that the USMS has not appointed a security manager for PTS and the organization did not ensure that employees receive specialized PTS training either before accessing the system or within a reasonable period thereafter. Weaknesses with segregation of duties occurred because the USMS has not developed and implemented formal operating policies and procedures to guide users in the performance of their duties. Furthermore, the organization has not developed policies to segregate incompatible duties. We also found that PTS users were not familiar with the USMS’s application software development and change control procedures and that the USMS is using outdated programming and database management 16 According to USMS Policy Directive No. 99-47, Cellblock Operations, prisoner manifest forms such as the USMS’ Form 40/41, “Prisoner Remand or Order to Deliver & Receipt for U.S. Prisoners,” are executed to reflect the transfer of custody during the release of prisoners to the temporary custody of law enforcement officers. 40 software to support the PTS, a mission-critical application. We determined that access controls were inadequate because the PTS authorized user list was not properly maintained and physical access controls designed to protect data terminals that process sensitive PTS information were not enforced. Our review of the PTS’s application controls disclosed that controls to properly authorize data and validate transactions were deficient. Specifically, we found tha t the USMS had not established proper authorization controls or standards for key source documents used to create prisoner records in the PTS. Additionally, supervisory reviews of source documents and transactions were not being performed on a consistent basis to mitigate this condition. We also discovered that audit logs used to recreate events and track user activity were not being kept. Problems with accuracy controls included weaknesses with erroneous data not being collected or reported back to management for investigation or correction. Furthermore, the USMS failed to control system output reports by allowing authorized PTS users to share printers with non-authorized USMS employees. Deficiencies with completeness controls involved the USMS’s failure to enforce its own policy that dictates that a prisoner may not have more than one USMS prisoner number. To complicate matters, the current PTS configuration does not provide for universal computer sequence checking to prevent the assignment of multiple USMS numbers to the same prisoner. In addition, we found that the application did not consistently enforce controls over integrity of processing and data files. We observed that the system allowed concurrent file updates when two users were able to update the same prisoner record at the same time. Problems were identified with data integrity for the PTS application during our review of prisoner records for completeness and in our checks for accuracy of information contained in system output. We found that prisoner file folders were missing key source documents critical to the record creation process and that the proper documentation needed to substantiate actions taken by USMS personnel was not maintained in the folders. We consider our findings in the areas of select general controls, application controls, and data integrity to be major weaknesses that pose a high risk to the protection of its data from unauthorized use, loss, or modification. We conclude that the weaknesses with select general controls and application controls occurred because the USMS did not enforce its own policies and did not comply with the Department’s policies and procedures, NIST standards, and OMB guidelines. We further conclude that the 41 deficiencies with data integrity occurred because the USMS did not develop and implement formal policies and procedures to guide users in the performance of critical duties, such as creating and updating prisoner records in the PTS. As a result, we found errors and omissions on system output reports that we attributed to the lack of sufficient training and inconsistent practices. The USMS’s reliance on the data within the PTS with inaccurate information could result in over expenditures for reimbursable contracts with private jail facilities. Additionally, the untimely release of a prisoner or the misidentification of a prisoner requiring segregation or protection within the prisoner population also could occur. If not corrected, these weaknesses could impair the USMS’s ability to ensure the integrity, confidentiality, and availability of data contained within the PTS. 42 APPENDIX 1 OBJECTIVES, SCOPE, AND METHODOLOGY Our audit objectives were to review application controls, select general controls, and assess the reliability of the Prisoner Tracking System (PTS) data. The audit work, which occurred between June and December 2003, was performed in accordance with the Government Auditing Standards. We conducted fieldwork at the United States Marshals Service (USMS) headquarters in Arlington, Virginia, and 8 of the 94 USMS district offices (DOs). The eight DOs were: Alexandria, Virginia; Washington, D.C.; New York, New York; Houston, Texas; Philadelphia, Pennsylvania; Chicago, Illinois; Miami, Florida; and Phoenix, Arizona. The DOs were selected because their location, detainee processing volume, or USMS headquarters identified them as “model sites.” Although our primary objectives were to review application controls and perform data integrity testing, our audit criteria for evaluating application controls included certain select general control areas. Those steps involved obtaining an overview of the application’s user population (access controls), developing an understanding of the operational workflow process (entity-wide security program planning and management and segregation of duties), and developing an understanding of the hardware and software environment (system software, application software development, and service continuity). Therefore, this report contains findings from select general control areas required to assess the effectiveness of PTS’s application controls. The Marshals Network (MNET) serves as the PTS’s system environment because PTS users must login to MNET to gain access to PTS servers. The OIG performed an audit of MNET’s general controls during its fiscal year 2003 Federal Information Security Management Act (FISMA) review. We therefore relied on audit findings disclosed during the FISMA review as an assessment of the PTS application’s system environment and reported on those select general controls we reviewed as required by the application controls audit criteria. To accomplish our audit objectives, we conducted over 50 interviews and visited the 8 DOs represented on the map in Appendix 2. We interviewed USMS headquarters officials from the Prisoner Services Division, Planning and Analysis Branch, and Information Technology Services Division to assess select general controls, such as entity-wide security program planning and management of the PTS and service continuity. From these interviews, we were able to gain an understanding of the application’s user population, operational workflow process, and hardware and software 43 environment. Additionally, we obtained information from deputy marshals, administrative officers, criminal clerks, detention enforcement officers, and system administrators at each DO visited to evaluate the overall effectiveness of application controls for protecting the PTS’s data. We specifically reviewed authorization, completeness, accuracy, and integrity of processing controls. Our visits to the selected DOs included observing operational activities and performing data integrity testing. Our observation of operational activities allowed us to assess the USMS’s compliance with the Federal Information System Controls Audit Manual (FISCAM), USMS’s PTS User Manual, and USMS’s Policy Directive No. 99-47 (Cellblock Operations). To perform data integrity testing, we judgmentally selected a total of 200 prisoners’ file folders (25 file folders at each of the 8 sites visited). We reviewed these prisoners’ records for completeness of information and manually compared source documents to the PTS output to determine accuracy of information as recommended in the General Accounting Office’s (GAO) guidance for Assessing the Reliability of Computer-Processed Data. Additionally, we reviewed the certification and accreditation documentation for the PTS, the Department’s information technology management policies and procedures, the USMS’s organizational structures, and information contained within individual prisoner file folders. 44 APPENDIX 2 FIELDWORK SITE VISIT MAP Map District Offices Visited Representing United States Marshals Service Regions Chicago, Illinois MID-WEST Region WEST Region NORTHEAST Region SOUTH Region Phoenix, Arizona Houston, Texas Miami, Florida 45 Alexandria, Virginia District of Columbia New York, New York Philadelphia,, Pennsylvania APPENDIX 3 FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL SELECT GENERAL CONTROLS CONTROL AREAS VULNERABILITIES NOTED Entity-wide Security Program Planning & Management Assess risks periodically Document an entity-wide security program plan Establish a security management structure and clearly assign security responsibilities Implement effective security-related personnel policies Monitor the security program’s effectiveness and make changes as needed √ √ Access Controls Classify information resources according to their criticality and sensitivity Maintain a current list of authorized users and ensure that their access is authorized Establish physical and logical controls to prevent and detect unauthorized access Monitor access, investigate apparent security violations, and take appropriate remedial action √ √ Application Software Development & Change Control Authorize processing features and modifications √ Test and approve all new and revised software Control software libraries System Software Limit access to system software Monitor access to and use of system software √ Control system software changes Segregation of Duties Segregate incompatible duties and establish related policies √ Establish access controls to enforce segregation of duties Control personnel activities through formal operating procedures and supervision and review √ Service Continuity Assess the criticality and sensitivity of computerized operations and identify supporting resources Take steps to prevent and minimize potential damage and interruption Develop and document a comprehensive contingency plan Test the contingency plan periodically and adjust it as appropriate 46 √ √ √ FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL APPLICATION CONTROLS CONTROL AREAS VULNERABILITIES NOTED Authorization Controls All data are authorized before entering the application system Restrict data entry terminals to authorized users for authorized purposes Master files and exception reporting help ensure all data are processed and are authorized √ √ Completeness Controls All authorized transactions are entered into and processed by the computer √ Reconciliations are performed to verify data completeness Accuracy Controls Data entry design features contribute to data accuracy Data validation and editing are performed to identify erroneous data Erroneous data are captured, reported, investigated, and corrected Output reports are reviewed to help maintain data accuracy and validity √ √ Controls Over Integrity of Processing and Data Files Procedures ensure that the current version of production programs and data files are used during processing Programs include routines to verify that the proper version of the computer files is used during processing Programs include routines for checking internal file header labels before processing Mechanisms within the application protect against concurrent file updates 47 √ APPENDIX 4 GENERAL ACCOUNTING OFFICE ASSESSING THE RELIABILITY OF COMPUTER-PROCESSED DATA DATA INTEGRITY ASSESSMENT FACTORS VULNERABILITIES NOTED Completeness of Information Contain all of the data elements and records used as support for the transactions Accuracy of Information Reflect the data obtained from the source documents 48 √ √ APPENDIX 5 GENERAL ACCOUNTING OFFICE FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL GENERAL CONTROLS REVIEW GUIDELINES The general controls guidelines used for this audit were obtained from Chapter 3, “Evaluating and Testing General Controls,” of the GAO’s FISCAM. The information below represents only those sections from the FISCAM that serve as the basis for the vulnerabilities identified during our review of the Prisoner Tracking System.17 3.0 OVERVIEW General controls are the structure, policies, and procedures that apply to an entity’s overall computer operations. They create the environment in which application systems and controls operate. During a financial statement audit, the auditor will focus on general controls that normally pertain to an entity’s major computer facilities and systems supporting a number of different applications, such as major data processing installations or local area networks. If general controls are weak, they severely diminish the reliability of controls associated with individual applications. For this reason, general controls are usually evaluated separately from and prior to evaluating application controls. There are six major categories of general controls that the auditor should consider. These are: • entity-wide security program planning and management that provides a framework and continuing cycle of activity for managing risk, developing security policies, assigning responsibilities, and monitoring the adequacy of the entity’s computer-related controls; • access controls that limit or detect access to computer resources (data, programs, equipment, and facilities), thereby protecting these resources against unauthorized modification, loss, and disclosure; • application software development and change controls that prevent unauthorized programs or modifications to an existing program from being implemented; 17 The areas from the FISCAM selected for inclusion in this report have been paraphrased. 49 • system software controls that limit and monitor access to the powerful programs and sensitive files that (1) control the computer hardware, and (2) secure applications supported by the system; • segregation of duties that are policies, procedures, and an organizational structure established so that one individual cannot control key aspects of computer-related operations and thereby conduct unauthorized actions or gain unauthorized access to assets or records; and • service continuity controls to ensure that when unexpected events occur, critical operations continue without interruption or are promptly resumed, and critical and sensitive data are protected. For each of these six categories, the manual identifies several critical elements that represent tasks that are essential for establishing adequate controls. For each critical element, there is a discussion of the associated objectives, risks, and critical activities, as well as related control techniques and audit concerns. The auditor can use this information to evaluate entity practices. 3.1 ENTITY-WIDE SECURITY PROGRAM PLANNING AND MANAGEMENT (SP) An entity-wide program for security planning and management is the foundation of an entity’s security control structure and a reflection of senior management’s commitment to addressing security risks. The program should establish a framework and continuing cycle of activity for assessing risk, developing and implementing effective security procedures, and monitoring the effectiveness of these procedures. Without a well-designed program, security controls may be inadequate; responsibilities may be unclear, misunderstood, and improperly implemented; and controls may be inconsistently applied. Such conditions may lead to insufficient protection of sensitive or critical resources and disproportionately high expenditures for controls over low-risk resources. 50 CRITICAL ELEMENTS SP-1 Assess risks periodically SP-2 Document an entity-wide security program plan SP-3 Establish a security management structure and clearly assign security responsibilities SP-4 Implement effective security-related personnel policies SP-5 Monitor the security program’s effectiveness and make changes as needed Critical Element SP-3: Establish a security management structure and clearly assign security responsibilities Senior management should establish a structure to implement the security program throughout the entity. The structure generally consists of a core of personnel who are designated as security managers. These personnel play a key role in developing, communicating, and monitoring compliance with security policies and reporting on these activities to senior management. The security management function also serves as a focal point for others who plan a role in evaluating the appropriateness and effectiveness of computer-related controls on a day-to-day basis. These include program managers who rely on the entity’s computer systems, system administrators, and system users. SP-3.1: A security management structure has been established The effectiveness of the security program is affected by the way in which responsibility for overseeing its implementation is assigned. Generally, such responsibility is assigned to a central security program office. Responsibilities of the central security program office may include: • • • • • • facilitating risk assessments, coordinating the development of and distributing security policies and procedures, routinely monitoring compliance with these policies, promoting security awareness among system users, providing reports to senior management on policy and control evaluation results and giving advice to senior management on security policy-related issues; and representing the entity in the security community. 51 SP-3.2: Information security responsibilities are clearly assigned OMB Circular A-130, Appendix III, requires that the rules of the system and application “shall clearly delineate responsibilities and expected behavior of all individuals with access . . . and shall be clear about the consequences of behavior not consistent with the rules.” Security-related responsibilities of offices and individuals throughout the entity that should be clearly defined include those of (1) information resource owners and users, (2) information resources management and data processing personnel, (3) senior management, and (4) security administrators. Further, responsibilities for individual employee accountability regarding the use and disclosure of information resources should be established.” Critical Element SP-4: personnel policies Implement effective security-related Policies related to personnel actions, such as hiring and termination, and employee expertise are important factors for information security. If personnel policies are not adequate, an entity runs the risk of (1) hiring unqualified or untrustworthy individuals, (2) providing terminated employees opportunities to sabotage or otherwise impair entity operations or assets, (3) failing to detect continuing unauthorized employee actions, (4) lowering employee morale, which may in turn diminish employee compliance with controls, and (5) allowing staff expertise to decline. SP-4.2: Employees have adequate training and expertise Management should ensure that employees – including data owners, system users, data processing personnel, and security management personnel – have the expertise to carry out their information security responsibilities. To accomplish this, the security program should include: • • • • job descriptions that include the education, experience, and expertise needed; periodic reassessment of the adequacy of employees’ skills; annual training requirements and professional development programs to help make certain employees’ skills, especially technical skills, are adequate and current; and monitoring employee training and professional development accomplishments. 52 3.2 ACCESS CONTROLS (AC) Access controls should provide reasonable assurance that computer resources (data files, application programs, and computer-related facilities and equipment) are protected against unauthorized modification, disclosure, loss, or impairment. Such controls include physical controls, such as keeping computers in locked rooms to limit physical access, and logical controls, such as security software programs designed to prevent or detect unauthorized access to sensitive files. Inadequate access controls diminish the reliability of computerized data and increase the risk of destruction or inappropriate disclosure of data. The following examples illustrate the potential consequences of such vulnerabilities. • By obtaining direct access to data files, an individual could make unauthorized changes for personal gain or obtain sensitive information. For example, a person could (1) alter the address of a payee and thereby direct a disbursement to himself or herself, (2) alter inventory quantities to conceal a theft of assets, (3) inadvertently or purposefully change a receivable balance, or (4) obtain confidential information about business transactions or individuals. • By obtaining access to application programs used to process transactions, an individual could make unauthorized changes to these programs or introduce malicious programs, which in turn could be used to access data files, resulting in situations similar to those described above, or to process unauthorized transactions. For example, a person could alter a payroll or payables program to inappropriately generate a check for himself or herself. • By obtaining access to computer facilities and equipment, an individual could (1) obtain access to terminals or telecommunications equipment that provide input into the computer, (2) obtain access to confidential or sensitive information on magnetic or printed media, (3) substitute unauthorized data or programs, or (4) steal or inflict malicious damage on computer equipment and software. 53 CRITICAL ELEMENTS AC-1 Classify information resources according to their criticality and sensitivity AC-2 Maintain a current list of authorized users and ensure that their access is authorized AC-3 Establish physical and logical controls to prevent and detect unauthorized access AC-4 Monitor access, investigate apparent security violations, and take appropriate remedial action Critical Element AC-2 : Maintain a current list of authorized users and ensure that their access is authorized An entity should institute policies and procedures for authorizing access to information resources and documenting such authorizations. These policies and procedures should cover user access needed for routine operations, emergency access, and the sharing and disposition of data with individuals or groups outside the entity. AC-2.1: Resource owners have identified authorized users and their access authorized The computer resource owner should identify the specific user or class of users that are authorized to obtain direct access to each resource for which he or she is responsible. This process can be simplified by developing standard profiles, which describe access needs for groups of users with similar duties, such as accounts payable clerks. Access may be permitted at a file, record, or field level. Files are composed of records, typically one for each item or transaction. Individual records are composed of fields that contain specific data elements relating to each record. Access authorizations should be documented on standard forms, maintained on file, approved by senior managers, and securely transferred to security managers. Owners should periodically review access authorization listings and determine whether they remain appropriate. Listings of authorized users and their specific access needs and any modifications should be approved by an appropriate senior manager and 54 directly communicated in writing by the resource owner to the security management function. It is equally important to notify the security management function immediately when an employee is terminated or, for some other reason, is no longer authorized access to information resources. Critical Element AC-3 : Establish physical and logical controls to prevent and detect unauthorized access The entity should have a cost-effective process for protecting data files, application programs, and hardware through a combination of physical and logical security controls. Physical security involves restricting physical access to computer resources, usually by limiting access to the buildings and rooms where they are housed, or by installing locks on computer terminals. However, physical controls alone cannot ensure that programs and data are protected. For this reason, it is important to establish logical security controls that protect the integrity and confidentiality of sensitive files. The security function should be responsible for implementing and maintaining both physical and logical controls based upon authorizations provided by the owners of the resources. AC-3.1: Adequate physical security controls have been implemented Physical security controls restrict physical access to computer resources and protect them from intentional or unint entional loss or impairment. In evaluating the effectiveness of physical security controls, the auditor should consider the effectiveness of the entity’s policies and practices for: • • • • • • • granting and discontinuing access authorizations, controlling passkeys, controlling entry during and after normal business hours, controlling the deposit and withdrawal of tapes and other storage media to and from the library, handling emergencies, controlling reentry after emergencies; and establishing compensatory controls when restricting physical access is not feasible, as is often the case with telecommunications lines. 55 3.3 APPLICATION SOFTWARE DEVELOPMENT AND CHANGE CONTROL (CC) Application software is designed to support a specific operation, such as payroll or loan accounting. Typically several applications may operate under one set of operating system software. Controls over operating system software are discussed in Section 3.4. Establishing controls over the modifications of application software programs helps to ensure that only authorized programs and authorized modifications are implemented. This is accomplished by instituting policies, procedures, and techniques that help make sure all programs and program modifications are properly authorized, tested, and approved; and that access to and distribution of programs is carefully controlled. Without proper controls, there is a risk that security features could be inadvertently or deliberately omitted or “turned off” or that processing irregularities or malicious code could be introduced. For example, • • • a knowledgeable programmer could surreptitiously modify program code to provide a means of bypassing controls to gain access to sensitive data; the wrong version of a program could be implemented, thereby perpetuating outdated or erroneous processing that is assumed to have been updated; or a virus could be introduced, inadvertently or on purpose, that disrupts processing. CRITICAL ELEMENTS CC-1 Authorize processing features and modifications CC-2 Test and approve all new and revised software CC-3 Control software libraries Critical Element CC-1 : Authorize processing features and modifications The processing features built into application software should be authorized by the managers responsible for the agency program or operations that the application supports. This is because these are the managers responsible for seeing that software supporting their operations meets their needs and 56 produces reliable data and that the operations are carried out in accordance with applicable laws, regulations, and management policies. For example, the processing features associated with loan accounting software should be authorized by the loan program managers. Such user or owner authorization is needed when new systems are being developed, as well as when operational systems are being modified. Authorization is the first step in implementing the features or the changes that have been decided on by the users, and the entity should have a process for obtaining, documenting, and communicating such authorizations as part of its system development life cycle (SDLC) methodology. If authorization procedures have not been developed or are not followed, an individual might be able to initiate program changes that result in erroneous processing or weakened access controls or edits built into the software. CC-1.2: Authorizations for software modifications are documented and maintained Policies and procedures should be in place that detail who can authorize a modification and how these authorizations are to be documented. Generally the application users have the primary responsibility for authorizing systems changes. However, users should be required to discuss their proposed changes with systems developers to confirm that the change is feasible and cost effective. For this reason, an entity may require a senior systems developer to co-authorize a change. The use of standardized change request forms helps ensure that requests are clearly communicated and that approvals are documented. Authorization documentation should be maintained for at least as long as a system is in operation in case questions arise regarding why or when system modifications were made. Authorization documents may be maintained in either paper or electronic form as long as their integrity is protected. 3.4 SYSTEM SOFTWARE (SS) System software is a set of programs designed to operate and control the processing activities of computer equipment. Generally, one set of system software is used to support and control a variety of applications that may run on the same computer hardware. System software helps control and coordinate the input, processing, output, and data storage associated with all of the applications that run on a system. Some system software can 57 change data and program code on files without leaving an audit trail. The following are examples of system software: • • • • • • • operating system, system utilities, program library, file maintenance, security, data communications systems; and database management systems. Controls over access to and modification of system software are essential in providing reasonable assurance that operating system-based security controls are not compromised and that the system will not be impaired. Inadequate controls in this area could lead to unauthorized individuals using system software to circumvent security controls to read, modify, or delete critical or sensitive information and programs; authorized users of the system gaining unauthorized privileges to conduct unauthorized actions; and/or systems software being used to circumvent edits and other controls built into application programs. Such weaknesses seriously diminish the reliability of information produced by all of the applications supported by the computer system and increase the risk of fraud and sabotage. System software programmers are often more technically qualified than other data processing personnel and, thus, have a greater ability to perform unauthorized actions if controls in this area are weak. CRITICAL ELEMENTS SS-1 Limit access to system software SS-2 Monitor access to and use of system software SS-3 Control system software changes Critical Element SS-3: Control system software changes Modifications to system software should be controlled so that only authorized and properly tested changes are implemented. If system software is not adequately controlled and tested, system parameters may be inadequate to prevent unauthorized changes to application programs or data. Furthermore, software malfunctions during processing runs could result in inaccurate or incomplete financial data. Controls should provide that all 58 changes are tested and approved and that only approved system software is implemented. SS-3.2: Installation of system software is documented and reviewed When possible, the installation of system software changes and new versions or products should be scheduled to minimize the impact on data processing operations, and an advance notice should be provided to system software users. The actual installation should be logged to establish an audit trail and reviewed by data center management. The migration of system software from the testing environment to the production environment should be done, after approval, by an independent library control group. Outdated versions of system software should be removed from the production environment to preclude their future use. Some changes may be made specifically to correct security or integrity vulnerabilities, while using outdated versions allows the entity’s data and systems to remain exposed to these vulnerabilities. All vendor-supplied system software should be supported by the vendor. Vendors often release new versions of system software products and may discontinue support of earlier versions. Enhancements and corrections made to subsequent versions of system software will not be available to entities that forgo acquiring the latest version. All system software should have current and complete documentation. Inadequate documentation will hinder maintenance activities, particularly during emergency situations when in-house systems programmers are attempting to restart a failed system and vendor assistance is not readily available. 3.5 SEGREGATION OF DUTIES (SD) Work responsibilities should be segregated so that one individual does not control all critical stages of a process. For example, while users may authorize program changes, programmers should not be allowed to do so because they are not the owners of the system and do not have the responsibility to see that the system meets user needs. Similarly, one computer programmer should not be allowed to independently write, test, and approve program changes. Often, segregation of duties is achieved by splitting responsibilities between two or more organizational groups. Dividing duties among two or more individuals or groups diminishes the likelihood that errors and wrongful acts will go undetected because the activities of one group or individual will serve as a check on the activities of the other. 59 CRITICAL ELEMENTS SD-1 Segregate incompatible duties and establish related policies SD-2 Establish access controls to enforce segregation of duties SD-3 Control personnel activities through formal operating procedures and supervision and review Critical Element SD-1: Segregate incompatible duties and establish related policies The first steps in determining if duties are appropriately segregated are to analyze the entity’s operations, identify incompatible duties, and assign these duties to different organizational units or individuals. Federal internal control standards specify that key duties and responsibilities for authorizing, processing, recording, and reviewing transactions should be separated. This concept can also be applied to the authorization, testing, and review of computer program changes. Segregating duties begins by establishing independent organizational groups with defined functions, such as a payroll unit responsible for preparing payroll transaction input and a data processing unit responsible for processing input prepared by other units. Functions and related tasks performed by each unit should be documented for the unit and in staff job descriptions and should be clearly communicated to personnel assigned the responsibilities. SD-1.1: Incompatible duties have been identified and policies implemented to segregate these duties Management should have analyzed operations and identified incompatible duties tha t are then segregated through policies and organizational divisions. Although incompatible duties may vary from one entity to another, the following functions are generally performed by different individuals: Information Systems (IS) management, systems design, application programming, systems programming, quality assurance/testing, library management/change management, computer operations, production control and scheduling, data security, data administration, and network administration. 60 The following include examples of restrictions that are generally addressed in policies about segregating duties and are achieved through organizational divisions and access controls. • • • • • • • • Application users should not have access to operating system or application software. Programmers should not be responsible for moving programs into production or have access to production libraries or data. Access to operating system documentation should be restricted to authorized systems programming personnel. Access to application system documentation should be restricted to authorized applications programming personnel. Access to production software libraries should be restricted to library management personnel. Persons other than computer operators should not set up or operate the production computer. Only users, not computer staff, should be responsible for transaction origination or correction and for initiating changes to application files. Computer operators should not have access to program libraries or data files. Some steps involved in processing a transaction also need to be separated among different individuals. For example, the following combinations of functions should not be performed by a single individual. • • • • Data entry and verification of data, Data entry and its reconciliation to output, Input of transactions for incompatible processing functions (e.g., input of vendor invoices and purchasing and receiving information); and Data entry and supervisory authorization functions (e.g., authorizing a rejected transaction to continue processing that exceeds some limit requiring a supervisor’s review and approval). Organizations with limited resources to segregate duties should have compensating controls, such as supervisory review of transactions performed. Critical E lement SD-3: Control personnel activities through formal operating procedures and supervision and review Control over personnel activities requires formal operating procedures and active supervision and review of these activities. This is especially relevant 61 for computer operators. Inadequacies in this area could allow mistakes to occur and go undetected, and facilitate unauthorized use of the computer. SD-3.1: Formal procedures guide personnel in performing their duties Detailed, written instructions should exist and be followed to guide personnel in performing their duties. These instructions are especially important for computer operators. For example, computer operator instruction manuals should provide guidance on system startup and shut down procedures, emergency procedures, system and job status reporting, and operator prohibited activities. Application-specific manuals (commonly called “run” manuals) should provide additional instructions for operators specific to each application, such as instructions on job setup, console and error messages, job checkpoints, and restart and recovery steps after system failures. Operators should be prevented from overriding file label or equipment error messages. SD-3.2: Active supervision and review are provided for all personnel Supervision and review of personnel activities help make certain that these activities are performed in accordance with prescribed procedures, that mistakes are corrected, and that the computer is used only for authorized purposes. To aid in this oversight, all computer operator activities on the computer system should be recorded on an automated history log, which serves as an audit trail. Supervisors should routinely review this history log and investigate any abnormalities. 3.6 SERVICE CONTINUITY (SC) Losing the capability to process, retrieve, and protect information maintained electronically can significantly affect an agency’s ability to accomplish its mission. For this reason, an agency should have (1) procedures in place to protect information resources and minimize the risk of unplanned interruptions and (2) a plan to recover critical operations should interruptions occur. These plans should consider the activities performed at general support facilities, such as data processing centers and telecommunications facilities, as well as the activities performed by users of specific applications. To determine whether recovery plans will work as intended, they should be tested periodically in disaster simulation exercises. To mitigate service interruptions, it is essential that the related controls be understood and supported by management and staff throughout the organization. Senior management commitment is especially important to 62 ensure that adequate resources are devoted to emergency planning, training, and related testing. In addition, all staff with service continuity responsibilities, such as staff responsible for backing up files, should be fully aware of the risks of not fulfilling these duties. CRITICAL ELEMENTS SC-1 Assess the criticality and sensitivity of computerized operations and identify supporting resources SC-2 Take steps to prevent and minimize potential damage and interruption SC-3 Develop and document a comprehensive contingency plan SC-4 Test the contingency plan periodically and adjust it as appropriate Critical Element SC-1: Assess the criticality and sensitivity of computerized operations and identify supporting resources At most entities, the continuity of certain automated operations is more important than others, and it is not cost-effective to provide the same level of continuity for all operations. For this reason, it is important that management analyze data and operations to determine which are the most critical and what resources are needed to recover and support them. This is the first step in determining which resources merit the greatest protection and what contingency plans need to be made. SC-1.2: Resources supporting critical operations are identified Once critical data and operations have been determined, the minimum resources needed to support them should be identified and their role analyzed. The resources considered include computer resources, such as computer hardware, software, and data files; computer supplies, including paper stock and preprinted forms; telecommunications services; and any other resources that are necessary to the operation, such as people, office facilities and supplies, and noncomputerized records. For example, an analysis should be performed to identify the maximum number of disk drives needed at one time and the specific requirements for telecommunications lines and devices. Because essential resources are likely to be held or managed by a variety of groups within an organization, it is important that program and information 63 security (IS) support staff work together to identify the resources for critical operations. Critical Element SC-2: Take steps to prevent and minimize potential damage and interruption There are a number of steps that an organization should take to prevent or minimize the damage to automated operations that can occur from unexpected events. These can be categorized as follows: • • • • routinely duplicating or backing up data files, computer programs, and critical documents with off-site storage; installing environmental controls, such as fire suppression systems or backup power supplies; arranging for remote backup facilities that can be used if the entity’s usual facilities are damaged beyond use; and ensuring that staff and other users of the system understand their responsibilities in case of emergencies. Taking such steps, especially implementing thorough backup procedures and installing environmental controls, are generally inexpensive ways to prevent relatively minor problems from becoming costly disasters. In particular, an entity should maintain an ability to restore data files, which may be impossible to recreate if lost. In addition, effective maintenance, problem management, and change management for hardware equipment will help prevent unexpected interruptions. SC-2.1: Data and program backup procedures have been implemented Routinely copying data files and software and securely storing these files at a remote location are usually the most cost-effective actions that an entity can take to mitigate service interruptions. Although equipment can often be readily replaced, the cost could be significant, and reconstructing computerized data files and replacing software can be extremely costly and time-consuming. Sometimes, reconstruction of data files may be virtually impossible. In addition to the direct costs of reconstructing files and obtaining software, the related service interruptions could lead to significant financial losses. A program should be in place for regularly backing up computer files, including master files, transaction files, application programs, systems software, and database software, and storing these backup copies securely 64 at an off-site location. Although choosing a backup storage location is a matter of judgment, the backup location should be far enough away from the primary location that it will not be impaired by the same events, such as fires, storms, and electrical power outages. In addition, it should be protected from unauthorized access and from environmental hazards, such as fires and power outages. SC-2.3: Staff have been trained to respond to emergencies Staff should be trained in and aware of their responsibilities in preventing, mitigating, and responding to emergency situations. For example, data center staff should receive periodic training in emergency fire, water, and alarm incident procedures as well as their responsibilities in starting up and running an alternate data processing site. Also, if outside users are critical to the entity’s operations, they should be informed of the steps they may have to take as a result of an emergency. Generally, information on emergency procedures and responsibilities can be provided through training sessions and by distributing written policies and procedures. Training sessions should be held at least once a year and whenever changes to emergency plans are made. Also, if staff could be required to relocate or significantly alter their commuting routine in order to operate an alternate site in an emergency, it is advisable for an entity to incorporate into the contingency plan steps for arranging lodging and meals or any othe r facilities or services that may be needed to accommodate the essential human resources. Critical Element SC-4: Periodically test the contingency plan and adjust it as appropriate Testing contingency plans is essential to determine whether they will function as intended in an emergency situation. According to OMB, federal managers have reported that testing revealed important weaknesses in their plans, such as backup facilities that could not adequately replicate critical operations as anticipated. Through the testing process, these plans were substantially improved. The most useful tests involve simulating a disaster situation to test overall service continuity. Such a test would include testing whether the alternative data processing site will function as intended and whether critical computer data and programs recovered from off-site storage are accessible and current. In executing the plan, managers will be able to identify weaknesses 65 and make changes accordingly. Moreover, tests will assess how well employees have been trained to carry out their roles and responsibilities in a disaster situation. SC-4.1: The plan is periodically tested The frequency of contingency plan testing will vary depending on the criticality of the entity’s operations. Generally, contingency plans for very critical functions should be fully tested about once every year or two, whenever significant changes to the plan have been made, or when significant turnover of key people has occurred. It is important for top management to assess the risk of contingency plan problems and develop and document a policy on the frequency and extent of such testing. 66 APPENDIX 6 GENERAL ACCOUNTING OFFICE FEDERAL INFORMATION SYSTEM CONTROLS AUDIT MANUAL APPLICATION CONTROLS REVIEW GUIDELINES The general controls guidelines used for this audit were obtained from Chapter 4, “Evaluating and Testing Application Controls,” of the GAO’s FISCAM. The information below represents only those sections from the FISCAM that serve as the basis for the vulnerabilities identified during our review of the Prisoner Tracking System.18 4.0 OVERVIEW Application controls are the structure, policies, and procedures that apply to separate, individual application systems, such as accounts payable, inventory, payroll, grants, or loans. An application system is typically a collection or group of individual computer programs that relate to a common function. In the federal government, some applications may be complex comprehensive systems, involving numerous computer programs and organizational units, such as those associated with benefit payment systems. For the purposes of this document, application controls encompass both the routines contained within the computer program code, and the policies and procedures associated with user activities, such as manual measures performed by the user to determine that data were processed accurately by the computer. Application controls help make certain that transactions are valid, properly authorized, and completely and accurately processed by the computer. They are commonly categorized into three phases of a processing cycle: • • • input – data are authorized, converted to an automated form, and entered into the application in an accurate, complete, and timely manner; processing – data are properly processed by the computer and files are updated correctly; and output – files and reports generated by the application actually occur and accurately reflect the results of processing, and reports are controlled and distributed to the authorized users. 18 The areas from the FISCAM selected for inclusion in this report have been paraphrased. 67 Some guides provide additional categories of application controls. For example, data origination is a breakout of input it controls to focus on source documents and their need for authorization and proper preparation and control. Also, data storage and retrieval focuses on access to and use of data files and protecting their integrity. Instead of using the phases of a processing cycle, this document uses control categories that better tie-in with the Specific Control Evaluation Worksheets (SCE) found in the Financial Audit Manual. The SCE is used to document the controls evaluation and is prepared for each significant accounting application. Included on the SCE are columns for recording the control objectives and control techniques being evaluated, and accuracy including whether the assertion and related transactions are authorized, complete, valid, and accurate. The control objectives and techniques addressed in this chapter are consistent with other guidance, but our categorization, tying to the SCE, are the following: • Authorization controls – This is most closely aligned with the financial statement accounting assertion of existence or occurrence. This assertion, in part, concerns the validity of transactions and ensures that they represent economic events that actually occurred during a given period. • Completeness controls – This directly relates to the financial statement accounting assertion on completeness, which deals with whether all valid transactions are recorded and properly classified. • Accuracy controls – This most directly relates with the financial statement assertion on valuation or allocation. This assertion deals with whether transactions are recorded at correct amounts. The control category, however, is not limited to financial information, but also addresses the accuracy of other data elements. • Controls over integrity of processing and data files – These controls, if deficient, could nullify each of the above control types and allow the occurrence of unauthorized transactions, as well as contribute to incomplete and inaccurate data. 68 4.1 AUTHORIZATION CONTROLS (AN) Only authorized transactions should be entered into the application system and processed by the computer. Critical Elements AN-1 All data are authorized before entering the application system AN-2 Restrict data entry terminals to authorized users for authorized purposes AN-3 Master files and exception reporting help ensure all data are processed and are authorized Critica l Element AN-1: All data are authorized before entering the application system Data should be authorized before it is entered into the application system. Federal financial management systems are often characterized as large complex ‘legacy’ systems and often involve a multitude of documents that flow through various work steps. Paper source documents still play a significant role for originating data that enter application systems in the federal government. These source documents should fall under control measures so that unauthorized transactions are not submitted to and processed by the application. Also, data – whether from a source document or not – should undergo an independent or supervisory review prior to entering the application. AN-1.1 Source documents are controlled and require authorizing signatures Control over source documents should begin even before data is recorded on the document. Access restrictions over blank source documents should prevent unauthorized personnel from obtaining a blank source document, recording unauthorized information, and inserting the document in the flow with authorized documents and possibly causing a fraudulent or malicious transaction to occur. Use of pre-numbered source documents could help identify unauthorized documents that fall outside the range of authorized numbers for documents being prepared for data entry. 69 Key source documents for an application should require an authorizing signature, and the document should provide space for the signature by an authorized official. AN-1.2 Supervisory or independent reviews of data occur before entering the application system. Providing supervisory or independent review of data before entering the application system helps prevent the occurrence of unauthorized transactions. A data control unit is effective for this purpose and this function has evolved as technology has advanced. With earlier systems, source documents were batched in the user department and sent to a data control unit that was organizationally under the information systems department. This unit monitored data entry and processing of the documents, seeing that all batches were received, entered, and processed completely. In addition, personnel in this unit verified that each source document was properly prepared and authorized before the data on the document was entered into the system. This function has migrated to the user department as it gained access to application systems through computer terminals. Several or more personnel in the user department may now enter source documents into a transaction file that is not released for processing until a supervisory or independent review occurs. A user department control unit may have the responsibility to see that entered transactions are supported by a source document that contains a valid authorizing signature. Also, supervisors in the user department may hold this responsibility. These application systems may have a separate authorization screen accessed by computer terminal, by control unit, or by supervisory personnel. After verifying the input transactions, the control unit or supervisory personnel enter the required authorization and release the data for further processing. Critical Element AN-2: Restrict data entry terminals to authorized users for authorized purposes The integrity of application data can be compromised by unauthorized personnel who have unrestricted access to data entry terminals, as well as by authorized users who are not restricted in what transactions they can enter. Without limits, unauthorized personnel and authorized users could enter fraudulent or malicious transactions. To counter this risk, both physical and logical controls are needed to restrict data entry terminals to authorized users for authorized purposes. 70 AN-2.1 Data entry terminals are secured and restricted to authorized users Data entry terminals should be located in physically secure rooms. When terminals are not in use, these rooms should be locked, or the terminals themselves should be capable of being secured to prevent unauthorized use. Supervisors should sign on to each terminal device, or authorize terminal usage from a program file server, before an operator can sign on to begin work for the day. Each operator should be required to use a unique password and identification code before being granted access to the system. Data entry terminals should be connected to the system only during specified periods of the day, which corresponds with the business hours of the data entry personnel. Each terminal should automatically disconnect from the system when not used after a specified period of time. Where dial-up access is used to connect terminals to the system, connection should not be completed until the system calls back to the terminal. These terminals should generate a unique identifier code for computer verification. Such procedures help limit access to known, authorized terminals. On-line access logs should be maintained by the system, for example, through the use of security software, and should be reviewed regularly for unauthorized access attempts. All transactions should be logged as they are entered, along with the terminal ID that was used, and the ID of the person entering the data. This builds an audit trail and helps hold personnel accountable for the data they enter. 4.2 COMPLETENESS CONTROLS (CP) All authorized transactions should be entered into and completely processed by the computer. Critical Elements CP-1 All authorized transactions are entered into and processed by the computer CP-2 Reconciliations are performed to verify data completeness 71 Critical Element CP-1: All authorized transactions are entered into and processed by the computer A control for completeness is one of the most basic application controls, but is essential to ensure that all transactions are processed, and missing or duplicate transactions are identified. The most commonly encountered controls for completeness include the use of record counts and control totals, computer sequence checking, computer matching of transaction data with data in a master or suspense file, and checking of reports for transaction data. CP-1.2 Computer sequence checking This control begins by providing each transaction with a unique sequential number. Some transactions originate on source documents with preassigned serial numbers. This number should be entered into the computer along with the other data on the transaction. The computer can identify numbers missing from the sequence and provide a report of those numbers. The missing numbers should be investigated to determine whether they are numbers for voided source documents, or are valid documents that may have been lost or misplaced. For transactions not on source documents with preassigned serial numbers, the computer can assign a unique sequential number as the data is entered. At a later point in processing, such as when transaction data updates a master file, the computer can verify that all numbers are accounted for. Again, missing numbers are reported for investigation. Sequence checking is also valuable in identifying duplicate transactions. For example, two transactions with the same preassigned serial number for a source document would indicate that the transaction had been erroneously entered a second time. As another example, a file of sequential numbers for purchase orders could help prevent paying for the purchase more than once. After the purchased goods and vendor’s bill are received, a payment transaction with the purchase order number would be matched with the file containing all purchase order numbers, and an indicator for the payment would be recorded on the file for that purchase. The payment indicator would cause following payment transactions for the same purchase order to be rejected and reported for investigation. 72 4.3 ACCURACY CONTROLS (AY) The recording of valid and accurate data into an application system is essential to provide for an effective system that produces reliable results. CRITICAL ELEMENTS AY-1 AY-2 AY-3 AY-4 Data entry design features contribute to data accuracy Data validation and editing are performed to identify erroneous data Erroneous data are captured, reported, investigated, and corrected Output reports are reviewed to help maintain data accuracy and validity Critical Element AY-3: Erroneous data are captured, reported, investigated, and corrected Transactions detected with errors need to be controlled to ensure that they are corrected and reentered in a timely manner. During data entry, particularly with more modern systems, an error can be identified and corrected at the data entry terminal. With errors identified during the data processing cycle, however, a break generally has been made from the data entry terminal. Therefore, errors identified cannot be communicated in a real-time mode back to personnel entering the data for immediate correction. An automated error suspense file is an essential element to controlling these data errors, and the errors need to be effectively reported back to the user department for investigation and correction. AY-3.2 Erroneous data are reported back to the user department for investigation and correction Systems that allow user groups to enter data at a computer terminal often allow data to be edited as it is entered, and generally the systems allow immediate correction of errors as they are identified. Error messages should clearly indicate what the error is and what corrective action is necessary. Errors identified at a later point in processing should be reported to the user originating the transaction for correction. Some systems may use error reports to communicate to the user department the rejected transactions in need of correction. More modern systems will provide user departments’ access to a file containing erroneous transactions. Using a computer terminal, users can initiate corrective actions. Again, error messages should clearly indicate what the error is and 73 what corrective action is necessary. The user responsible for originating the transaction should be responsible for correcting the error. All corrections should be reviewed and approved by supervisors before being reentered into the system, or released for processing if corrected from a computer terminal. Critical Element AY-4: Output reports are reviewed to help maintain data accuracy and validity Output can be in several forms, including printed reports, data accessible on-line by users, and computer files that will be used in a later processing cycle, or by other programs in the application. Output should be reviewed and control information should be reconciled to determine whether errors occurred during processing. Various reports are typically produced by application systems that, if reviewed, help maintain the data’s accuracy and validity. Production and distribution of these reports need to be controlled, and to be effective, they need to be reviewed by user department personnel. AY-4.1 Control output production and distribution Someone should be assigned responsibilities for seeing that all outputs are produced and distributed in accordance with the requirements and design of the application system. In larger organizations with mainframe computer environments, this responsibility is typically assigned as part of the responsibilities of a data control group, which falls within the information systems department. This group, or some alternative, should maintain a schedule by application that shows the output products produced, when they should be completed, whom the recipients are, the copies needed, and when they are to be distributed. The group should review output products for general acceptability and reconcile control information to determine the completeness of processing. Printed reports should contain proper identification, including a title page with the report name, time and date of production, and the processing period covered by the report. Reports should also have an “end-of-report” message to positively indicate the end of a report. A report may have pages missing at the end of the report, which may go undetected without this type of message. Controls and procedures are needed to ensure the proper distribution of output to authorized users. Without control over distribution, users may not receive needed output in a timely manner, and unauthorized persons may gain access to output containing privacy or sensitive information. Each output should be logged, manually if not done 74 automatically, along with the recipients of the output, including outputs that are transmitted to a user’s terminal device. For these transmissions, the computer system should automatically check the output message before displaying, writing, or printing to make sure the output has not reached the wrong terminal device. In the user department, outputs transmitted should be summarized daily and printed for each terminal device, and reviewed by supervisors. Occasionally, errors may be identified in output products requiring corrective action, including possibly rerunning application programs to produce the correct product. A control log of output product errors should be maintained, including the corrective actions taken. Output from reruns should be subjected to the same quality review as the original output. 4.4 CONTROLS OVER INTEGRITY OF PROCESSING AND DATA FILES Examples of items to cover: • Procedures ensure that the current versions of production programs and data files are used during processing. • Programs include routines to verify that the proper version of the computer file is used during processing. • Programs include routines for checking internal file header labels before processing. • The application protects against concurrent file updates. 75 APPENDIX 7 GENERAL ACCOUNTING OFFICE ASSESSING THE RELIABILITY OF COMPUTER-PROCESSED DATA DATA INTEGRITY ASSESSMENT GUIDELINES Data reliability refers to the accuracy and completeness of computer-processed data, given the intended purposes for use. Computer-processed data include data (1) entered into a computer system and (2) resulting from computer processing. Computer-processed data can vary in form – from electronic files to tables in published reports. The definition of computer-processed data is therefore broad. In this guidance, the term data always refers to computer-processed data. The “Yellow Book” requires that a data reliability assessment be performed for all data used as support for engagement findings, conclusions, or recommendations.19 This guidance will help you to design a data reliability assessment appropriate for the purposes of the engagement and then to evaluate the results of the assessment. Data are reliable when they are (1) complete (they contain all of the data elements and records needed for the engagement) and (2) accurate (they reflect the data entered at the source or, if available, in the source documents). 20, 21 A subcategory of accuracy is consistency. Consistency refers to the need to obtain and use data that are clear and well-defined enough to yield similar results in similar analyses. For example, if data are entered at multiple sites, inconsistent interpretation of data rules can lead to data that, taken as a whole, are unreliable. Reliability also means that for any computer processing of the data elements used, the results are reasonably complete and accurate, meet your intended purposes, and are not subject to inappropriate alteration. 19 The GAO’s “Government Auditing Standards,” 2003 Revision, commonly referred to as the “Yellow Book” sets forth generally accepted government auditing standards for use by government auditors. 20 A data element is a unit of information with definable parameters (for example, a social security number), sometimes referred to as a data variable or data field. 21 Source document. Information that is the basis for entry of data into a computer. 76 APPENDIX 8 ACRONYMS AND ABBREVIATIONS ABS BOP CSSO D/AZ DBMS DC/DC Department DO DOB E/PA E/VA FBI FD-129 FISCAM FISMA GAO J&C MNet N/IL NIST OIG OMB PTS PSD SDLC S/FL S/NY SP S/TX SSN U.S.C. USERID USM USM-552/553 USMS USM-129 USM-312 WT-J/C Automated Booking Station Federal Bureau of Prisons Computer Systems Security Officer District of Arizona Database Management System District Court for the District of Columbia Department of Justice District Office Date of Birth Eastern District of Pennsylvania Eastern District of Virginia Federal Bureau of Investigation FBI Fingerprint Cards Federal Information System Controls Audit Manual Federal Information Security Management Act General Accounting Office Judgment and Commitment Order Marshals Network Northern District of Illinois National Institute of Standards and Technology Office of the Inspector General Office of Management and Budget Prisoner Tracking System Prisoner Services Division Software Development Life Cycle Southern District of Florida Southern District of New York Special Publication Southern District of Texas Social Security Number United States Code User identification United States Marshals Medical Summary of Federal Prisoner/Alien in Transit United States Marshals Service United States Marshals Service-129 Prisoner Intake Form United States Marshals Service-312 Personal History Form Waiting Judgment and Commitment Order 77 APPENDIX 9 GENERAL CONTROLS CRITERIA 1. Privacy Act of 1974, Public Law 93-579 2. Computer Fraud & Abuse Act of 1986, as amended, Public Law 99-474 3. Computer Security Act of 1987, Public Law 100-235 4. Paperwork Reduction Act of 1978, as amended in 1995, U.S. Code 44 Chapter 35 5. OMB Circular A-130, “Management of Federal Information Resources,” Section 6, “Definitions” and Section 8, “Policy” 6. OMB Circular A-130, Appendix III, “Security of Federal Automated Information Resources,” Section A, “Requirements” and B, “Descriptive Information” 7. The GAO’s Federal Information System Controls Audit Manual, Chapter 3, “Evaluating and Testing General Controls” 8. Department of Justice Order 2640.2E, Information Technology Security, Chapter 1, “Security Program Management” and Chapter 2, “Security Requirements” 9. National Institute of Standards and Technology, Special Publication 800-12, “An Introduction to Computer Security: The NIST Handbook” 10. National Institute of Standards and Technology, Special Publication 800-18, “Guide for Developing Security Plans for Information Technology Systems” 11. National Institute of Standards and Technology, Special Publication 800-34, “Contingency Planning Guide for Information Technology Systems” 12. National Institute of Standards and Technology, Special Publication 800-40 13. National Institute of Standards and Technology, Federal Information Processing Standards Publication 73, Section 3.1.1 78 APPENDIX 10 APPLICATION CONTROLS CRITERIA 1. The GAO’s Federal Information System Controls Audit Manual, Chapter 4, “Evaluating and Testing Application Controls” 2. Department of Justice Order 2640.2E, Information Technology Security, Chapter 2, “Security Requirements,” Section 16, “Access Control;” 18.h., “Accountability and Audit Trails;” 23, “Assignment and Segregation of Duties” 3. OMB Circular A-130, “Management of Federal Information Resources,” Section 6, “Definitions” and Section 8, “Policy” 4. OMB Circular A-130, Appendix III, “Security of Federal Automated Information Resources,” Section A.3.b.2., “Application Security Plan” and B.b.2.g., “Public Access Controls” 5. OMB Circular A-130, Appendix IV, “Analysis of Key Sections,” Analysis, Section 8a(4), “Records Management” and “Training” 6. National Institute of Standards and Technology, Special Publication 800-12, “An Introduction to Computer Security: The NIST Handbook,” Chapter 4, “Common Threats,” 1. “Errors and Omissions” 7. National Institute of Standards and Technology, Special Publication 800-18, “Guide for Developing Security Plans for Information Technology Systems” 8. National Institute of Standards and Technology, Special Publication 800-53, “Recommended Security Controls,” SI-2.b “Personnel Supervision;” SI-5.e.MP-1e, “Media Access;” and SI-5.e, “Validation of Mission Processing, Output” 9. National Institute of Standards and Technology, Special Publication 800-64, “Security Considerations in the Information System Development Life Cycle,” B.10.3, “Auditing” 10. National Institute of Standards and Technology, Federal Information Processing Standards Publication 73, Section 3.1, “Data Validation” 11. The USMS’s Prisoner Tracking System Contingency Plan, Version 1.08, dated June 2003 79 12. The USMS’s “Cellblock Operations” Directive 99-47, “Prisoner Tracking System (PTS) and Appendix B – “Records to be Maintained in the USM-123 File” 13. The USMS’s “Prisoner Tracking System User Manual,” dated June 2003 14. The USMS’s “PTS System Security Guide,” dated June 2003 15. The “USMS System Security Plan for the Prisoner Tracking System (PTS)/USMS Automated Booking Station (USMS-ABS),” Version 1.05, dated June 2003 16. The USMS’s Security Evaluation Report dated June 2003 80 APPENDIX 11 DATA INTEGRITY ASSESSMENT CRITERIA 1. “Assessing the Reliability of Computer-Processed Data,” GAO-03-273G, October 2002 2. National Institute of Standards and Technology, Special Publication 800-12, “An Introduction to Computer Security: The NIST Handbook,” 1.4, “Important Terminology” 81 APPENDIX 12 82 83 84 85 86 87 88 89 90 OIG Note: Additional attachments to the consolidated response were too voluminous to incorporate into this report. The attachments may be obtained by contacting the United States Marshals Service. 91 APPENDIX 13 OFFICE OF THE INSPECTOR GENERAL, AUDIT DIVISION, ANALYSIS AND SUMMARY OF ACTIONS NECESSARY TO CLOSE THE REPORT The USMS’s response to the audit (Appendix 12) describes the actions taken or plans for implementing our recommendations. In some cases, we made revisions to our final report where appropriate. This appendix summarizes our response and the actions necessary to close the report. In addition to responding to the recommendations the USMS stated in the second paragraph of the cover memorandum “For purposes of accuracy, please note that Page 1 of the report includes dollar figures ascribed to PTS, with Footnote 7 reporting these figures to be derived from budget requests submitted to OMB and JMD. These figures are not consistent with what USMS has submitted through the budget process. We are at OIG’s disposal to discuss the figures reported and provide the information we believe to be accurate.” We requested operating cost information for the PTS on two occasions from USMS representatives prior to the issuance of the PTS draft report. On the first occasion, February 24, 2004, we sent a written request to the USMS Planning and Analysis Branch requesting budget information. During our second attempt on February 25, 2004, we sent a request to a USMS IT Services representative who replied that he had “passed the request on to the USMS budget people.” We informed the USMS that this information would be used in the draft report and that the request was time sensitive since we were in the final stages of writing the draft report. Because we were not provided with information from either of the USMS contacts, we contacted the Justice Management Division to determine if any historical budget information existed in their files. On March 8, 2004, the Justice Management Division provided the information used in the report . According to JMD’s representative, “The official source of the information are exhibit 300 or 53 reports prepared by the component that are on file in our office.” Therefore, the OIG did not dispute the accuracy of the information since we were informed that it originated from the USMS. Because the USMS expressed concern that the costs provided by the JMD were not accurate, we again contacted the USMS on July 12, 2004, to obtain the operating costs the USMS believed to be accurate for PTS. On July 21, 2004, the USMS provided an email containing 92 cost information for which we subsequently requested the supporting documentation such as an exhibit 300 or 53 report. However, the USMS could not provide any supporting budget documentation to substantiate the figures it provided. Therefore, the operating cost information previously provided by JMD will remain in the report as the official and best available data for the PTS. With respect to our recommendations, the USMS frequently disagreed or the corrective action proposed by the USMS was not sufficient to address our recommendations. For these reasons, recommendations 3, 4, 5, 6, 8, 9, 10, 12, 13, 14, 17, and 18 are unresolved. The status of each recommendation follows: Recommendation Number: 1. Closed. The USMS provided a copy of a signed memorandum dated April 30, 2004, designating an Information Systems Security Officer (ISSO) for the PTS. As a result of the USMS actions, we consider this recommendation closed. 2. Resolved. The USMS states that the future Justice Detainee Information System (JDIS) will include a training module for the PTS application. To close this recommendation, the USMS should provide milestones for its implementation to us with evidence that the training module for PTS is or has been developed. 3. Unresolved. The USMS requested additional information pertaining to which system administrators lacked adequate training and expertise regarding their knowledge of the PTS’s hardware and software environment. The USMS believed that this finding was noted because the OIG may have interviewed the wrong personnel. As we stated at our exit conference with the USMS, in planning our site visits, we first contacted each affected district office and requested the following individuals be made available for meetings or interviews: the U.S. Marshal (or designee), system administrator, and criminal clerk. At the Eastern District of Virginia, we were directed to an individual whom we were told was performing system administrator duties. As the interview progressed, however, we learned that the individual was performing some system administrator duties, but that the system administrator responsible for the site was physically located at the District Court for the District of Columbia. While at the Eastern District of Virginia, we gathered the information this individual 93 could provide and subsequently interviewed the responsible system administrator. We did not, however, interview the administrative officer in lieu of the system administrator. Rather, we were initially misdirected and subsequently spoke to the system administrator responsible for the office. When we spoke to the system administrator who represented the site in question, we still found deficiencies with the system administrator’s knowledge. As stated in the final report, the system administrator position description provided by the USMS states that system administrators are responsible for “operating, troubleshooting, repairing, and maintaining IT systems.” Additionally, the position description states that employees must possess the requisite technical knowledge to sustain the availability of the hardware and software environment and be competent to maintain operating systems, applications, and data elements. According to the USMS headquarters, system administrators within the district offices are responsible for adding and deleting user names from the PTS authorized user list. However, we found specific problems at the sites indicated below: x x x x x x x x x x x x x x x x x x x x x x x x When we requested to speak to the system administrator at the Eastern District of Virginia, we were directed to the administrative officer. The administrative officer was performing cursory system administrator duties and he did not know where the PTS database 94 D/AZ x S/FL x N/IL S/NY x S/TX E/PA System Administrators lacked knowledge of the PTS change control process System Administrators were unfamiliar with the PTS application’s timeout period System Administrators were unfamiliar with the PTS application’s master files System Administrators did not know the version number of PTS running on the District Office’s server System Administrators did not know how to delete user names from the PTS authorized user list Source: OIG working papers DC/DC Specific Deficiencies E/VA Deficiencies Found Pertaining to System Administrator Training and Expertise x for the district office was located. We subsequently interviewed the system administrator, whom we located at the District Court for the District of Columbia, and found that she did not know how to delete names from the user list, among other things. The areas identified in the previous chart represent facets of requisite technical knowledge that enable system administrators to effectively sustain the availability of the hardware and software environment and demonstrate competence in maintaining operating systems, applications, and data elements. In order to resolve and close this recommendation, the USMS should provide documented evidence to us that individuals performing system administrator duties are properly trained in their responsibilities. 4. Unresolved. The USMS’s response asserts that there is no Department or federal security requirement to maintain user lists at both the USMS district offices and at USMS headquarters. The USMS response does not address our recommendation. Our recommendation speaks to the condition that the PTS authorized user list provided by the USMS headquarters contained information that, once verified at the site, possessed multiple inaccuracies. Appendices 5 and 6 of this report contain excerpts from Chapters 3 and 4 of the GAO’s FISCAM, which we used as guidance for the development of the audit program followed during the audit. Pages 54 through 55 of the final report provide the specific FISCAM requirement that the computer resource owner should maintain a current list of authorized users and ensure that their access is authorized. We did not recommend that separate lists be maintained. Separate lists exist because the USMS headquarters has delegated the user management responsibility to the district offices (DOs). This does not absolve the USMS headquarters from its responsibility as data owners to maintain a current list of authorized users and ensure that their access is authorized. Additionally, the Department’s Order 2640.2E requires that each authorized user of a system have a unique identifier. In the case of the authorized user list provided by USMS headquarters, entries were found to be outdated and did not reflect a replication of changes, additions, and deletions made at the district offices we visited. Our report details the nature and frequency of errors found during our user list review at each site. In order to resolve and close this recommendation, the USMS should provide evidence 95 to us that the access authorizations for the PTS are reviewed and that USMS headquarters updates its authorized PTS user list in a timely manner to incorporate changes from the DOs. 5. Unresolved. As we stated at our exit conference, we found that the lock on the door to the office suite containing data terminals, prisoner file folders, printed output reports, and other sensitive information was not engaged at the District Court for the District of Columbia location. During our visit, we were able to gain access to this area from the hallway in a building accessed by the public, and at the time, no one assigned to the district office was present in the area. Although physical security is provided at the entrance to the building, private citizens are unescorted once they enter the building, which presents a serious threat to the protection of sensitive information. We agree that this condition occurred at only one of the eight sites reviewed. However, we found that the means for providing adequate physical security was present and a lock was on the door. Unfortunately, the office failed to exercise due diligence to ensure its use. Additionally, this condition was in sharp contrast to the high levels of security observed at the other seven sites visited. In order to resolve and close this recommendation, the USMS should provide us with documented evidence that existing measures, such as door locks, are used to provide protection against unauthorized access to sensitive areas. 6. Unresolved. The USMS response states that system change request instructions for the PTS application have been sufficiently disseminated to users of the application. The USMS headquarters informed us prior to our site visits of the systems development life cycle (SDLC) process in place that contains system change request instructions. Although the USMS feels that users have been sufficiently notified of existing policies, our observations proved different. As stated previously, we followed an audit program in which identical questions were asked of individuals representing specific positions within the district office. Specifically, we asked those most familiar with the application, the criminal clerk and the system administrator, how changes were requested to the PTS application. We found at all eight of the locations visited, the Eastern District of Virginia; the District Court for the District of Columbia; the Eastern District of Pennsylvania; the Southern District of New York; the Southern District of Texas; the Northern District of Illinois; the Southern District of Florida; and the District of Arizona, that knowledge of the official change control process for the PTS application was deficient. In most cases, neither the 96 system administrator nor the criminal clerk were aware of the existence of a change request form or how to process a request according to the existing policy. Also in the USMS’s response to recommendation 6, the USMS states that the audit report text does not substantiate the information in the last paragraph of page 12 of the draft report where the discussion of the ineffective management of modifications to application software is expanded to include unauthorized changes made by knowledgeable programmers. On page 16 of our report, we state that, “At the USMS’s headquarters, only one individual is assigned to code, test, and implement changes to the PTS application.” This example substantiates the audit report text because according to the Department’s Order 2640.2E, components are directed to integrate security into various stages of a system’s life cycle and to ensure that changes to any system are controlled. Changes to a system include changes requested by users as well as changes made by knowledgeable programmers. We presented this information on page 16 under Segregation of Duties because it represented a good example of failure to segregate duties among staff although it also applies to the ineffective management of modifications to application software. We disagree that this vulnerability should be excluded from the report. In order to resolve and close this recommendation, the USMS should provide documented evidence to us that PTS users are informed of the policies and procedures for requesting changes to the application. 7. Resolved. The USMS states that it has taken steps through the development of JDIS to address the problem of PTS’s outdated programming software and database management system. In order to close this recommendation, the USMS should provide documented evidence to us that the outdated versions of the PTS’s application programming software and database management system have been removed from the production environment and replaced with current versions that are supported by the vendor. 8. Unresolved. The USMS provided an attachment to its response to demonstrate that duties have been segregated to minimize functional incompatibility. The attachment lists duties for positions within the USMS such as end users, system administrators, and the information systems security officer as they relate to computer security. While valuable, the information only partially addresses the conditions described on pages 15 through 17 of the report that 97 enumerate problems with procedures that affect critical processes performed by the PTS application’s end users and the application programmer. In this report, we provide the FISCAM guidance under the “Segregation of Duties” section that requires entities not only to segregate incompatible duties, but also to establish related policies. We also provide FISCAM guidance that requires entities to control personnel activities through formal operating procedures and supervision and review. Our recommendation applies to our observations during field site visits that duties were not sufficiently segregated among staff and that sufficient procedural guidance does not exist for the record creation process. Specifically, district office operations allow an end user to create a prisoner record, manipulate that record, and commit changes to information contained in the PTS database with no management oversight or approval prior to the completion of a transaction, or shortly thereafter. This condition creates the situation where a single individual has complete control over the input, processing, and output stages of the information cycle. We also provided the example of the condition existing at USMS headquarters wherein one individual can code, test, and implement software changes thereby having complete control over the PTS’s system life cycle. We have reviewed the information provided as Attachment 2 to the USMS response. The additional procedural steps added to the Cellblock Operations Manual 99-47 address the conditions described in this report pertaining to controlling personnel activities through formal operating procedures. However, none of the information provided ensures that duties affecting the application’s life cycle are sufficiently segregated or that supervisory review of data is assigned to anyone at the district office level. In order to resolve and close this recommendation, the USMS should provide to us documented evidence that policies and procedures for segregating duties are developed and enforced to provide assurance that distinct functions are performed by different individuals and that no individual has complete control over the PTS’s processing functions. 9a. Unresolved. The USMS contends that system administrators are fully aware of required actions and responsibilities in the event of an emergency situation and the USMS requested that we provide specific examples of where this may not be accurate. We reviewed both the USMS system security plan for the PTS 98 application and the contingency plan for the application in order to gain an understanding of emergency procedures in place to protect the application and minimize service interruptions. We found that emergency procedures and contact information established for the PTS application are contained in the contingency plan for the application; however, the USMS headquarters confirmed that it had not disseminated the contingency plan to the district offices. We found that none of the system administrators at the sites had been provided a copy of the contingency plan containing emergency procedures and contact information. In addition, we found that the USMS has not tested the contingency plan for PTS to actually verify that employees can perform their necessary duties in the event of an emergency. We found the following conditions at the sites indicated in the chart below: N/IL S/FL D/AZ x x S/TX No knowledge of the existing contingency plan Source: OIG working papers S/NY No emergency contact list on site E/PA Specific Conditions DC/DC E/VA Emergency Procedures Deficiencies x x x x x x x x x x x x In order to resolve and close this recommendation, the USMS should provide evidence to us that it has tested the contingency plan and disseminated the plan to system administrators to ensure that employees involved in emergency response procedures are identified and trained in their emergency roles and responsibilities. 9b. Unresolved. The USMS provided information regarding the location of its contingency plans on the USMS intranet. However, this electronic posting does not provide assurance that in the event of an emergency where access to files located on network servers are not available, that individuals at the site would know who to contact. In order to resolve and close this recommendation, the USMS should provide to us documented evidence that emergency contact lists are maintained on-site. 10. Unresolved. The USMS requested additional information regarding specific sites where backup tapes were not being rotated off-site. We found that this condition existed at the Eastern 99 District of Pennsylvania and the Southern District of New York. The USMS provided a corrective action plan to reinforce backup tape rotation policies at the locations identified. In order to resolve and close this recommendation, the USMS should provide us with documented evidence that PTS’s backup tapes are properly rotated and stored at an off-site location. 11. Resolved. The USMS states that the PTS contingency plan will be tested, but does not specify a milestone date for this action. In order to close this recommendation, the USMS should provide us a milestone date for the annual testing of the PTS contingency plan as required by the Department and confirmation of the results of the test once completed. 12a. Unresolved. The USMS states that key source document requirements are already in place and that district office management will be directed to review data collection activities. We agree that modifications made to the Cellblock Operations Manual 99-47 provide guidance to improve data collection procedures. However, the revised Cellblock Operations Manual does not define, specifically, the minimum source documents required during the record creation process, such as two photographs of the inmate to aid the USMS with proper inmate identification and the medical form USM-552 to document health related issues disclosed during the initial interview with the inmate. In order to resolve and close this recommendation, the USMS should provide evidence to us that policies and procedures to establish key source document requirements have been developed. 12b. Unresolved. The USMS states that the record creation process is standardized throughout the USMS and states that the PTS User’s Manual and associated policy directives address this condi tion. However, during our site visits we found that the USMS had not established controls over source documents nor provided for their proper authorization because the USMS had not provided adequate data rules for employees or set standards for consistency during the record creation process. In order to resolve and close this recommendation, the USMS should provide evidence to us that policies and procedures were developed to standardize the record creation process throughout the USMS for the PTS. 13. Unresolved. The USMS’s response states that the OIG calls for a supervisor to sign off on a handwritten USM-129/312. This is not an accurate interpretation of our recommendation. We 100 recommended that a “control” be implemented to ensure that transactions are supported by properly authorized source documents, but we did not mandate that supervisors sign off on handwritten USM-129/312s. In the report, we simply presented supervisory authorizations on source documents as an example of a control. We observed at the Eastern District of Virginia that the handwritten USM-129 was used as a form of authorization control and offered this as an example of what worked effectively at one office, but did not suggest this practice as an overall solution. The determination of what specific control would be feasible for implementation throughout the USMS was left to the discretion of the USMS. To resolve and close this recommendation, the USMS should provide us with documented evidence that it has implemented a control to ensure that before information is entered into the system, transactions are supported by properly authorized source documents. 14. Unresolved. The USMS agrees that sufficient auditing is not conducted, but states that this deficiency is not due to the lack of management’s requirement to do so. We reviewed the certification and accreditation documentation for the PTS application provided by the USMS in June 2003. On Form 6, Item 14a and b of the Risk Assessment Report for PTS/USMS-ABS dated June 2003, the USMS responded affirmatively that it has defined audit requirements for the PTS application and that the application has the capability to identify the creator of data and processes. In order to resolve and close this recommendation, the USMS should provide documentation to us evidencing that audit trails for the PTS application are maintained and reviewed as required by the Department. 15. Resolved. The USMS states that global database searches will be possible through the upcoming JDIS initiative. In order to close this recommendation, the USMS should provide documented evidence to us indicating that the PTS application has been modified to perform automatic global database searches of all its district office databases. 16. Resolved. The USMS indicates that erroneous data is collected through jail utilization and population projection reports reviewed by the Prisoner Services Division. The USMS does not indicate, however, what types of erroneous data are captured or what actions are taken to correct and investigate such data. Specifically, this audit report refers to the need to collect and review 101 information on erroneous data, such as rejected transactions and input errors or omissions, to determine if errors cause threats to the PTS application or render the system vulnerable to compromise. Our findings indicate that all eight sites visited failed to collect statistics on the frequency of error messages generated by the system. In order to close this recommendation, the USMS should provide to us documented evidence of how erroneous data is collected and reported back to the USMS management for investigation and correction. 17. Unresolved. The USMS contends that there is no “unauthorized” employee from which sensitive privacy information should be protected and asserts that a background investigation suffices as authorization to access PTS data. However, an examination of PTS’s certification and accreditation documents indicates that the USMS does distinguish between “authorized” and “unauthorized” users. Specifically, in the PTS/USMS-ABS System Security Plan, Section 1.8, System Interconnection/Information Sharing, the USMS states that “Not all Marshals users are authorized access to PTS, but all users who are authorized to connect to PTS do so through MNET.” In the security plan’s Section 4. 2, Logical Access Controls, the USMS explicitly states that “Controls exist in the PTS system to authorize and restrict users from performing particular functions.” The document further states that “Access rights are granted based on the determination of USMS district management.” In the PTS’s system security plan, section 1.10, General Description of Information Sensitivity, the USMS defines the requirement for confidentiality as high and further states that “Inappropriate disclosure of the information of the information could have negative impact on the safety of prisoners in USMS custody and the law enforcement officials assigned to transport and guard them. Furthermore, inappropriate disclosure could place the families of prisoners in USMS custody at risk as well as USMS employees assigned to protect and transport prisoners. All Privacy Act information within PTS must be protected. . . The requirement for confidentiality is HIGH.” Protection of system data includes output reports and considering the USMS’s own categorization of its requirement for confidentiality as high, USMS’s protection of system output must be commensurate with its confidentiality category. In order to resolve and close this recommendation, the USMS should provide to us documented evidence that output 102 reports containing sensitive privacy information are protected from unauthorized persons. 18. Unresolved. The USMS requests that additional information be provided regarding instances where the PTS application allowed simultaneous updates of the same record by more than one user. We witnessed this condition at the following locations: the District Court for the District of Columbia; the Eastern District of Pennsylvania; the Southern District of New York; and the District of Arizona. In order to resolve and close this recommendation, the USMS should provide us documented evidence that each installation of the PTS application protects against simultaneous updates of the same record by more than one end-user. 19. Resolved. The USMS agrees with our recommendation that adequate and proper source documents be maintained in prisoner file folders to substantiate employee activities. The USMS submitted a revised Cellblock Operations Manual 99-47 that enumerates in Section C.3, Prisoner Records, specific documents that must be maintained in prisoner files. In order to close this recommendation, the USMS should provide documented evidence to us that an internal review process has been formalized to ensure that adequate and proper source documents be maintained in prisoner file folders to substantiate employee activities. 20a. Resolved. The USMS agrees with our recommendation to implement integrity assurances and quality control measures to require periodic spot-checking and validation of output from the PTS. We have accepted the USMS’s proposed resolution to Recommendation 19 that refers to Recommendation 12a. The proposed resolution to Recommendation 12a states that the USMS will include, during its Program Review’s internal audits, a review of prisoner’s files to compare the contents with reports of the USM129/312 generated by PTS. In order to close this recommendation, the USMS should provide documented evidence to us that policies and procedures to implement quality control measures require the periodic spot-checking and validation of output from the PTS have been developed. 20b. Resolved. As stated previously, we accept the USMS’s proposed resolution to Recommendation 19 that refers to its proposed resolution to Recommendation 12a. The proposed resolution to Recommendation 12a states that output will be checked as a requirement during Program review’s internal audits to confirm 103 that processing of information is correct. In order to close this recommendation, the USMS should provide documented evidence to us that policies and procedures have been developed to implement quality control measures to confirm that the correct information is processed in PTS. 104