OPM Proposes Actions To Strengthen Cybersecurity Of Its IT Systems

King & Spalding
Contact

On June 24, 2015, the Office of Personnel Management (the “OPM”) announced several actions to strengthen its cybersecurity.  The 8-page “Actions to Strengthen Cybersecurity and Protect Critical IT Systems” (the “Action Plan”) comes in the wake of the massive cyber theft from OPM’s systems, which has been called one of the largest government hacks in history with the estimated number of affected individuals reaching approximately 18 million.

The Action Plan starts by reciting the “23 concrete steps to improve information security” that the OPM took before discovering the current security incident. These steps included OPM making over $80 million in investments in modernizing its IT security operations, implementing two factor authentication (through the use of smart card log in) for all privileged users who may have access to sensitive information, deploying essential hardware and software tools to secure the network (including tools that mask and redact data), and strengthening oversight of contractors to better manage third party data security risks.

In addition, the Action Plan lays out the following new actions to bolster security and modernize OPM’s IT systems:

Improving Security

1. Completing deployment of two factor authentication for unprivileged users as well as privileged users by August 1, 2015;

2. Working with the Department of Homeland Security to implement a continuous monitoring program by March 2016;

3. Acquiring access to contractor systems for emergency access by the OPM and law enforcement;

4. Expanding encryption in databases to the extent feasible (where previously the OPM has stated some of its systems will not work with encryption) by July 15, 2015;

Leveraging Outside Expertise

5. Hiring a new cybersecurity advisor by August 1, 2015;

6. Consulting with private sector CIOs and cybersecurity experts by holding workshops in the coming weeks;

7. Consulting with the Inspector General on a bi-weekly basis;

Modernizing Systems

8. Migrating to a new IT network environment capable of significantly increased security controls;

9. Assessing the scope of its IT modernization process before the end of the 2015 fiscal year;

10. Exploring additional contracting avenues for its modernization project;

11. Providing additional recommendations and proposals to the House and Senate appropriations committees by June 26 (information on any such additional recommendations was not immediately available as of press time);

Accountability

12. Initiating monthly reviews by OPM’s Director, the CIO and the new cybersecurity advisor;

13. Establishing regular employee and contractor training on a bi-annual basis;

14. Documenting incidence response procedures, including how they will work with other Federal agencies; and

15. Ensuring compliance with the Federal Information Security Management Act (the “FISMA”).

The Action Plan is the OPM’s response to increasing public criticism that the OPM has failed to secure its systems, and in some cases has failed to comply with the  FISMA. Through these actions, the OPM intends to ensure that it has “all the tools it needs to safeguard its systems and protect the men and women that serve the Federal government.” It remains to be seen, however, whether the OPM can distance itself from the current controversy regarding its IT systems.

The full text of the Action Plan is available here.

Reporter, Longbo Wang, Palo Alto, +1 650 422 6729, lwang@kslaw.com.

Written by:

King & Spalding
Contact
more
less

King & Spalding on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide