Sorry, you need to enable JavaScript to visit this website.
Skip to main content
Title Full
Inadequate Cybersecurity Rendered DHS Headquarters High-Value System Vulnerable to Attack
Date Issued
Submitting OIG
Department of Homeland Security OIG
Agencies Reviewed/Investigated
Department of Homeland Security
Report Number
OIG-25-43
Report Description

The Department of Homeland Security Headquarters (HQ) did not adequately secure a non-Tier 1 High Value Asset (HVA) system used to support data analysis and reporting on DHS component operations, which rendered the system and its sensitive information vulnerable to cyberattacks. Although DHS HQ developed policies and procedures meant to reduce risks to sensitive information stored on the HVA system and effectively implemented certain controls, we determined the system did not meet security requirements.  We identified nine unique critical and high-risk vulnerabilities that appeared 182 times in the system and, through simulated cyberattack penetration testing, were able to exploit vulnerabilities.  The vulnerabilities we identified pose significant security risks, increasing the likelihood an attacker could gain access to sensitive information. These deficiencies demonstrate that DHS HQ needs to strengthen its management of the HVA system.  Ensuring the system complies with the Department’s security and privacy policies will better protect the sensitive information processed by the system.  Until these deficiencies are addressed, DHS HQ may not be equipped to protect the HVA system and cannot ensure it will be able to quickly respond to and recover from a cyberattack. 

Report Type
Audit
Agency Wide
Yes
Number of Recommendations
5
Questioned Costs
$0
Funds for Better Use
$0
Report updated under NDAA 5274
No
External Entity
https://www.oig.dhs.gov/sites/default/files/assets/2025-09/OIG-25-43-Sep25.pdf

Open Recommendations

This report has 5 open recommendations.
Recommendation Number Significant Recommendation Recommended Questioned Costs Recommended Funds for Better Use Additional Details
1 No $0 $0

We recommend the DHS Office of the Chief Information Officer require the High Value Asset system owner to apply security updates and software patches to remediate vulnerabilities on all devices in accordance with applicable DHS policies.

2 No $0 $0

We recommend the DHS Office of the Chief Information Officer require the High Value Asset system owner to perform configuration testing and verify that all approved settings are implemented.

3 No $0 $0

We recommend the DHS Office of the Chief Information Officer require the High Value Asset system owner to implement multifactor authentication for all database and application programming interface accounts.

4 No $0 $0

We recommend the DHS Office of the Chief Information Officer direct the High Value Asset system owner to ensure user accounts are reviewed annually.

5 No $0 $0

We recommend the DHS Office of the Chief Information Officer confirm the current enterprise learning management system adequately retains documentation to demonstrate users’ compliance with security awareness training, privileged user training, and role-based training.

Department of Homeland Security OIG

United States