An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
The Office of the Inspector General performed an audit of a TVA hydroelectric facility to determine if the network architecture and assets in use to support site business and operations were compliant with TVA policies, procedures, and identified best practices. We determined several areas of the network architecture and assets did not follow TVA policies, procedures, or identified best practices. Specifically, we identified the following issues:• Network redundancy was not implemented in accordance with identified best practices.• Network asset retirement was not implemented in accordance with Power Operations’ Standard Operating Procedure.• Power Operations’ location specific standard operating procedure did not require unique passwords in accordance with identified best practices.In addition, we identified the following internal control deficiencies significant to our audit objective:• Baseline configurations were not implemented in accordance with location specific Power Operations’ standard operating procedure.• Physical access permissions and controls were not implemented in accordance with identified best practices.TVA management agreed with our recommendations.
Each year agency program officials, chief information officers, and inspectors general must review their agencies’ information security programs and report to the Department of Homeland Security and Congress on the programs’ compliance with the Federal Information Security Modernization Act (FISMA). The OIG contracted with an independent public accounting firm, CliftonLarsonAllen LLP (CLA), to evaluate VA’s information security program for FY 2023. After assessing 45 major applications and general support systems hosted at 23 VA facilities and on the VA Enterprise Cloud, CLA concluded that VA continues to face significant challenges meeting FISMA requirements.The audit found continuing significant deficiencies related to access, configuration management, and change management controls, as well as service continuity practices, all of which are designed to protect mission-critical systems from unauthorized access, alteration, or destruction. These deficiencies can be remedied by improving the deployment of security patches, system upgrades, and system configurations to mitigate significant security vulnerabilities and enforce a consistent process across all field offices; improving performance monitoring to ensure controls operate as intended at all facilities; communicating identified security deficiencies to mitigate significant risks; and addressing security-related issues that contributed to the information technology material weakness reported in the FY 2023 audit of VA’s consolidated financial statements.Of CLA’s 25 recommendations, VA concurred with 15 and non-concurred with 10; some of the 25 recommendations addressed repeat deficiencies from previous FISMA reports spanning multiple years. CLA will follow up on the outstanding recommendations and evaluate the adequacy of corrective actions in the FY 2024 audit of VA’s information security program.