An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
Department of the Treasury
INFORMATION TECHNOLOGY: Fiscal Service Needs to Strengthen Security Controls over Public-Facing Web Servers
The OIG’s contracted auditors found that the FY 2016 financial statements for the Department and FSA were presented fairly in all material respects, in accordance with generally accepted accounting principles. However, the auditors identified two significant deficiencies in internal control over financial reporting: (1) The auditors found significant deficiencies in controls over the Department’s processes for model design and development, risk assessment, model operation and validation, and oversight. (2) The auditors found persistent information technology controldeficiencies, including security management, access controls, and configuration management, which can increase the risk of unauthorized access to the Department’s systems used to capture, process, and report financial transactions and balances, affecting the reliability and security of the data and information.
The OIG’s contracted auditors found that the FY 2016 financial statements for the Department and FSA were presented fairly in all material respects, in accordance with generally accepted accounting principles. However, the auditors identified two significant deficiencies in internal control over financial reporting: (1) The auditors found significant deficiencies in controls over the Department’s processes for model design and development, risk assessment, model operation and validation, and oversight. (2) The auditors found persistent information technology controldeficiencies, including security management, access controls, and configuration management, which can increase the risk of unauthorized access to the Department’s systems used to capture, process, and report financial transactions and balances, affecting the reliability and security of the data and information.