The VA Office of Inspector General (OIG) conducts information security inspections to assess whether VA facilities are meeting federal security requirements. They are typically conducted at selected facilities that have not been assessed in the sample for the annual audit required by the Federal Information Security Modernization Act of 2014 (FISMA) or at facilities that previously performed poorly. The OIG selected the Northern Arizona VA Healthcare System because it had not been previously visited as part of the annual FISMA audit.The OIG’s information security inspections focus on three control areas that apply to local facilities and have been selected based on their levels of risk: configuration management, security management, and access controls. During this inspection, the OIG found deficiencies in all three areas.Deficiencies in configuration management included previously unidentified critical vulnerabilities, uninstalled patches, and network operating systems no longer supported by the vendor—all of which could deprive users of reliable access to information and could risk unauthorized access to, or the alteration or destruction of, critical systems. The OIG identified almost twice as many devices on the network than the inventory listed, which constitutes a security management weakness. Weak access controls included missing video surveillance at a data center, inadequate fire-detection and suppression equipment, insufficient water sensors and climate controls, unmounted or stacked network equipment, and communications rooms without backup power supplies.The OIG made six recommendations to the assistant secretary for information and technology and chief information officer to improve controls at the healthcare system because they are related to enterprise-wide information security issues similar to those identified on previous FISMA audits and information security inspections. The OIG also made five recommendations to the Northern Arizona VA Healthcare System director.
| Report Date | Agency Reviewed / Investigated | Report Title | Type | Location | |
|---|---|---|---|---|---|
| Department of Veterans Affairs | Inspection of Information Security at the Northern Arizona VA Healthcare System | Inspection / Evaluation |
|
View Report | |
| Department of Justice | Audit of the Office of Justice Programs Office for Victims of Crime Cooperative Agreement Awarded to the Sonoma County District Attorney's Office Santa Rosa, California | Audit |
|
View Report | |
| U.S. International Development Finance Corporation | DFC Compliance with the Payment Integrity Information Act of 2019 in FY 2022 | Audit | Agency-Wide | View Report | |
| U.S. Postal Service | Madeira Branch Office, Cincinnati, OH: Controls Over Retail Transactions | Audit |
|
View Report | |
| U.S. Postal Service | Groesbeck Branch in Cincinnati, OH: Controls Over Retail Transactions | Audit |
|
View Report | |
| U.S. Postal Service | Cincinnati Main Office, Cincinnati, OH: Controls Over Retail Transactions | Audit |
|
View Report | |
| Amtrak (National Railroad Passenger Corporation) | Five Employees Resign After Time Fraud Investigation | Investigation |
|
View Report | |
| U.S. Agency for International Development | Financial Audit of USAID Resources Managed by RET International in Multiple Countries under Multiple Awards and one Close-out Audit for the Year Ended September 30, 2019 | Other |
|
View Report | |
| Department of Labor | Tracking the Department of Labor's Unemployment Insurance Response to Local Communities During the Pandemic | Audit | Agency-Wide | View Report | |
| Internal Revenue Service | Actions Are Needed to Improve the Zero Trust Architecture Implementation | Audit | Agency-Wide | View Report | |