An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
Internal Revenue Service
The End-User Incident Management Process Can Be Improved
The U.S. International Trade Commission’s (Commission) Office of Inspector General conducted this audit to determine if the Commission effectively patches critical and high vulnerabilities on the International Trade Commission Network, known as ITCNet. The ITCNet includes the hardware, software, applications, databases, communications, and Internet access to support the Commission’s mission and daily operations.
The Federal Information Security Modernization Act of 2014 (FISMA) requires each agency’s Inspector General (IG) to conduct an annual independent evaluation to determine the effectiveness of the information security program (ISP) and practices of its respective agency. Our audit objective was to determine the effectiveness of Tennessee Valley Authority’s (TVA) ISP and practices as defined by the Fiscal Year (FY) 2022 Core IG Metrics Implementation Analysis and Guidelines (see Appendix B). Our audit scope was limited to answering the core IG metrics.The FISMA methodology considers metrics at a level 4 (managed and measurable) or higher to be at an effective level of security. Based on our analysis of the core IG metrics and associated maturity models, we found 12 of the 20 core IG metrics were at a level 1 (ad-hoc), level 2 (defined), or level 3 (consistently implemented); therefore, TVA's ISP was not operating in an effective manner as defined by the FY 2022 Core IG Metrics Implementation Analysis and Guidelines.
Boiler plants are essential to operating VA medical facilities. If boilers are not properly inspected, updated, and maintained, they may fail, putting veteran and employee safety at risk and disrupting patients’ access to care.The Veterans Health Administration (VHA) established a policy to safely operate boiler plants in VHA Directive 1810. The VA Office of Inspector General (OIG) audited to determine whether the New York/New Jersey VA Health Care Network—Veterans Integrated Service Network (VISN) 2—effectively followed that directive when inspecting and maintaining boiler plants.The OIG selected VISN 2 because data from fiscal year (FY) 2021 showed it had the most boiler plant components requiring maintenance and deficiencies associated with boiler plant components operating past their expected lifespans. The OIG determined VISN 2 did not fully comply with VHA Directive 1810 on useful life assessments and operations testing and inspections. Additionally, VHA leaders lacked information necessary for effective oversight.The OIG made six recommendations for facilities to manage the inspection and maintenance of boiler plants more effectively. The VISN 2 director should ensure useful life assessments are conducted for boilers operating past their expected or extended lifespans to ensure safe operation. Office of Healthcare Engineering leaders should clarify policies and procedures for scheduling useful life assessments for boilers, update VHA Directive 1810 to ensure medical facility boiler policies reflect current procedures and clarify the frequency of tests and inspections and whether they require third-party inspectors.The OIG also recommended the VISN 2 director review medical facilities’ boiler operation policies regarding notifying officials and planning corrective action to ensure they are consistent with VHA Directive 1810. The VISN 2 director also should employ a management information system to facilitate access to inspection records, useful life assessments, and corrective action plans.
The U.S. Postal Inspection Service is responsible for Postal Service policies, procedures, standards, and requirements for facility security and access controls. It has also established a risk management process — the Vulnerability Risk Assessment Tool (VRAT) — to ensure compliance with facility security policies and procedures and identify facility security deficiencies. Additionally, the Postal Inspection Service is an associate member of the Interagency Security Committee (ISC) formed by Executive Order 12977 to enhance the quality and effectiveness of security in protecting federal facilities.