Breadcrumb

Inspection of Information Security at the Southern Oregon Rehabilitation Center and Clinics

Report Information

Issue Date
Report Number
22-01836-12
VA Office
Information and Technology (OIT)
Veterans Health Administration (VHA)
Report Author
Office of Audits and Evaluations
Report Type
Information Security Inspection
Report Topic
Information Technology and Security
Major Management Challenges
Information Systems and Innovation
Recommendations
9
Questioned Costs
$0
Better Use of Funds
$0
Congressionally Mandated
No

Summary

Summary

The VA Office of Inspector General (OIG) conducts information security inspections to assess whether VA facilities are meeting federal security requirements. These inspections focus on four security control areas that apply to local facilities and have been selected based on their levels of risk: configuration management, contingency planning, security management, and access controls. During this inspection, the OIG found deficiencies with configuration management, security management, and access controls. Configuration management controls were deficient in vulnerability remediation, the process to identify, classify, and fix weaknesses. Without an effective vulnerability management program, opportunities for exploitation increase. The security management control deficiency was in system security planning, which is needed for authorizing a system to operate. Without a system security plan or an authorization to operate, and without requiring contractors to adhere to federal and VA security requirements, the facility cannot be sure that security controls will be implemented as required. The security management deficiencies were in network segmentation, physical access, environmental, audit and monitoring, and records management controls. Without these safeguards, breaches are more likely to occur and harder to detect, and assets are at risk of accidental or intentional destruction. The assistant secretary for information and technology and chief information officer concurred with all but one of the OIG’s nine recommendations. Regarding his nonconcurrence, the assistant secretary reported that the devices identified by the OIG as lacking required isolation—the finding that resulted in recommendation 4—do not meet the definition for devices subject to this requirement. However, these devices were identified by the facility as containing medical systems and therefore, per VA policy, fall under the medical device isolation architecture guidance. The OIG thus stands by its recommendation.

Open Recommendation Image, SquareOpenClosed and Implemented Recommendation Image, CheckmarkClosed-ImplementedNot Implemented Recommendation Image, X character'Closed-Not Implemented
No. 1
Closed and Implemented Recommendation Image, Checkmark
to Information and Technology (OIT)
Implement a vulnerability management program that ensures system changes within established deadlines.
No. 2
Open Recommendation Image, Square
to Information and Technology (OIT)
Develop and approve a system security plan and an authorization to operate for the special-purpose system.
No. 3
Closed and Implemented Recommendation Image, Checkmark
to Information and Technology (OIT)
Include language for contractors to follow federal and VA information technology security requirements in contracts that have an information technology component.
No. 4
Closed and Implemented Recommendation Image, Checkmark
to Information and Technology (OIT)

Verify that access control lists have been applied to network segments that contain medical systems.

No. 5
Closed and Implemented Recommendation Image, Checkmark
to Information and Technology (OIT)
Develop and implement a process to retain database logs for a period consistent with VA’s record retention policy.
No. 6
Closed and Implemented Recommendation Image, Checkmark
to Veterans Health Administration (VHA)
Develop and implement controls to remove an individual’s access rights to computer rooms when access is no longer necessary.
No. 7
Closed and Implemented Recommendation Image, Checkmark
to Veterans Health Administration (VHA)
Implement a process to regularly review applicable reports to ensure that only authorized individuals have computer room access and update the system access authorization memo to include only those individuals necessary to perform job functions.
No. 8
Open Recommendation Image, Square
to Veterans Health Administration (VHA)
Validate that appropriate physical and environmental security measures are implemented and functioning as intended.
No. 9
Closed and Implemented Recommendation Image, Checkmark
to Veterans Health Administration (VHA)
Inventory and verify that records containing personally identifiable information and personal health information are adequately secured.