Breadcrumb

Inspection of Information Security at the VA El Paso Healthcare System in Texas

Report Information

Issue Date
Report Number
23-01179-204
VA Office
Veterans Health Administration (VHA)
Report Author
Office of Audits and Evaluations
Report Type
Information Security Inspection
Major Management Challenges
Benefits for Veterans
Recommendations
8
Questioned Costs
$0
Better Use of Funds
$0
Congressionally Mandated
No

Summary

Summary

The VA Office of Inspector General (OIG) conducts information security inspections to assess whether VA facilities are meeting federal security requirements. They are typically conducted at selected facilities that have not been assessed in the sample for the annual audit required by the Federal Information Security Modernization Act of 2014 (FISMA) or at facilities that previously performed poorly. The OIG selected the El Paso VA Healthcare System because it had not previously been visited as part of the OIG’s annual FISMA audit. The OIG focused on three control areas it determined to be at highest risk—configuration management, security management, and access controls. The OIG identified two deficiencies in configuration management controls, none in security management controls, and six in access controls. The configuration management deficiencies were in vulnerability management and flaw remediation. The healthcare system’s vulnerability management controls did not identify all network weaknesses, such as unsupported versions of applications, and flaw remediation controls did not ensure comprehensive patch management. Further, some vulnerabilities were not remediated within established time frames. Additionally, the software system used to report vulnerabilities to facilities was not complete and accurate. For example, it did not have host names for 16 percent of the entries. The OIG identified multiple access deficiencies: inventories of keys used by employees to gain access to buildings and rooms were not completed, reviews of physical access logs were not done quarterly as required, temperature and humidity controls were lacking in communications rooms, surveillance cameras were inoperable, water detection controls were not working, and the emergency power shutoff was not tested annually. The OIG made eight recommendations to address the noted deficiencies.

Open Recommendation Image, SquareOpenClosed and Implemented Recommendation Image, CheckmarkClosed-ImplementedNot Implemented Recommendation Image, X character'Closed-Not Implemented
No. 1
Closed and Implemented Recommendation Image, Checkmark
to Information and Technology (OIT)

Implement a more effective vulnerability management program to address security deficiencies identified during the inspection.

No. 2
Open Recommendation Image, Square
to Information and Technology (OIT)
Ensure vulnerabilities are remediated within OIT’s established time frames.
No. 3
Closed and Implemented Recommendation Image, Checkmark
to Information and Technology (OIT)
Ensure that physical access for the data center and communication rooms are reviewed on a quarterly basis.
No. 4
Open Recommendation Image, Square
to Information and Technology (OIT)
Ensure physical access controls are implemented for communication rooms.
No. 5
Open Recommendation Image, Square
to Information and Technology (OIT)
Ensure a video surveillance system is operational and monitored for the data center.
No. 6
Open Recommendation Image, Square
to Information and Technology (OIT)
Ensure communication rooms with infrastructure equipment have adequate environmental controls.
No. 7
Open Recommendation Image, Square
to Information and Technology (OIT)
Ensure water detection sensors are implemented in the data center.
No. 8
Open Recommendation Image, Square
to Information and Technology (OIT)
Test the emergency power bypass during annual uninterruptible power supply testing and document results.