Index

Information Security: Software Change Controls at the Department of
Energy (Correspondence, 06/30/2000, GAO/AIMD-00-189R).

Pursuant to a congressional request, GAO reviewed software change
controls at the Department of Energy (DOE), focusing on: (1) whether key
controls as described in agency policies and procedures regarding
software change authorization, testing, and approval complied with
federal guidance; and (2) the extent to which agencies contracted for
year 2000 remediation of mission-critical systems and involved foreign
nationals in these efforts.

GAO noted that: (1) 3 of the 20 components--Nevada Operations Office,
Ohio Field Office, and Western Area Power Administration (WAPA)--had no
formally documented process for routine software change control; (2)
departmentwide guidance and formal procedures at 17 of the 20 components
included in GAO's review were inadequate; (3) of these 17 components,
only headquarters offices had formally adopted the department-level
guidance in documented procedures; (4) DOE had established
department-level guidance for software engineering that adopted the
Carnegie Mellon University Software Engineering Institute's Capability
Maturity Model for Software; (5) however, the guidance was not
mandatory, was adopted by only headquarters offices, and did not address
key controls; (6) based on GAO's interviews, DOE officials were not
familiar with contractor practices for software management; (7) this is
of potential concern because 324 of 352 DOE mission-critical systems
covered by GAO's study involved the use of contractors for year 2000
remediation; (8) officials at 9 DOE components were unfamiliar with
daily contractor practices and either directed GAO to interview
contractor staff to obtain this information or relied on contractor
personnel in GAO's interview; (9) based on GAO's interviews and review
of documented security policies and procedures, background screenings of
personnel involved in the software change process were not a routine
security control at all components; (10) for example, officials at Ames
Laboratory, the Office of Civilian Radioactive Waste Management, and
WAPA told GAO that four contracts for remediation services did not
include provisions for background checks or contractor staff; (11)
agency officials at Ames, headquarters, and the National Renewable
Energy Laboratory told GAO that foreign nationals were employed on three
contracts for remediation services; (12) officials at Ames,
headquarters, and WAPA did not require routine background screening of
foreign national personnel involved in making changes to software; and
(13) at Ames and headquarters, complete data on the involvement of
foreign nationals in software change process activities were not readily
available.

--------------------------- Indexing Terms -----------------------------

 REPORTNUM:  AIMD-00-189R
     TITLE:  Information Security: Software Change Controls at the
	     Department of Energy
      DATE:  06/30/2000
   SUBJECT:  Computer software verification and validation
	     Computer security
	     Computer software contracts
	     Internal controls
	     Contractor personnel
	     Information resources management
	     Contract oversight
	     Employment of foreign nationals
IDENTIFIER:  Software Capability Maturity Model
	     Y2K

******************************************************************
** This file contains an ASCII representation of the text of a  **
** GAO Testimony.                                               **
**                                                              **
** No attempt has been made to display graphic images, although **
** figure captions are reproduced.  Tables are included, but    **
** may not resemble those in the printed version.               **
**                                                              **
** Please see the PDF (Portable Document Format) file, when     **
** available, for a complete electronic file of the printed     **
** document's contents.                                         **
**                                                              **
******************************************************************
GAO/AIMD-00-189R

B-285543

June 30, 2000

MACROBUTTON Mr. John M. Gilligan

Chief Information Officer

Department of Energy

Subject: Information Security: Software Change Controls at the Department of
Energy

Dear Mr. Gilligan:

This letter summarizes the results of our recent review of software change
controls at the Department of Energy (DOE). Controls over access to and
modification of software are essential in providing reasonable assurance
that system-based security controls are not compromised. Without proper
software change controls, there are risks that security features could be
inadvertently or deliberately omitted or rendered inoperable, processing
irregularities could occur, or malicious code could be introduced. If
related personnel policies for background checks and system access controls
are not adequate, there is a risk that untrustworthy and untrained
individuals may have unrestricted access to software code, terminated
employees may have the opportunity to compromise systems, and unauthorized
actions may not be detected.

DOE was 1 of 16 agencies included in a broader review of federal software
change controls that we conducted in response to a request by Representative
Stephen Horn, Chairman, Subcommittee on Government Management, Information
and Technology, House Committee on Government Reform. The objectives of this
broader review were to determine (1) whether key controls as described in
agency policies and procedures regarding software change authorization,
testing, and approval complied with federal guidance and (2) the extent to
which agencies contracted for Year 2000 remediation of mission-critical
systems and involved foreign nationals in these efforts. The aggregate
results of our work were reported in Information Security: Controls Over
Software Changes at Federal Agencies (GAO/AIMD-00-151R, May 4, 2000), which
we are sending with this letter.

For the DOE segment of our review, we interviewed officials in DOE's Office
of the Chief Information Officer (OCIO) and Year 2000 project staff at
 headquarters and at 20 of 34 DOE components responsible for remediation of
software for Year 2000. These 20 components, listed in enclosure I,
remediated 352 of DOE's 417 mission-critical systems. We also obtained
pertinent written policies and procedures from these components and compared
them to federal guidance issued by the Office of Management and Budget (OMB)
and the National Institute of Standards and Technology. We did not observe
the components' practices or test their compliance with their policies and
procedures. We performed our work from January through March 2000 in
accordance with generally accepted government auditing standards.

At DOE, we identified concerns in three control areas: formal policies and
procedures, contract oversight, and background screening of personnel.

   * We found that 3 of 20 components—Nevada Operations Office (NOO), Ohio
     Field Office (OFO), and Western Area Power Administration (WAPA)—had
     no formally documented process for routine software change control.

   * Departmentwide guidance and formal procedures at 17 of the 20
     components included in our review were inadequate. Of these 17
     components, only headquarters offices had formally adopted the
     department-level guidance in documented procedures. DOE had established
     department-level guidance for software engineering that adopted the
     Carnegie Mellon University Software Engineering Institute's Capability
     Maturity Model for Software. However, the guidance was not mandatory,
     was adopted by only headquarters offices, and did not address key
     controls. Specifically, procedures in

   * four components did not address testing of routine software changes;
   * eight components did not address, and nine did not adequately address,
     controls over application software libraries including access to code,
     movement of software programs, and inventories of software;
   * sixteen components did not address operating system software access;
   * fifteen components did not address operating system monitoring; and
   * thirteen components did not address operating system software changes.

Enclosure II identifies the specific weaknesses we identified in each of the
16 components with documented procedures.

   * Based on our interviews, agency officials were not familiar with
     contractor practices for software management. This is of potential
     concern because 324 (92 percent) of 352 DOE mission-critical systems
     covered by our study involved the use of contractors for Year 2000
     remediation. For example, AlliedSignal/Kansas City (AlliedSignal),
     Grand Junction Project Office, Idaho National Engineering Laboratory
     (INEL), and Oak Ridge Operations Office (OROO) sent code or data
     associated with five mission-critical systems to contractor facilities,
     including one offshore foreign-owned company. However, agency officials
     could not readily determine how the code and data were protected during
     and after transit to the contractor facility, when the code was out of
     the agency's direct control. Also, officials at nine DOE components
     were unfamiliar with daily contractor practices and either directed us
     to interview contractor staff to obtain this information or relied on
     contractor personnel in our interview. These nine components are listed
     below.

   * AlliedSignal
   * Ames Laboratory (Ames)
   * INEL
   * NOO
   * OROO
   * Office of Civilian Radioactive Waste Management (OCRWM)
   * PANTEX
   * Sandia National Laboratories
   * Savannah River Operations Office

   * Based on our interviews and review of documented security policies and
     procedures, background screenings of personnel involved in the software
     change process were not a routine security control at all components.
     For example, officials at Ames, OCRWM, and WAPA told us that four
     contracts for remediation services did not include provisions for
     background checks of contractor staff.

   * Agency officials at Ames, headquarters, and NREL told us that foreign
     nationals were employed on three contracts for remediation services.
     Further, officials at Ames, headquarters, and WAPA did not require
     routine background screening of foreign national personnel involved in
     making changes to software. At Ames and headquarters, complete data on
     the involvement of foreign nationals in software change process
     activities were not readily available.

In light of these weaknesses, we suggest that you review DOE software change
and related contractor oversight and personnel policies and practices and
implement any changes that you deem necessary. Because we also identified
software control weaknesses at other agencies covered by our review, we have
recommended that OMB clarify its guidance to agencies regarding software
change controls as part of broader revisions that OMB is currently
developing to Circular A-130, Management of Federal Information Resources.

We requested comments on a draft of this letter from the OCIO. We received
oral comments from OCIO and from two of DOE's components, BPA and WAPA. OCIO
and WAPA concurred with our findings. BPA provided new information showing
that it had a formally documented process in place. We have made revisions
to this letter to reflect our analysis of this new information. In addition,
the BPA official told us that the Configuration Management Authority
established in April 2000 corrects the software change control weaknesses at
BPA that we identify in enclosure II. The WAPA official commented that
initiatives are underway to improve software change controls including a
dedicated software configuration management staff, a pilot program to assess
and enhance process elements, and development of improved administrationwide
procedures to be drafted by September 30, 2000. In addition, a Change
Control/Configuration Management Group is planned for long-term monitoring
of process effectiveness.

We encourage DOE and its components to continue efforts to improve controls
over software. We appreciate DOE's participation in this study and the
cooperation we received from officials at your office and at the DOE
components covered by our review. If you have any questions, please contact
me at (202) 512-6240 or by e-mail at mcclured.aimd@gao.gov, or you may
contact Jean Boltz, Assistant Director, at (202) 512-5247 or by e-mail at
boltzj.aimd@gao.gov.

Sincerely yours,

David L. McClure

Associate Director, Governmentwide

and Defense Information Systems

Enclosures

Department of Energy Components Included in Study

  1. Albuquerque Operations Office
  2. AlliedSignal (Kansas City)
  3. Ames Laboratory
  4. Bonneville Power Administration
  5. Brookhaven National Laboratory
  6. Grand Junction Project Office
  7. Headquarters, Department of Energy
  8. Idaho National Engineering Laboratory
  9. National Renewable Energy Laboratory
 10. Nevada Operations Office
 11. Oak Ridge Operations Office
 12. Office of Civilian Radioactive Waste Management
 13. Office of Naval Reactors
 14. Office of Scientific and Technical Information
 15. Ohio Field Office
 16. PANTEX
 17. Richland Operations Office
 18. Sandia National Laboratories
 19. Savannah River Operations Office
 20. Western Area Power Administration

Weaknesses in DOE Component Software Change Policies and Procedures

                Change Control Areas
 Component name
                ("X" = Not Addressed, "NI" = Addressed but Needs Improvement)
                                                               Monitoring and
                Changes to           Application Access to     use of         Operating
                application  Testing software    operating     operating      system
                software             libraries   system        system         software
                                                 software      software       changes
                                                               utilities
 Albuquerque
 Operations                          NI          X             X              X
 Office
 AlliedSignal
 (Kansas City)               X       NI          X                            X
 Ames Laboratory             X       NI          X             X              X
 Bonneville
 Power                               NI          X             X              NI
 Administration
 Brookhaven
 National                            X           X             X
 Laboratory
 Grand Junction
 Project Office                      NI          X             X              X
 Headquarters
 Department of                       X           X             X              X
 Energy
 Idaho National
 Engineering                         X           X             X              X
 Laboratory
 National
 Renewable
 Energy                      X       X           X             X
 Laboratory
 Oak Ridge
 Operations                  NI      X           X             X              X
 Office
 Office of
 Civilian
 Radioactive                         X           X             X              X
 Waste
 Management

 Office of Naval                                 Incomplete    Incomplete     Incomplete
 Reactors                            NI          documentation documentation  documentation
                                                 provided      provided       provided
 Office of
 Scientific and
 Technical                           NI          X             X              X
 Information
 PANTEX                              NI          X             X              X
 Richland
 Operations     X            NI      X           X             X              X
 Office
 Sandia National
 Laboratories                X       X           X             X              X
 Savannah River
 Operations                          NI          X             X              X
 Office

(511980)
  
*** End of document. ***