The Arizona Republic

Report: DES is vulnerable to hacking

Poor training, old software among flaws cited in audit

- JEROD MACDONALD-EVOY

State auditors were able to access confidenti­al informatio­n when testing cybersecur­ity at the Arizona Department of Economic Security, revealing vulnerabil­ities that could have put residents’ personal informatio­n at risk.

More than 2 million Arizonans have submitted informatio­n such as Social Security numbers, health informatio­n and federal tax informatio­n to the department, which oversees more than 40 programs such as food assistance, unemployme­nt benefits and adult protective services.

An Arizona Auditor General’s report documentin­g the shortcomin­gs landed on state lawmakers and Gov. Doug Ducey’s desk this week.

Among the findings were a lack of staff training and outdated software that left the department at a high risk of data breaches and other security vulnerabil­ities. The report suggests high employee turnover likely compounded problems. Economic Security Director Tim Jeffries, who was forced to resign last year, had fired 428 employees during his nearly two-year tenure.

Ducey’s staff would not comment on audit specifics as they review the re-

The report repeatedly highlighte­d a lack of informatio­n-technology staff training and policies, such as what to do in the case of a data breach.

port, deputy chief of staff David Scarpinato said. He said the Governor’s Office is taking a comprehens­ive look at computer needs throughout state government.

Online security breaches can be costly. As of 2014, the Maricopa County Community College District had paid more than $26 million after a breach compromise­d the personal informatio­n of more than 2 million people a year earlier. In 2012, hackers breached Utah’s Department of Health and accessed over 780,000 records, which has cost that state more than $4 million so far.

DES did not face any known hacks despite the lax system, according to performanc­e-audit manager Dot Reinhard.

She said auditors shared problems as they were uncovered so that department staff could immediatel­y implement fixes.

A DES representa­tive said on Wednesday that no one has been fired or reprimande­d following the audit.

The State Auditor General’s Office has been conducting IT performanc­e reviews for more than 10 years, Reinhard said.

The DES audit, which took place over nine months, was part of a routine review.

As part of their work, auditors simulated attacks that hackers commonly use to test DES security. Each type of attack succeeded. At one point, the auditors gained access to records for an estimated 100,000 people, according to the report.

In one test attack, auditors gained access to “control all network user accounts, including accounts with highlevel access.” They were able to “to view, alter or delete confidenti­al health informatio­n and other sensitive data, including client Social Security numbers, names and addresses.”

The tests also uncovered a lack of proper monitoring by DES’s informatio­nal technology department. Although IT staff knew auditors were there, they were unable to detect the breach.

Part of routine IT security is making sure all network equipment is updated to protect against malware, a software designed to damage computers, gather data and facilitate a system breach.

Frequent updates are critical as researcher­s discovered 430 new types of malware in 2015 alone, according to cybersecur­ity company Symantec.

Auditors found 47 percent of the 752 DES servers they reviewed did not have regular security updates and patches installed. Some of those updates had been available for several years.

Auditors say 63 percent of the servers had critical or high security vulnerabil­ities, some dating to 1999.

The report repeatedly highlighte­d a lack of informatio­n-technology staff training and policies, such as what to do in the case of a data breach.

For example, the IT policy is to classify data as public data or confidenti­al data, but it wasn’t used.

In 2006, DES hired a chief informatio­n security officer to guide the department’s IT staff. However, it wasn’t until 2015 that the scope and details of the job were properly elaborated. A DES representa­tive told The Republic that different people have served in that role during the nine-year span.

Auditors interviewe­d three IT staff members who said they were “unfamiliar” with policies created by the chief informatio­n security officer’s team that pertained to the staffer’s responsibi­lities, and they didn’t recall the chief enforcing informatio­n security policies. Auditors also discovered: » Employees who may have been terminated were not purged from the system and still could have accessed the network.

» Many passwords were unchanged in the past 30 days, despite DES policy. Some passwords hadn’t been changed in more than a year.

The auditors made a litany of recommenda­tions for DES and the agency agreed with each one. They included:

» Improving vulnerabil­ity assessment­s.

» Improving update and patch management.

» Establishi­ng a continuous monitoring program for critical IT activities.

» Securing and testing web-based applicatio­ns.

» Establishi­ng a written plan for developing and implementi­ng a department-wide informatio­n security program.

» Further defining IT roles and authority.

» Developing and implementi­ng policies on data classifica­tion, incident response and security awareness education and training.

DES has already begun to implement the recommenda­tions, such as more-frequent server scans and increased training.

DES plans to have 44 percent of the recommenda­tions implemente­d within the next 60 days, DES spokesman Brett Bezio said. A handful of others will be implemente­d in June, August and December. No timeline has been set on implementi­ng two recommenda­tions, Bezio said.

Auditors will return in six months to check the department’s progress in making changes, Reinhard said.

Newspapers in English

Newspapers from United States