Report: Education Department's IT Security is 'Not Generally Effective'

The United States Department of Education’s Office of Inspector General has found in a recent report that the department’s overall information technology security is “not generally effective” in meeting several federal requirements. The ed department (ED) and its Federal Student Aid (FSA) office scored only 53 points out of 100 in a recent security audit.

The report, published Monday, found that during a fiscal year 2016 audit, the ED was not generally effective in the following three security functions: protect, detect and respond.  

In the security function called “protect,” the ed department scored 7 points out of 20. In the function titled “detect,” the department scored 3 points out of 20. And in the function dubbed “respond,” the department again scored only 3 points out of 20.

The Office of Inspector General found that the ED and FSA were generally effective in two of five security functions: identify and recover.

The report also found that the ED had made some improvements since its fiscal year 2015 audit. However, “weaknesses remained” and “the Department and FSA’s information systems continued to be vulnerable to security threats.” 

The report detailed some specific weaknesses, namely:

  • Select policies and procedures are not current with National Institute of Standards and Technology and departmental guidance;
  • Appropriate application connection protocols were not being used;
  • The department is unable to prevent unauthorized devices from being connected to the network;
  • The implementation and management of the technical security architecture supporting the department’s and FSA’s applications require strengthening to more effectively restrict unauthorized access to information resources; and
  • The Office of the Chief Information Officer and FSA did not implement remedial actions for previously identified security weaknesses and did not establish a proactive enterprise-wide process to fix similar vulnerabilities identified during previous audits.

The report offers 15 recommendations, six of which are repeat recommendations, to assist the ED and FSA with increasing the effectiveness of their information security programs so they comply with federal requirements.

The report also states, “Although the (Ed) Department and FSA may have taken action on specific findings, systemic issues persist in these metric domains on an enterprise-level.”

The full report, titled “The U.S. Department of Education’s Federal Information Security Modernization Act of 2014 Report for Fiscal Year 2016,” is accessible for free on the ED’s website.

About the Author

Richard Chang is associate editor of THE Journal. He can be reached at [email protected].

Featured

  • Cyber threat vectors illuminate global map

    Cyber Espionage Campaign Exploits Claude Code Tool to Infiltrate Global Targets

    Anthropic recently reported that attackers linked to China leveraged its Claude Code AI to carry out intrusions against about 30 global organizations.

  • college students sitting with laptops at an outdoor table

    How Colleges Are Building More Connected and Responsive Student Support

    Colleges are making steady progress in building more connected and responsive student support systems. By aligning services and improving coordination, institutions are enhancing both the student and staff experience.

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • Abstract digital cloudscape of glowing interconnected clouds and radiant lines

    Cloud Complexity Outpacing Human Defenses, Report Warns

    According to the 2026 Cloud Security Report from Fortinet, while cloud security budgets are rising, 66% of organizations lack confidence in real-time threat detection across increasingly complex multi-cloud environments, with identity risks, tool sprawl, and fragmented visibility creating persistent operational gaps despite significant investment increases.