Report: Education Department's IT Security is 'Not Generally Effective'

The United States Department of Education’s Office of Inspector General has found in a recent report that the department’s overall information technology security is “not generally effective” in meeting several federal requirements. The ed department (ED) and its Federal Student Aid (FSA) office scored only 53 points out of 100 in a recent security audit.

The report, published Monday, found that during a fiscal year 2016 audit, the ED was not generally effective in the following three security functions: protect, detect and respond.  

In the security function called “protect,” the ed department scored 7 points out of 20. In the function titled “detect,” the department scored 3 points out of 20. And in the function dubbed “respond,” the department again scored only 3 points out of 20.

The Office of Inspector General found that the ED and FSA were generally effective in two of five security functions: identify and recover.

The report also found that the ED had made some improvements since its fiscal year 2015 audit. However, “weaknesses remained” and “the Department and FSA’s information systems continued to be vulnerable to security threats.” 

The report detailed some specific weaknesses, namely:

  • Select policies and procedures are not current with National Institute of Standards and Technology and departmental guidance;
  • Appropriate application connection protocols were not being used;
  • The department is unable to prevent unauthorized devices from being connected to the network;
  • The implementation and management of the technical security architecture supporting the department’s and FSA’s applications require strengthening to more effectively restrict unauthorized access to information resources; and
  • The Office of the Chief Information Officer and FSA did not implement remedial actions for previously identified security weaknesses and did not establish a proactive enterprise-wide process to fix similar vulnerabilities identified during previous audits.

The report offers 15 recommendations, six of which are repeat recommendations, to assist the ED and FSA with increasing the effectiveness of their information security programs so they comply with federal requirements.

The report also states, “Although the (Ed) Department and FSA may have taken action on specific findings, systemic issues persist in these metric domains on an enterprise-level.”

The full report, titled “The U.S. Department of Education’s Federal Information Security Modernization Act of 2014 Report for Fiscal Year 2016,” is accessible for free on the ED’s website.

About the Author

Richard Chang is associate editor of THE Journal. He can be reached at [email protected].

Featured

  • laptop with AI symbol on screen

    Google Launches Lightweight Gemma 3n, Expanding Edge AI Efforts

    Google DeepMind has officially launched Gemma 3n, the latest version of its lightweight generative AI model designed specifically for mobile and edge devices — a move that reinforces the company's emphasis on on-device computing.

  • hooded figure types on a laptop, with abstract manifesto-like posters taped to the wall behind them

    Hacktivism Is a Growing Threat to Higher Education

    In recent years, colleges and universities have faced an evolving array of cybersecurity challenges. But one threat is showing signs of becoming both more frequent and more politically charged: hacktivism.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • blue AI cloud connected to circuit lines, a server stack, and a shield with a padlock icon

    AI Security Controls Lag Behind Adoption of AI Cloud Services

    Nearly nine out of 10 organizations are already using AI services in the cloud — but fewer than one in seven have implemented AI-specific security controls, according to a recent report from cybersecurity firm Wiz.