Citywide Identity Management Performance Audit March 2014 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of Denver is independently elected by the citizens of Denver. He is responsible for examining and evaluating the operations of City agencies for the purpose of ensuring the proper and efficient use of City resources and providing other audit services and information to City Council, the Mayor and the public to improve all aspects of Denver’s government. He also chairs the City’s Audit Committee. The Audit Committee is chaired by the Auditor and consists of seven members. The Audit Committee assists the Auditor in his oversight responsibilities of the integrity of the City’s finances and operations, including the integrity of the City’s financial statements. The Audit Committee is structured in a manner that ensures the independent oversight of City operations, thereby enhancing citizen confidence and avoiding any appearance of a conflict of interest. Audit Committee Dennis Gallagher, Chair Robert Bishop Maurice Goodgaine Jeffrey Hart Leslie Mitchell Timothy O’Brien, Vice-Chair Rudolfo Payan Audit Staff Audrey Donovan, Deputy Director, CIA, CRMA, CGAP Robert Pierce, IT Audit Supervisor, CISA, CISSP Shannon Kuhn, Lead IT Auditor, CISA Nicholas Jimroglou, Senior IT Auditor Jacqueline Boline, Senior IT Auditor You can obtain copies of this report by contacting us at: Office of the Auditor 201 West Colfax Avenue, Department 705 Denver CO, 80202 (720) 913-5000 Fax (720) 913-5247 Or download and view an electronic copy by visiting our website at: www.denvergov.org/auditor City and County of Denver 201 West Colfax Avenue, Department 705 • Denver, Colorado 80202 • 720-913-5000 • FAX 720-913-5247 • www.denvergov.org/auditor Dennis J. Gallagher Auditor March 20, 2014 Mr. Frank Daidone, Chief Information Officer Technology Services City and County of Denver Dear Mr. Daidone: Attached is the Auditor’s Office Audit Services Division’s report of its audit of Citywide Identity Management. The purpose of the audit was to assess the effectiveness of internal controls used by Technology Services organizations, the Department of General Services’ Facilities Management unit, and the Office of Human Resources to manage and monitor access to City systems and data. We tested both physical and logical access to City systems and facilities. For physical access, we focused on the buildings under the control of General Services Facilities Management (GSFM) and the Department of Human Services (DHS). For logical access, we tested all of the networks in use throughout the City. During the course of the audit, we identified that access to all of the buildings tested were not solely administered by GSFM and DHS. As a result, copies of this report will be provided to all agencies where improvements are required. We identified several areas where controls need to be improved related to identity management. Our audit recommendations address processes related to both logical and physical access controls. If implemented, these recommendations will enhance security across the City and help ensure that access to sensitive information is appropriately restricted. If you have any questions, please call Kip Memmott, Director of Audit Services, at 720-913-5000. Sincerely, Dennis J. Gallagher Auditor rp/DG cc: Honorable Michael Hancock, Mayor Honorable Members of City Council Members of Audit Committee Ms. Cary Kennedy, Deputy Mayor, Chief Financial Officer To promote open, accountable, efficient and effective government by performing impartial reviews and other audit services that provide objective and useful information to improve decision making by management and the people. We will monitor and report on recommendations and progress towards their implementation. City and County of Denver 201 West Colfax Avenue, Department 705 • Denver, Colorado 80202 • 720-913-5000 FAX 720-913-5247 • www.denvergov.org/auditor Dennis J. Gallagher Auditor AUDITOR’S REPORT We have completed an audit of Citywide Identity Management. The purpose of the audit was to assess the effectiveness of internal controls used by the City to manage and monitor access to City systems and data. In addition to assessing overall City controls, the audit examined identify management practices for the Departments of Aviation, Human Resources, General Services, and Technology Services as well as the Denver County Court. This performance audit is authorized pursuant to the City and County of Denver Charter, Article V, Part 2, Section 1, General Powers and Duties of Auditor, and was conducted in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The audit found that the City does not have an adequate identity management governance structure in place to ensure that the risk of inappropriate access to City facilities and systems is mitigated. We found that the lack of consistent processes for granting and revoking physical and logical access has resulted in former employees retaining access to information that is protected by the federal Health Insurance Portability and Accountability Act as well as the Criminal Justice Information System Security Policy. This report makes a number of specific recommendations that will strengthen the governance surrounding these issues and ensure that access to City facilities and systems is appropriate. We extend our appreciation to Technology Services, Denver International Airport Technologies, Denver County Court Technologies, Facilities Management, and the Office of Human Resources and the personnel who assisted and cooperated with us during the audit. Audit Services Division Kip Memmott, MA, CGAP, CRMA Director of Audit Services To promote open, accountable, efficient and effective government by performing impartial reviews and other audit services that provide objective and useful information to improve decision making by management and the people. We will monitor and report on recommendations and progress towards their implementation. City and County of Denver – Office of the Auditor Audit Services Division REPORT HIGHLIGHTS Citywide Identity Management Performance Audit March 2014 The audit focused on Citywide identity management of both physical and logical access to systems and data. Background Highlights Identity management is the task of controlling information about users on computers. This information includes credentials that authenticate the identity of a user, within systems. Information can include user descriptions and actions they are authorized to access and perform. Access to physical spaces can also be handled through identity management when software is the mechanism to grant and revoke building access. The audit found that improvements need to be made to the City’s identity management governance with regard to both physical and logical access. Specifically we identified: Purpose The purpose of this audit was to determine whether physical and logical access control policies are in place and adhered to; personnel with identity management responsibilities are adequately trained; access provisioning and de-provisioning is appropriately performed; periodic entitlement reviews are conducted to identify unauthorized access; password parameters align with best practices and the Federal Information Security Management Act; and access is managed in compliance with applicable regulations. • Thirty-eight active network accounts were not removed for former employees and contractors who are no longer affiliated with the City. Six of these accounts appear to have been logged into after separating from the City. • One hundred physical access badges were not disabled for former employees with clearances that allowed access to doors to the Denver Human Services Records Room, Child Welfare Office, 911 Emergency Communications Center, District and City Attorney’s Offices, and the City data centers. • Former employees retained access to hard copy child welfare and health information protected by the Health Insurance Portability and Accountability Act. • A former Technology Services employee retained remote access to databases containing criminal information restricted by the Criminal Justice Information Services Security Policy. • One individual within the City Attorney’s Office did not have logical or physical access revoked following employment. These and other instances of inappropriate access have occurred as a result of the City not having an adequate governance process in place to manage all steps in granting and revoking access to facilities and systems. For a complete copy of this report, visit www.denvergov.org/auditor Or Contact the Auditor’s Office at 720.913.5000 TABLE OF CONTENTS INTRODUCTION & BACKGROUND 1 Identity Management 1 Breach Case Studies 2 Background on Applicable Laws and Regulations 3 Logical Access Controlled through Centralized Directory Services 4 Physical Access Control Systems 5 SCOPE 6 OBJECTIVE 6 METHODOLOGY 6 FINDING 8 The City Needs to Improve Governance around Identity Management to Ensure that Access to Facilities and Systems Is Appropriately Restricted RECOMMENDATIONS 13 AGENCY RESPONSE 16 INTRODUCTION & BACKGROUND Identity Management Identity management (IdM) is the task of controlling information about users on computers. This information includes credentials that authenticate the identity of a user, information that describes users, and actions users are authorized to perform. It also includes the management of descriptive information about the users and how and by whom that information can be accessed and modified. Managed areas typically include users, hardware, network resources, applications, and physical premises. Effective governance around identity management helps ensure that access to facilities and systems is appropriately controlled and that threats related to unauthorized access are minimized. Threats to Denver City agencies are very real. The following example demonstrates effective identity management and physical access control and also illustrates the type of threat that a City like Denver faces when providing numerous public services to its citizens. On November 11, 2013, the Denver Post reported an incident involving a woman who drove a car onto the sidewalk, set the vehicle on fire, and then watched it burn in front of the Wellington E. Webb Municipal Office Building (Webb Building). 1 The Webb Building houses several key City agencies including the District and City Attorney’s Offices, the Controller’s Office, and Technology Services. The Denver Post reported that, after lighting fire to her car, the woman briefly entered the Webb Building at the main entrance off West Colfax Avenue. The woman was stopped before she could pass building security and the metal detectors, but she did publicly demonstrate one type of threat the City and County of Denver faces when providing numerous public services to Denver citizens. In today’s world of increased threats related to computer hacking and terrorism, effective governance around identity management is critical. Following are a few risks associated with weak identity management: • Increased risk to public and employee safety • Loss or compromise of sensitive data protected by rules and regulations • Heightened risk of costly fines, negative publicity, and an erosion of public trust • Increased risk of fraud • Elevated exposure to computer network hacking and malware 1 “Denver police arrest woman suspected of setting car ablaze downtown,” Denver Post, accessed January 2, 2014, http://www.denverpost.com/breakingnews/ci_24476139/car-erupts-into-flames-thick-smoke-near-webb. Page 1 Office of Office of the the Auditor Auditor Breach Case Studies A data breach is the intentional or unintentional release of secure information to an unsecured or non-trusted environment. Data breaches can be costly, create negative publicity, and occur in a number of ways. Following are a few examples of breaches that have occurred recently: • Target Corporation had a massive data breach on November 15, 2013, when the company’s payment system was hacked, exposing more than 40 million debit and credit cards. The hack occurred as a result of a third-party vendor having access to the Target network. Corporations often allow third-party vendors remote network access to perform periodic maintenance on information systems. It is believed that hackers stole the third-party network credentials, which allowed them to gain access to Target’s payment system. 2 • The City of Springfield, Missouri, had one of its websites hacked on February 28, 2012. Hackers were able to obtain more than 6,000 records containing social security numbers from online police records as well as more than 15,000 records relating to warrant information, including crime data. Officials are taking steps to notify approximately 2,100 individuals whose personal information may have been obtained when the site was breached. 3 • The Alaska Department of Health and Human Services (DHHS) agreed to pay the U.S. Department of Health and Human Services (HHS) $1.7 million to settle potential violations of the federal Health Insurance Portability and Accountability Act (HIPAA) Security Rule for a breach that occurred on July 26, 2012. The HHS Office for Civil Rights’ (OCR’s) investigation followed a breach report submitted by DHHS as required by the Breach Notification Rule within the Health Information Technology for Economic and Clinical Health (HITECH) Act. The report indicated that a USB thumb drive, possibly containing electronic protected health information (ePHI), was stolen from the vehicle of a DHHS employee. Over the course of the investigation, OCR found that DHHS did not have adequate policies and procedures in place to safeguard ePHI. Further, DHHS had not completed a risk analysis, implemented sufficient risk management measures, completed security training for its workforce members, implemented device and media controls, or addressed device and media encryption as required by the HIPAA Security Rule. 4 2 “Target Hackers Broke in Via HVAC Company,” Krebs on Security, accessed February 6, 2014, http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/. 3 “Springfield city website hacked as part of series of hacks involving government and law enforcement,” databreaches.net, accessed February 6, 2014, http://www.databreaches.net/mo-springfield-city-website-hacked-as-part-of-series-of-hacksinvolving-government-and-law-enforcement/. 4 “Alaska settles HIPAA security case for $1,700,000,” U.S. Department of Health and Human Services, accessed January 2, 2014, http://www.hhs.gov/news/press/2012pres/06/20120626a.html. City and County of Denver Page 2 Background on Applicable Laws and Regulations Due to the breadth of services that the City provides, the City must comply with a number of rules and regulations designed to protect the personal data of the City’s employees and residents. Following are examples of a few applicable rules and regulations that relate to some of the services the City and County of Denver provides: The Federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rule: 5 HIPAA establishes national standards to protect the confidentiality, integrity, and availability of individuals’ protected health information that is created, received, used, or maintained by a covered entity. The Privacy Rule gives individuals rights over their protected health information and sets rules and limits regarding who can look at and receive that health information. The Security Rule protects health information in electronic form by requiring entities covered by HIPAA to use physical, technical, and administrative safeguards to ensure that electronic protected health information remains private and secure. There are a variety of ways in which a city may be considered a covered entity under HIPAA, and the rule potentially impacts several departments if the city does any of the following: • Administers a public health program, such as the Department of Human Services • Administers police and corrections departments that retain health information on inmates • Contracts with or is considered a business associate of a covered entity, such as a third-party administrator for its self-insured health plan, or is a plan sponsor under a fully insured health plan • Owns medical clinics, hospitals, or ambulance services, such as the Denver 911 Emergency Communications Center • Performs certain health plan functions on behalf of the insurance carrier • Offers employees a Health Flexible Spending Account • Transmits individual health information electronically Several of Denver’s agencies are considered Covered Entities under HIPAA and are subject to the HIPAA Privacy and Security Rules that are in place to ensure the privacy of an individual’s health information. The HHS OCR is responsible for administering and enforcing the standards and may conduct complaint investigations and compliance reviews of Covered Entities. Another key component of HIPAA’s HITECH Act is that agencies are required to provide the Secretary of HHS with notice of breaches of protected health information. 5 45 C.F.R. § 160 and Subparts A and C of § 164 (2013). Page 3 Office of Office of the the Auditor Auditor Criminal Justice Information System (CJIS) Security Policy: 6 Due to the need for increased information sharing between federal, state, and local law enforcement agencies, the Federal Bureau of Investigation (FBI) has developed the CJIS policy to provide consistent guidelines for all law enforcement agencies to follow when securing Criminal Justice Information (CJI). The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. The policy integrates presidential directives, federal laws, FBI directives, and the criminal justice community’s Advisory Policy Board decisions along with nationally recognized guidance from the National Institute of Standards and Technology (NIST). The Denver Police, Sheriff, and Fire Departments, the District and City Attorney’s Offices, and other City agencies with access to databases containing CJI must be physically and logically secured in compliance with CJIS requirements. Payment Card Industry Data Security Standards (PCI DSS): 7 Any organization or merchant that accepts, transmits, or stores any credit cardholder data must comply with PCI DSS. PCI DSS contains twelve requirements with directives against which businesses may measure their own payment card security policies, procedures, and guidelines. By complying with periodic assessments performed by Qualified Security Assessors (QSAs), businesses and entities can become accepted by the PCI Standards Council as compliant with the twelve requirements and thus receive a compliance certification and a listing on the PCI Standards Council website. Compliance with the PCI DSS is vital for all merchants who accept credit cards, online or offline, due to the sensitivity of payment card data and the risks associated with credit card fraud. Since the City acts as a credit card merchant when providing some City services, the City must comply with PCI requirements and receives a Report on Compliance annually. The PCI requirements mandate that physical and logical access to cardholder data is restricted to authorized individuals only. 8 Logical Access Controlled through Centralized Directory Services Directory services are used to manage access across various portions of the City networks. A log-on is used as a point of entry to gain access to the majority of City systems. Whether connecting remotely from outside the City’s networks or in person to systems on the City’s networks, directory services authentication is required to gain access to City data. The City operates multiple network segments that are designed to restrict logical access to systems and data. Although Technology Services manages a large portion of the network, some segments are managed by other agencies. 6 “Criminal Justice Information Services Security Policy,” last modified August 9, 2013, U.S. Department of Justice. 7 PCI DSS v3.0, last modified November, 2013, https://www.pcisecuritystandards.org/. 8 Logical access refers to user based authenticated access to the application systems and data that is processed. City and County of Denver Page 4 Successful logon gains logical access to city data Physical Badge Access Directory Services Authentication Remote Access Unsuccessful logon restricts logical access to city data Source: Created by Audit Services Division Staff Physical Access Control Systems Several agencies throughout the City have the ability to grant and remove physical badge access to facilities under their control. For example, the Facilities Management unit within the Department of General Services is responsible for the administration of building badge access, in addition to the general management, maintenance, and daily operations of several City-owned facilities. Physical Badge Access Access to hard copy city data Source: Created by Audit Services Division Staff Prior to gaining access to secured City agencies and hard copy information, physical badge readers provide the first layer of physical security. Photo identification access badges, used for both identification and authentication of an individual, are used to restrict access to secured areas throughout the City. The City operates six separate physical access control systems. Each of the physical access control systems is used to restrict access to a number of City facilities. It is possible that an employee may have clearance to access more than one City owned location. Clearance may be granted to a current badge or a separate badge may be issued to provide access. Each access control system has a number of individuals who may grant, remove, and modify physical access clearances to their respective area. For example, we noted that the system controlling access to the Webb Building has separate agencies that may grant and revoke access rights to physical areas under their control. Agency representatives fill out a form to have Facilities Management create a badge ID card, and they notify Facilities Management when access is no longer needed. As described in the findings of this report, we identified instances where access badges were assigned by agencies other than Facilities Management and were not disabled by those groups following an employee’s departure from the City. Page 5 Office of Office of the the Auditor Auditor SCOPE The audit focused on Citywide identity management of both physical and logical access to systems and data. For logical access, the audit focused on all the directory services, which are used as the primary point of entry to access the majority of applications and electronic data in use within the City. For physical access, the audit tested two separate access control systems, which are used to control access to the following buildings: • Performing Arts Center • Minoru Yasui • City Permit Center • Denver Animal Shelter • Roslyn Building • DHS Main • Family Crisis Center • DHS East • Webb Building • City Data Center • DHS Montbello • 911 Technologies In accordance with Generally Accepted Government Auditing Standards the reader should be aware that some details about information security weaknesses are considered sensitive security information and are not disclosed within this report. The details of all findings, however, have been presented to Technology Services and Facilities Management. As part of our regular follow-up for audit issues, we will return at a future date to ensure that all findings have been addressed. OBJECTIVE The purpose of the audit was to assess the effectiveness of internal controls used by Technology Services, the Department of General Services’ Facilities Management unit, and the Office of Human Resources to manage and monitor access to City facilities, systems, and data. Audit objectives included an assessment of provisioning and deprovisioning processes for user accounts. METHODOLOGY We used several methodologies to achieve the audit objectives. Our evidence-gathering techniques included, but were not limited to: • Interviewing agency staff with identity management responsibilities • Reviewing existing policies and procedures related to access provisioning and deprovisioning City and County of Denver Page 6 • Querying the Office of Human Resources system of record to identify former and current employees for testing • Using data analytics to compare the listing of both current and former employees against the listing of users with logical and physical access o • User accounts were judgmentally selected from the full populations of potentially active accounts for former employees based on the risk associated with what each account had access to. We selected the following samples: Access de-provisioning: 85 samples Access provisioning: 20 samples Privileged accounts: 20 samples Physical de-provisioning: 100 samples Reviewing applicable laws, rules, and regulations related to identity management including: o Federal Information Security Management Act of 2002 (FISMA) o Federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) o HIPAA’s Health Information Technology for Economic and Clinical Health (HITECH) Act o Payment Card Industry Data Security Standard (PCI DSS version 3.0 November 2013) o Criminal Justice Information Services Security Policy (CJIS version 5.2 August 2013) • Querying Technology Services’ help desk ticketing system to identify whether individuals’ access was provisioned in accordance with existing policies • Reviewing existing security awareness training content • Reviewing relevant audits conducted in the past related to DIA information security awareness training • Performing tail-gate testing to determine the effectiveness of the physical badge control system Page 7 Office of Office of the the Auditor Auditor FINDING The City Needs to Improve Governance around Identity Management to Ensure that Access to Facilities and Systems Is Appropriately Restricted Audit work identified several weaknesses related to the City’s identity management governance structure for both physical and logical access to facilities and systems. With regard to physical access, we found inconsistent application of procedures used to provision and de-provision employee physical access badges, which resulted in former employees having active badges after they no longer worked for the City. With regard to logical access, we found that some individuals who no longer worked for the City still had active credentials, allowing them to access City systems, some of which contain sensitive information. To mitigate the risk associated with unauthorized access to City facilities and systems, we recommend that the City create a comprehensive information security governance structure including security awareness training, periodic entitlement reviews, a list of third-party workers, and procedures for requesting and removing access. Physical Access to Some City Facilities and Secured Areas Is Not Restricted to Authorized Individuals Physical access controls prevent unauthorized individuals from accessing City buildings. The City uses a variety of idenfication tools to ensure that physical access is only granted to City employees and only to the extent that they need access to perform their job duties. However, in the course of our audit work, we found a number of instances where individuals who no longer work for the City still had active badges that would grant them entry to secured facilities. During the audit, we tested two badging systems controlling access to the Wellington E. Webb Municipal Office Building (Webb Building), Performing Arts Center, Denver Animal Shelter, City data centers, Minoru Yasui Building, Roslyn Building, City Permit Center, 911 Technologies, and Department of Human Services facilities. A Significant Number of Badges for Previous City Employees Remain Active New City employees are issued photo identification badges to access secured City facilities and rooms. Badges are provisioned upon receipt of a signed access request form from the new employee’s agency. To test the badge-provisioning process, we compared the list of all former City employees since 2000 against the list of active badge holders. Our testing identified 972 active badges for employees who are no longer on the City’s centralized payroll system. Some of these active badges could be legitimately active if a former employee was rehired but is paid outside of the City’s centralized payroll system; however, since there is no list of these contractors, volunteers, or interns, we were not able to make that determination. City and County of Denver Page 8 We performed additional testing on 100 of the potentially unauthorized badges based on the sensitivity of the areas to Auditors found which the badges allowed access. Testing showed that all 100 of 100 active the badges were for former employees who were no longer badges for authorized to have access. These active badges allowed access to areas including the City Attorney’s Office, the District former Attorney’s Office, City data centers, 911 technologies, child employees with welfare offices, the Department of Human Services human access to high resources file room, and the Department of Human Services risk areas. records room. We found that agency representatives do not follow a consistent process to revoke badge access so we were unable to identify a single root cause for why the badges were not disabled following an employee’s employment with the City. After identifying active badges for employees who were no longer authorized to have access, we attempted to identify the date of the last activity for each of the unauthorized badges. This testing showed that no unauthorized badges accessed sensitive areas at the Department of Human Services after the individuals assigned to those badges separated from the City. For sensitive areas within 911 technologies, the Webb Building, City data centers, and the City and District Attorney’s Offices, we were able to determine that no unauthorized individuals accessed those facilities within the past six months. 9 Facilities Management should determine whether the remaining badges are for active employees who require access or whether the badges need to be disabled. Facilities Management should also perform additional testing to ensure that no breaches occurred related to former employees accessing high-risk areas. Badge Administrators Not Consistently Informed of Need for Badge Deactivation We found that badge administrators do not know when an employee’s badge should be disabled unless the employee’s manager or agency representative notifies the administrator and requests access to be revoked. In the event that a badging administrator is not notified to revoke access for a former employee, access for that individual may remain active following employment. We also found that some badging administrators cannot verify whether an individual’s badge access is authorized because they do not have access to the Office of Human Resources system of record showing current City employees. For example, after we identified active badges that appear to belong to former employees, Facilities Management personnel could not confirm whether any of these individuals still require access to City facilities. Therefore badge administration personnel rely solely on City agencies to notify them when badge access should be removed. In addition, there is no documented process that City agency representatives follow to consistently disable badge access. In the absence of a consistent process, 9 Auditors were only able to inspect badge activity for the past six months due to the size of the reports, and Facilities Management had difficulty configuring them to report activity for high-risk areas only. Facilities Management should configure and run additional reports to determine whether any former employees accessed sensitive areas after they were employed by the City over the past two years. Page 9 Office of Office of the the Auditor Auditor agency representatives may notify badging administrators to disable badges in a number of ways. For example, some requests to disable access are phoned in, others are emailed, and still more are sent via electronic forms to Technology Services. After performing additional audit procedures and contacting supervisors of former employees, we found that at least 100 of the badges with access to high-risk areas should be disabled. There Are No Controls to Prevent Former Employees with Deactivated Badges from Entering Certain City Facilities We found that it is possible for individuals who separate from the City to access some secure facilities, circumventing the metal detectors. This can occur when employees do not turn in their badges following employment. Additional information related to this issue has been provided confidentially to the appropriate City agency. Logical Access to City Systems Is Not Appropriately Restricted Logical access controls prevent unauthorized users from accessing the City’s computer information systems. The City has a variety of identification and authorization tools in place to ensure that logical access is only granted to City employees and only to the extent that they need access to perform their job duties. However, in the course of our audit work, we found a number of instances where individuals who no longer work for the City still had active credentials, allowing them to access the City’s network. To determine whether any former employees retained active network credentials, we first obtained a list of all users in the City’s directory services. We also obtained a list of the folders and groups the users had access to as employees and their last log-on dates. Then we generated a list of current City employees by running queries against the Office of Human Resources system of record, as well as by generating a list of all former employees since 2000. We used data analytics to compare the current and former employee lists against the active user accounts within each of the City’s directory services. On three of the five City networks tested, we found that some individuals had retained network access following employment. City Government Directory Services Issues We identified three issues related to inappropriate logical access. First, some employees have retained network access following employment with the City; second, some contractor accounts have not been set up or disabled in accordance with established policy; and third, some user accounts are not being set up with appropriate password requirements. Some accounts have not been deactivated following employee separation – We identified fourteen network accounts for former employees who should no longer have network access to City systems. Six of the fourteen individuals appeared to have accessed their accounts after separating from the City. Accounts should be disabled timely when an individual is no longer employed. In the event that Technology Services needs to access the account, the account should be added as an extension to an existing employee’s account rather than using the former employee’s City and County of Denver P a g e 10 account. Rules and regulations such as HIPAA, PCI, and CJIS mandate that certain data is protected and access is restricted to authorized individuals only. One of the accounts retained remote access to crimerelated information following employment. The account that retained remote access to crime-related information is regulated by the CJIS security policy. 10 Other directory services details have been provided confidentially to the appropriate agency separate from this report. A former City employee retained remote access to a crime database. Some contractor accounts are not being provisioned or de-provisioned in accordance with policy – Many City contractors are provided with logical access to City networks to perform their job duties. We found that contractor accounts are not always end dated within the directory services and therefore may remain active after a contractor is no longer working for the City. For example, we identified several former Department of Human Services (DHS) contractors who retained access to data after they were no longer authorized. One contractor also retained remote access to DHS files and folders after the individual was no longer working on behalf of DHS. Upon further inquiry with DHS personnel, a determination could not be made as to whether former employees retained access to client files. In total, we identified twenty-four manually provisioned accounts that were not end dated across agencies managed by Technology Services. As a result, these twenty-four individuals had active network accounts after they were no longer employed by the City. Contractor end-dating is also required by the City’s LAN and Email Policy. End dating contractor accounts helps mitigate risks to data. Some account passwords are not set to expire in accordance with policy – We identified forty-one user accounts set with passwords that never expire. Passwords are required to be changed every ninety days in accordance with the City’s LAN and Email Policy. Passwords that have been in place for long periods of time increase the risk of unauthorized access to systems. Some of the accounts we tested during the audit have passwords that have not been changed since 2002. Increased Governance Is Needed to Mitigate Physical and Logical Identity Management Risks To remediate identified issues and increase both physical and logical access security, the City should perform periodic entitlement reviews, develop and maintain a comprehensive and accurate listing of third-party workers, establish procedures for requesting and removing access to City facilities and systems, and implement security awareness training. Procedures for disabling physical and logical access should include a process for verifying 10 CJIS security violations must be reported to the regional CJIS Systems Officer, the national CJIS Director, as well as the Federal Bureau of Investigation (FBI). Upon notification, the FBI has the right to investigate any report of unauthorized use and suspend or terminate access and services. We were able to determine that the account in question did not access CJIS data following separation from the City. As a result, there was no CJIS violation; however, the City was out of compliance with the CJIS security policy and the individual could have remotely accessed crime related data following separation from the City. P a g e 11 Office of Office of the the Auditor Auditor that access has been removed and specifically identify the parties that are responsible for removing access upon notification. Periodic entitlement reviews – The City does not perform periodic access entitlement reviews to determine whether physical and logical user access remains authorized over time. These types of reviews can help identify accounts that are no longer authorized when the processes to remove access are not performed. DIA performs limited entitlement reviews related to financial systems; however, these reviews do not include areas related to privileged accounts, such as database and domain administrators. Entitlement reviews also help ensure that access is commensurate with job duties. For example, high-risk file shares containing protected or sensitive data should be identified and individuals with access to the high-risk file shares should be periodically reviewed to ensure that access is appropriate. Without a periodic review process in place, it is possible that accounts that are no longer authorized to have access, such as those identified within this audit, go unnoticed and uncorrected. Develop a list of contractors, volunteers, and interns who are not on the City’s payroll – In addition to regular employees, the City occasionally uses contractors, volunteers, and interns to perform work and services on behalf of the City. These third party workers may be granted access to City systems and buildings to perform their work. However, we found that Technology Services and Facilities Management organizations do not have a record of the current employment status for City workers who are paid outside of the centralized payroll system. A centralized list that includes all City employees and third-party individuals would assist in determining the full population of valid City workers and is essential for performing periodic account reviews. PeopleSoft, the Office of Human Resources system of record, is the only source for tracking active employees, which in turn serves as the control for authorization of access to City networks through an automated tool. When a third-party worker is not in PeopleSoft, it is difficult to determine whether a particular individual is authorized to have access. Currently third-party workers not paid through PeopleSoft are manually provisioned and de-provisioned, which has resulted in some of the issues identified within this audit. For example, we identified instances where manual processes failed to remove network access for former third-party workers. We used data analytics to identify manually provisioned accounts for former employees and noted that sixteen of the twenty accounts (80 percent) tested were not disabled following employment. Establish a consistent process for requesting and removing access to City facilities and systems – As discussed throughout this report, the City does not have a consistent governance process to grant or remove an individual’s access to City facilities and systems. Access changes may be requested through help desk tickets, electronic forms, or hard copy forms, and there is no training provided regarding which forms to use under certain circumstances. In the absence of an established process, access change requests are inconsistently sent to Technology Services and Facilities Management, which has resulted in access remaining active for some former employees, such as those identified within this audit report. City and County of Denver P a g e 12 Additionally, we identified that electronic forms are filled out by hiring managers or agency representatives to disable physical badge access to the Webb Building, yet these forms are never sent to Facilities Management to facilitate removal of access. Instead, these forms are sent to Technology Services, but no action is taken to disable the badges. Our audit found that even though Facilities Management has developed building-specific access control criteria available through the City’s intranet site, there are no procedures that address the creation and termination process for administration of employee badges. In the absence of such a guide to help ensure a consistent process is used, auditors sampled 100 badges for further testing and found that access was assigned and removed inconsistently. 11 Technology Services and Facilities Management should develop consistent processes for granting and removing access to facilities and systems and then ensure that employees are trained on the processes. Such procedures should include a process for verifying that access has been removed. Security awareness training – Security awareness training is not provided consistently throughout the City. While all More than half of the Department of Aviation employees receive security City’s employees are awareness training, only about 40 percent of the remaining City employees receive the training. This type of training not trained on informs employees of the types of threats with which cities current information and other entities are being targeted. For example, some security threats. City employees were recently targeted through an email scam attempting to collect their user IDs and passwords. This type of threat could severely compromise the security of the City’s data network. Currently, 60 percent of employees are not trained on how to identify these types of threats and effectively protect their personal access credentials. Therefore, we recommend that security awareness training should be developed jointly by Technology Services and Facilities Management to promote employee awareness of known threats to their access credentials. RECOMMENDATIONS 11 1.1. The Director of Facilities Management should disable active badges for former employees identified within this audit and work with other badging administrators to ensure that any other potentially active accounts for former employees are disabled. 1.2. The Director of Facilities Management should install badge readers on the secured facility identified within the confidential findings provided to Facilities Management. 1.3. The Chief Information Security Officer should update the network and email account management policy to reflect the current process for network credential creation and termination. The policy should also be adopted by Technology Services so that See the Methodology section of this report for all sampling methodology used during the audit. P a g e 13 Office of Office of the the Auditor Auditor individuals responsible for access control understand the logical access requirements and comply with them. A separate process should be developed and implemented for interns, contractors, and volunteers to ensure that network accounts are provisioned and de-provisioned consistently. 1.4. The IT Governance Manager should disable active network accounts for former employees and contractors within this audit and ensure that any other active accounts for former employees are disabled. 1.5. The IT Governance Manager should ensure that password and group policy settings align with the City’s LAN and Email Policy. 1.6. The IT Governance Manager should ensure that access to data protected by rules and regulations such as HIPAA and CJIS is periodically monitored and controlled appropriately over time. 1.7. The Chief Information Security Officer and the Director of Facilities Management should work together to develop and implement security awareness training for all City employees, contractors, volunteers, and interns who receive physical or logical access credentials. The format and extent of the security awareness training is at the discretion of Technology Services and Facilities Management; however, these entities should take the following high-risk areas into consideration when developing the program: 1.8. • The nature of sensitive material and physical assets employees may come in contact with, such as privacy concerns and government classified information • Employee and contractor responsibilities in handling sensitive information, including review of employee nondisclosure agreements • Requirements for proper handling of sensitive material in physical form, including marking, transmission, storage, and destruction • Proper methods for protecting sensitive information on computer systems, including password policy and use of two-factor authentication • Proper methods for protecting physical access credentials, such as not sharing badges, reporting lost or stolen badges immediately, etc. • Computer security concerns, including malware, phishing, social engineering, etc. • Workplace security, including building access, wearing of security badges, reporting of incidents, forbidden articles, etc. • Consequences of failure to properly protect information, including potential loss of employment, economic consequences to the City, damage to individuals whose private records are divulged, and possible civil and criminal penalties The Chief Information Security Officer and the Director of Facilities Management should implement periodic entitlement reviews and help facilitate agency access reviews, taking into consideration the following: • All accounts should be reviewed on a pre-defined basis (monthly, quarterly, or annually) City and County of Denver P a g e 14 1.9. • High-risk access permissions should be identified, and periodic account reviews should assess the appropriateness of high-risk access over time • Account reviews should be assigned to a designated system owner with a general understanding of the appropriateness of access • Account reviews should incorporate segregation of duties • Reviews should be based on system-generated access reports The Executive Director of Human Resources should work closely with the Chief Information Officer and other agencies to implement a centralized method for tracking contractor, volunteer, and intern (contingent) workers to allow these types of workers to be tracked and thereby have their network access provisioned and de-provisioned through an automated tool. 1.10. The Executive Director of Human Resources should work closely with the IT Governance Manager and independent IT departments across the City to train hiring managers and supervisors on provisioning and de-provisioning processes, taking into consideration the following when developing the training: • A role-based approach for access provisioning • Avoid mirroring accounts based on job functionality • Develop a consistent agreed-upon method for physical and logical access provisioning and de-provisioning (e.g., required forms, approvals) • Develop a consistent method for handling contractors and other manually provisioned accounts (e.g., account end dating) 1.11. The Director of Facilities Management should create procedures that define daily badge management processes. Facilities Management should then train all badging administrators on the procedures to ensure that access is consistently provisioned and de-provisioned. 1.12. The Director of Facilities Management should consider centralizing the badge administration process and minimize the number of administrators assigning badge access. P a g e 15 Office of Office of the the Auditor Auditor AGENCY RESPONSE Technology Services 201 West Colfax Avenue Department 301 Denver, CO 80202 March 7, 2014 Mr. Kip R. Memmott, MA, CGAP, CRMA Director of Audit Services Office of the Auditor City and County of Denver 201 West Colfax Avenue, Dept. 705 Denver, Colorado 80202 Dear Mr. Memmott: The Office of the Auditor has conducted a performance audit of Citywide Identity Management. This memorandum provides a written response for each reportable condition noted in the Auditor’s Report final draft that was sent to us on February 13, 2014. This response complies with Section 20-276 (b) of the Denver Revised Municipal Code (D.R.M.C.). AUDIT FINDING 1 The City Needs to Improve Governance around Identity Management to Ensure that Access to Facilities and Systems Is Appropriately Restricted RECOMMENDATION 1.1 The Director of Facilities Management should disable active badges for former employees identified within this audit and work with other badging administrators to ensure that any other potentially active accounts for former employees are disabled. Agree or Disagree with Recommendation Target date to complete implementation activities (Generally expected within 60 to 90 days) N/A City and County of Denver P a g e 16 Name and phone number of specific point of contact for implementation Narrative for Recommendation 1.1 N/A – Recommendation not addressed to Technology Services. RECOMMENDATION 1.2 The Director of Facilities Management should install badge readers on the secured facility identified within the confidential findings provided to Facilities Management. Target date to complete Name and phone number Agree or Disagree with implementation activities of specific point of contact Recommendation (Generally expected for implementation within 60 to 90 days) N/A Narrative for Recommendation 1.2 N/A – Recommendation not addressed to Technology Services. RECOMMENDATION 1.3 The Chief Information Security Officer should update the network and email account management policy to reflect the current process for network credential creation and termination. The policy should also be adopted by Technology Services so that individuals responsible for access control understand the logical access requirements and comply with them. A separate process should be developed and implemented for interns, contractors, and volunteers to ensure that network accounts are provisioned and deprovisioned consistently. Target date to complete Name and phone number Agree or Disagree with implementation activities of specific point of contact Recommendation (Generally expected for implementation within 60 to 90 days) Agree Technology Services Alena Gouveia September 30, 2014 720-913-4964 Narrative for Recommendation 1.3 Technology Services will align policies with processes for network credential creation and termination. Personnel will be trained accordingly. We will develop a new process for the provisioning and de-provisioning of interns, contractors, and volunteers. RECOMMENDATION 1.4 The IT Governance Manager should disable active network accounts for former employees and contractors identified within this audit and ensure that any other active accounts for former employees are disabled. P a g e 17 Office of Office of the the Auditor Auditor Agree or Disagree with Recommendation Agree Target date to complete implementation activities (Generally expected within 60 to 90 days) Technology Services Completed Denver County Courts Completed Name and phone number of specific point of contact for implementation Alena Gouveia 720-913-4964 Kris Griffin 720-865-7703 Narrative for Recommendation 1.4 Technology Services immediately disabled all network accounts identified in this audit and has since conducted a review of network accounts belonging to City employees (individuals paid via the City’s payroll system). The control verification will also be conducted on a monthly basis going forward. The Court Information Department immediately disabled all network accounts identified in this audit and has implemented improved procedures to address the de-provisioning of user accounts. RECOMMENDATION 1.5 The IT Governance Manager should ensure that password and group policy settings align with the City’s LAN and Email Policy. Agree or Disagree with Recommendation Agree Target date to complete implementation activities (Generally expected within 60 to 90 days) Technology Services June 30, 2014 Name and phone number of specific point of contact for implementation Alena Gouveia 720-913-4964 Narrative for Recommendation 1.5 Technology Services will review our policies for password and security settings for LAN and email accounts and align our practices accordingly. City and County of Denver P a g e 18 RECOMMENDATION 1.6 The IT Governance Manager should ensure that access to data protected by rules and regulations such as HIPAA and CJIS is periodically monitored and controlled appropriately over time. Agree or Disagree with Recommendation Agree Target date to complete implementation activities (Generally expected within 60 to 90 days) Technology Services June 30, 2014 Name and phone number of specific point of contact for implementation Alena Gouveia 720-913-4964 Narrative for Recommendation 1.6 Technology Services will develop a pilot data classification program with an initial agency to segregate and protect data kept in file shares according to the appropriate rules and regulations, such as HIPAA, CJIS, etc. Upon demonstration that the pilot is viable, we will promote the model to additional agencies. We will also develop a model for conducting periodic entitlement reviews. RECOMMENDATION 1.7 The Chief Information Security Officer and the Director of Facilities Management should work together to develop and implement security awareness training for all City employees, contractors, volunteers, and interns who receive physical or logical access credentials. The format and extent of the security awareness training is at the discretion of Technology Services and Facilities Management; however, these entities should take the following high-risk areas into consideration when developing the program: • The nature of sensitive material and physical assets employees may come in contact with, such as privacy concerns and government classified information • Employee and contractor responsibilities in handling sensitive information, including review of employee nondisclosure agreements • Requirements for proper handling of sensitive material in physical form, including marking, transmission, storage, and destruction • Proper methods for protecting sensitive information on computer systems, including password policy and use of two-factor authentication • Proper methods for protecting physical access credentials, such as not sharing badges, reporting lost or stolen badges immediately, etc. • Computer security concerns, including malware, phishing, social engineering, etc. • Workplace security, including building access, wearing of security badges, reporting of incidents, forbidden articles, etc. • Consequences of failure to properly protect information, including potential loss of employment, economic consequences to the City, damage to individuals whose private records are divulged, and possible civil and criminal penalties. Agree or Disagree with Recommendation Target date to complete implementation activities (Generally expected P a g e 19 Name and phone number of specific point of contact for implementation Office of Office of the the Auditor Auditor Agree within 60 to 90 days) Technology Services December 31, 2014 Alena Gouveia 720-913-4964 Narrative for Recommendation 1.7 Technology Services will collaborate with Facilities Management to develop and implement a security awareness training program for all City employees, contractors, volunteers, and interns who receive physical or logical access credentials. RECOMMENDATION 1.8 The Chief Information Security Officer and the Director of Facilities Management should implement periodic entitlement reviews and help facilitate agency access reviews, taking into consideration the following: • All accounts should be reviewed on a pre-defined basis (monthly, quarterly, or annually) • High-risk access permissions should be identified, and periodic account reviews should assess the appropriateness of high-risk access over time • Account reviews should be assigned to a designated system owner with a general understanding of the appropriateness of access • Account reviews should incorporate segregation of duties • Reviews should be based on system-generated access reports Agree or Disagree with Recommendation Agree Target date to complete implementation activities (Generally expected within 60 to 90 days) Technology Services September 30, 2014 Denver County Courts Completed Name and phone number of specific point of contact for implementation Alena Gouveia 720-913-4964 Kris Griffin 720-865-7703 Narrative for Recommendation 1.8 Technology Services and Facilities Management will develop entitlement review procedures for logical and physical badge access. The Denver County Court IT department has implemented quarterly entitlement audits to determine if an account should be removed or disabled and has implemented procedures for the recovery of badges. City and County of Denver P a g e 20 RECOMMENDATION 1.9 The Executive Director of Human Resources should work closely with the Chief Information Officer and other agencies to implement a centralized method for tracking contractor, volunteer, and intern (contingent) workers to allow these types of workers to be tracked and thereby have their network access provisioned and de-provisioned through an automated tool. Target date to complete Name and phone number implementation activities Agree or Disagree with of specific point of contact Recommendation (Generally expected for implementation within 60 to 90 days) Agree Technology Services Alena Gouveia 720-913-4964 Office of Human Resources Christopher Lujan March 31, 2015 720-913-5672 Narrative for Recommendation 1.9 Technology Services will work with the Office of Human Resources and other agencies as necessary to develop an automated method for tracking, provisioning and deprovisioning contractor, volunteer, and intern (contingent) workers. . RECOMMENDATION 1.10 The Executive Director of Human Resources should work closely with the IT Governance Manager and independent IT departments across the City to train hiring managers and supervisors on provisioning and de-provisioning processes, consider the following when developing the training: • • • • A role-based approach for access provisioning Avoid mirroring accounts based on job functionality Develop a consistent agreed-upon method for physical and logical access provisioning and de-provisioning (e.g., required forms, approvals) Develop a consistent method for handling contractors and other manually provisioned accounts (e.g., account end dating). Agree or Disagree with Recommendation Agree Target date to complete implementation activities (Generally expected within 60 to 90 days) Technology Services Office of Human Resources March 31, 2015 P a g e 21 Name and phone number of specific point of contact for implementation Alena Gouveia 720-913-4964 Christopher Lujan 720-913-5672 Office of Office of the the Auditor Auditor Narrative for Recommendation 1.10 Technology Services will work with the Office of Human Resources to incorporate provisioning and de-provisioning processes training in the required supervisor courses. RECOMMENDATION 1.11 The Director of Facilities Management should create procedures that define daily badge management processes. Facilities Management should then train all badging administrators on the procedures to ensure that access is consistently provisioned and deprovisioned. Agree or Disagree with Recommendation Target date to complete implementation activities (Generally expected within 60 to 90 days) Name and phone number of specific point of contact for implementation N/A Narrative for Recommendation 1.11 N/A – Recommendation not addressed to Technology Services. RECOMMENDATION 1.12 The Director of Facilities Management should consider centralizing the badge administration process and minimize the number of administrators assigning badge access. Agree or Disagree with Recommendation Target date to complete implementation activities (Generally expected within 60 to 90 days) Name and phone number of specific point of contact for implementation N/A Narrative for Recommendation 1.12 N/A – Recommendation not addressed to Technology Services. City and County of Denver P a g e 22 Please contact Alena Gouveia at 720-913-4967 with any questions. Sincerely, Frank Daidone Chief Information Officer cc: Audrey Donovan, City Auditor’s Office Robert M. Pierce, City Auditor’s Office Nita Henry, Office of Human Resources James Williamson, Facilities Management Chris Larivee, Denver International Airport Kris Griffin, Denver County Courts Peter Duffy, Denver Human Services Christopher Lujan, Office of Human Resources Stephen E. Coury, Technology Services Alena Gouveia, Technology Services Jacqueline Boline, City Auditor’s Office Shannon Kuhn, City Auditor’s Office Nicholas Jimroglou, City Auditor’s Office P a g e 23 Office of Office of the the Auditor Auditor