Project Closeout Report Project Name NMDWS IT Security Initiatives 06 Date 7/23/09 Executive Sponsor NMDWS - CIO Lead Agency NMDWS Project Manager Art Montoya Agency Code 631 PROJECT DESCRIPTION (PROVIDE A BRIEF DESCRIPTION AND PURPOSE FOR THIS PROJECT) NMDWS took initiative to request and obtain funding via Supplemental Budget Request from the US Dept. of Labor for several Information System Security Initiatives. The security projects undertaken were to address many areas of risk discovered in self assessments within NMDWS and, to take measures to mitigate key security concerns. (Total approved $315,221.00, total utilized $220,268.96). Listed below are five SBR’s received and the initiatives taken by NMDWS in 2006. IS Security Assessment: The SBR funding provided to NMDWS was used for two Information Systems Security related projects. 1. Conduct an Information Systems Security Assessment – By Federal (USDOL) Requirements, NMDWS is required to have an independent IT Audit performed to identify risks and vulnerabilities within the Unemployment Insurance (UI) application. ($30,000 – Service provided by the NM Tech CANNES Group) 2. Development of IT Unemployment Claims Auditing Application – Application was developed to provide auditing capabilities for the UI Internal audit staff to monitor UI business transactions as mandated by USDOL requirements. ($70,000 – Application developed/implemented by TekSystems Inc.) Security Training: Security Training was greatly deficient within New Mexico State Gov’t. In most instances, security staff were moved over from the IS networking departments whom lacked the specialized training to implement a security program. NMDWS was no exception to this lack of training. Training was on-going from October 2006 through expiration of SBR funding Sept. 30, 2008. Training included technical security methodology, Security Auditing methodology and others. (Approved for $89,140.00 utilized $65,642.00 through a variety of training sources.) Intrusion Detection: The SBR was utilized to purchase a Tipping Point Intrusion Detection/Prevention Appliance. The purpose of the Tipping Point product is to reduce/eliminate suspicion data transfers (peer to peer protocols, virus signatures, on-line game protocols, etc.) ( Approved for $45,731.00 utilized $42,741.00) Encryption/Network Assessment Software: Purchase and installation of NMDWS network assessment application (LanGuard). Software used for scanning of IS Network hardware resources and risk assessment. WebInspect software was replaced with Mobile Armor Encryption software and installation. (Approved for $32,250.00 utilized $11,885.96) Voice over IP Pilot Project: Project was not implemented. Project was designed to establish a pilot/proof of concept of a Voice over IP/ toll by-pass service to Unemployment Insurance claimants in remote locations. This project was planned to provide two cost saving services. 1. To eliminate long distance charges to UI Claimants in remote locations and, secondly to reduce cost of phone services from remote locations. (Approved for $48,100) Schedule and Budget Planned Start Date 9/7/2006 Actual Start Date Oct 2, 2006 Planned End Date 6/30/2008 Actual End Date 4/30/2009 Planned Cost: (Budget) $315,221.00 Actual Cost: (Total) $220,268.96 Professional Services $100,000.00 Professional Services $100,000.00 Hardware $45,731.00 Hardware $42,741.00 This is a controlled document; this version supersedes all other versions. Revision: 8/20/08 Page 1 of 6 Project Closeout Report Software $32,250.00 Software $11,885.96 Network $48,100.00 Network $0.00 Other $89,140.00 Other Appropriation History (Include all Funding sources, $65,642.00 e.g. Federal, State, County, Municipal laws or grants) Amount Funding Source(s) Fiscal Year 2006 $315,221.00 US Dept. of Labor Supplemental Budget Request. Scope Verification Requirements Review Yes Were the project objectives (expected outcomes) accomplished? Were all Deliverables submitted and accepted? Did the IV&V vendor verify that all deliverables met the requirements? Have all contracts been closed? Have all final payments been made (i.e., invoices paid) Has adequate knowledge transfer been completed? No Explanation/Notes X With the Exception of the Voice Over IP Pilot project. This project could not be implemented due to various problems with the UI application, the decision was made to not implement the VoIP because of the potential impact it may have created on production and secondly, VoIP project could not be implemented during peak seasons within NMDWS No IV&V required X X X X X All security Software (Languard, Mobile Armor) purchased were installed and utilized in-house. Intrusion Detection, Auditing Application is located in-house and maintained by NMDWS staff. Auditing application was developed off-site, moved to the NMDWS development and test environments and knowledge transfer was passed to NDMWS staff where application is now supported. This is a controlled document; this version supersedes all other versions. Revision: 8/20/08 Page 2 of 6 Project Closeout Report TRANSITION TO OPERATIONS: (DESCRIBE AGENCY PLAN TO MIGRATE PROJECT SOLUTION TO PRODUCTION. INCLUDE DOIT IMPACT IF DIFFERENT THAN PREVIOUS REPORT) IS Security Assessment: No migration to production necessary. Risks and Vulnerabilities were recorded and an action plan was developed and implemented to mitigate associated risks. ($30,000 – Service provided by the NM Tech CANNES Group) UI Auditing Application. Application was developed off site and was migrated into a NMDWS development environment. Application was moved into a test environment where testing was performed by NMDWS IT and business staff over a two week period. Application was moved to the production environment after testing. This application had no impact on DoIT. Security Training SBR Approved Sept. 7, 2006. Training was on-going from October 2006 through expiration of SBR funding Sept. 30, 2008. (Approved for $89,140.00 utilized $65,642.00 through a variety of training sources.) Intrusion Detection: The SBR was utilized to purchase a Tipping Point Intrusion Detection/Prevention Appliance. The purpose of the Tipping Point product is to reduce/eliminate suspicion data transfers (peer to peer protocols, virus signatures, on-line game protocols, etc.) ( Approved for $45,731.00 utilized $42,741.00) Network Assessment Applications: Purchase and installation of NMDWS network assessment application. Software used for scanning of IS Network hardware resources and risk assessment. WebInspect software was replaced with Mobile Armor Encryption software and installation. Voice over IP Pilot Project: Project was not implemented. Project was designed to establish a pilot/proof of concept of a Voice over IP/ toll by-pass service to Unemployment Insurance claimants in remote locations. This project was planned to provide two cost saving services. 1. To eliminate long distance charges to UI Claimants in remote locations and, secondly to reduce cost of phone services from remote locations. (Approved for $48,100) Maintenance/Operations Yes No Explanation/Notes Tipping Point: $ 4,768.00 Are there recurring maintenance/operational costs for the product/service? Are there any recommended enhancements or updates? Funding source for maintenance/operational costs? X per Year for Support/updates LanGuard: $ 169.98 per Year For Support/updates/licensing X UI Auditing Application requires enhancements to capture transactions due to change in business within the UI program. NMDWS Base Budget BUSINESS PERFORMANCE MEASURES (COMPLETE FOR ALL PHASES) COMMENTS: Supplemental Budget Requests for IT Security Initiatives. The funding period for the SBR’s was from Sept. 2006 to September 30, 2008. Performance Measurements are summarized on each individual Close out Report. PHASES COMPLETION DATE GOALS/OBJECTIVES AMOUNT RESULTS This is a controlled document; this version supersedes all other versions. Revision: 8/20/08 Page 3 of 6 Project Closeout Report Initiation: $ Planning: $ IS Security Assessment: NMDWS took initiative to request and obtain funding via Supplemental Budget Request from the US Dept. of Labor for several Information System Security Initiatives. Conduct an Information Systems Security Assessment ($30,000 – Service provided by the NM Tech CANNES Group) 2. Development of IT Unemployment Claims Auditing Application ($70,000 developed by TekSystems Inc.) September 2006 Certification of IT Security Initiatives $315,221 Security Training: Security (utilized $65,642.00 through a variety of training sources.) Intrusion Detection: Purchase Tipping Point Intrusion (utilized $42,741.00) Encryption/Network Assessment Software: Purchase and installation of NMDWS assessment application (LanGuard). Mobile Armor Encryption software (utilized $11,885.96) Implementation: Voice over IP Pilot Project: Not Implemented. (Approved for $48,100) This is a controlled document; this version supersedes all other versions. Revision: 8/20/08 Page 4 of 6 Project Closeout Report 07/27/2009 Close out all NMDWS 2006 SBR funding for IT Security Initiatives $0.00 All projects deliverables completed or closed with the exception of the Voice Over IP pilot project Closeout: LESSONS LEARNED Understanding and adhering to reporting requirements at State and Federal levels. Understanding project requirements, allocating resources both internal and external to keep project creep from occurring. It was difficult to allocate dedicated resources to the various projects due to staff maintaining a production environment and all other daily tasks provided to an already stretched staff. Understanding the procurement process and working with the procurement agents in a manner that does not interfere with scheduled time frames for project deliverables. IT System Analysis On this document, or as an attachment, provide a summary response, including changes, to the following IT infrastructure topics relating to this project: Describe or estimate this project’s impact on the Enterprise/DoIT infrastructure. The IS Security Initiatives had no impact on the Enterprise/DoIT infrastructure. o Hardware o Network (Include Diagram) o Software / Applications All software is installed within the NMDWS networked environment, No software or application has any impact on the enterprise network or DoIT infrastructure. o Where is this system hosted? All security initiatives are hosted within NMDWS. If not hosted at DoIT Data Center what is your strategy to host at DoIT Data Center: (When, Why?) NMDWS is working in collaboration with NM on an effort to consolidate security efforts. DoIT Migration Collaboration Summarize your collaboration with DoIT on moving this project from initialization through close (full production). Identify points of contact, dates of discussions, and results Provide Application Architecture Schematic This is a controlled document; this version supersedes all other versions. Revision: 8/20/08 Page 5 of 6 Project Closeout Report Business Continuity Strategy On this document, or as an attachment, provide a summary response, including changes, of your business Continuity Strategy. No changes were necessary for the Business Continuity Strategy within NMDWS. Presently NMDWS has a limited Business Continuity/ Disaster Recovery Plan which addresses the Critical UI application, tape backup and off-site storage. Business Continuity planning for the NMDWS is currently being addressed through the submission of a SBR through USDOL. Emergency and Disaster Management Business Resumption Operational Recovery Planning Security Strategy (Application and Data Security Process, Plan, or Standard) Project Sign Off The signatures below certify that this project has been completed in accordance to the specified budget, schedule, scope, and achieved the intended outcome. STAKEHOLDERS NAME: SIGNATURE DATE Executive Sponsor (or Designee) Lead Agency Head (or Designee) CIO IT Lead Project Manager This is a controlled document; this version supersedes all other versions. Revision: 8/20/08 Page 6 of 6