{"id":445,"date":"2009-01-16T15:24:34","date_gmt":"2009-01-16T23:24:34","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2009\/01\/16\/taxpayer-data-at-irs-remains-vulnerable\/"},"modified":"2009-01-16T15:24:34","modified_gmt":"2009-01-16T23:24:34","slug":"taxpayer-data-at-irs-remains-vulnerable","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/16\/taxpayer-data-at-irs-remains-vulnerable\/","title":{"rendered":"Taxpayer Data at IRS Remains Vulnerable"},"content":{"rendered":"<p>The Government Accountability Office (GOA) realeased a report last week<br \/>\nstating vulnerabilities in the security system used by the IRS to protect<br \/>\ntaxpayer data. The report showed the IRS has number of security issues<br \/>\nin the way that it protect sensitive data.<\/p>\n<p>Some of the major security issues include: the IRS doesn&#8217;t encrypt certain<br \/>\ntypes of sensative data, user IDs and passwords can be easily obtained by<br \/>\nany user on the network, and they don&#8217;t enforce strong password rules for<br \/>\nauthenticating users.<\/p>\n<p>A lack of an agency-wide security program and no annual review of risk<br \/>\nassessment are the root of many of these issues. As a result, the IRS is<br \/>\nespecially vulnerable to attackers with inside information, wich could expose<br \/>\ntaxpayer and financial data.<\/p>\n<p>The GOA cited several specific security problems. Among those were the<br \/>\nfollowing: A contractor-maintained website has exposed usernames and passwords;<br \/>\nany authenticated user on the network has access to shared drives containing<br \/>\nsensative data like taxpayer informaiton and social sercutity numbers;<br \/>\nfinancial information and account data were tranferred from the IRS&#8217;s accounting<br \/>\nsystem without first being encrypted; inadequately logging various security<br \/>\nevents at data centers.<\/p>\n<p>The IRS is currently trying to improve it&#8217;s security system. They have taken<br \/>\nseveral steps to do this thus far, including, better controls for authenticating<br \/>\nusers, patching critical vulnerabilites quickly, and forming a better plan<br \/>\nfor logging critical business processes.<\/p>\n<p>IRS Commissioner Douglas Shulman responded to GOA report, stating that data<br \/>\nsecurity and privacy are of the utmost importance to the IRS, and said that<br \/>\nthey would release a detailed corrective action plan stating how they would<br \/>\nfix the vulnerabilites discovered.<\/p>\n<p>This report by the GOA followed the October release by the general for tax<br \/>\nadministration that also criticised the IRS&#8217;s security controls. That report<br \/>\nwas mostly critical of the security vulnerabilities found in new $1 billion<br \/>\nsystem called CADE the IRS is rolling out to eventually manage all taxpayer<br \/>\naccounts. They were also critical of the $700 million system called AMS that<br \/>\nis designed to provide faster access to the taxpayer information stored in<br \/>\nthe CADE database. The report cited several weaknesses with access control,<br \/>\nsystem access monitoring, and disaster rocovery involving the CADE and AMS<br \/>\nsystems, which pose a direct threat to sensative taxpayer data.<\/p>\n<p>With indentity theft rising each year and more and more security breaches<br \/>\noccurring, keeping sensative data is of the utmost importance. The IRS<br \/>\ndatabases contains sensative information on almost every American citezen. The<br \/>\nIRS&#8217;s lack of security measures to protect the information of taxpayers could<br \/>\nresult in a large security breach that could affect millions of Americans.<br \/>\nWith such a poor security system in place, it is only a matter of time until<br \/>\na security breach occurs unless the IRS acts quickly implement an agency-wide<br \/>\nsecurity plan to keep sensative information secure.<\/p>\n<p>The fact that these kinds of vulnerabilties exist in a government system<br \/>\nhousing a wealth of sensative data on millions of Americans demonstrates the<br \/>\nmuch larger issue today. Too few institutions are concerned with protecting the<br \/>\nsensative data within their databases. Security is still an afterthought,<br \/>\nsecurity patches are issued and holes are fixed, rather developing a secure<br \/>\nsystem from the start. The new CADE and AMS systems the IRS is rolling out<br \/>\nis just another demostration of how systems need to be designed with security<br \/>\nin mind from the start, and that simply is still not happening.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Government Accountability Office (GOA) realeased a report last week stating vulnerabilities in the security system used by the IRS to protect taxpayer data. The report showed the IRS has number of security issues in the way that it protect &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/01\/16\/taxpayer-data-at-irs-remains-vulnerable\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":104,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[151],"class_list":["post-445","post","type-post","status-publish","format-standard","hentry","category-miscellaneous","tag-current-event"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/104"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=445"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/445\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}