National Security Agency Managers Internal Control MIC Program Vulnerability Assessments - PowerPoint PPT Presentation

Loading...

PPT – National Security Agency Managers Internal Control MIC Program Vulnerability Assessments PowerPoint presentation | free to view - id: 1ca6af-ZDc1Z



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

National Security Agency Managers Internal Control MIC Program Vulnerability Assessments

Description:

Vulnerability assessments (VA) for each assessable unit of the organization. 6. DIRNSA ... Assessable Unit (AU) Mission. Risk/Vulnerability. Understand your ... – PowerPoint PPT presentation

Number of Views:84
Avg rating:3.0/5.0
Slides: 28
Provided by: BACK8
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: National Security Agency Managers Internal Control MIC Program Vulnerability Assessments


1
National Security Agency Managers Internal
Control (MIC) ProgramVulnerability Assessments
UNCLASSIFIED/FOR OFFICIAL USE ONLY
DoD FY06 MIC Program Conference Bob Crouse, CPA
2
UNCLASSIFIED/FOR OFFICIAL USE ONLY
NSAs MIC Program
  • Brief History
  • Essentially a paper process
  • October 2002 New Comptroller hired
  • January 2003 Organization established to assume
    administration of MIC Program
  • December 2003 Hired contractor to assist in
    enhancing the MIC Program

3
UNCLASSIFIED/FOR OFFICIAL USE ONLY
NSAs MIC Program
  • FY03 Goal Incremental Improvement
  • Heighten awareness through IC training
  • Emphasize honest vulnerability (self) assessments
  • Ensure compliance w/DoD reporting guidelines

4
NSAs MIC Program
UNCLASSIFIED/FOR OFFICIAL USE ONLY
  • FY04-05 Focus Improve the Assessment Process
  • Emphasize accountability
  • Incorporate GAO control standards
  • Incorporate NSA OIG Challenges
  • Incorporate DoD Systemic Weaknesses
  • Require explanations and specific examples
  • Address validation (tests) of controls
  • Submit VAs to DF43 at Alpha2 level
  • Improve support for DIRNSAs SoA

5
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Key Deliverables
  • Each Directorate and Field Site (approx. 60
    reporting entities) required to submit
  • A Statement of Assurance (SoA) including
  • Cover letter
  • Tab A
  • Tab B (if applicable)
  • Vulnerability assessments (VA) for each
    assessable unit of the organization

6
UNCLASSIFIED/FOR OFFICIAL USE ONLY
The VA process flow
SECDEF
DIRNSA
DF43
ORG
ORG
ORG
AU
AU
AU
AU
AU
AU
7
MIC Program Timeline
UNCLASSIFIED/FOR OFFICIAL USE ONLY
  • January April Revise IC Program and develop
    training
  • May June Provide NCS training (RESM-2455) to
    MC Coordinators, Evaluators, Approving Officials,
    etc.
  • August 1 Orgs submit SoAs and VAs to DF43
  • August DF43 review SoAs and VAs, provide
    assistance to orgs, prepare DIRNSAs SoA
  • September 1 Submit DIRNSAs SoA to SECDEF

8
UNCLASSIFIED/FOR OFFICIAL USE ONLY
The Vulnerability Assessment (VA)
is not an extensive or in-depth analysis. is a
limited review mechanism for determining your
organizations susceptibility to fraud, waste or
abuse of resources and the potential for not
achieving the objectives of management control.
9
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Basis for managements assertion
The vulnerability assessment(s) should provide
the basis for managements assertion (SoA)
regarding the existence and effectiveness of
controls within the organization.
10
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Vulnerability Assessment Form
Page 1
11
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Before getting started
  • Define terms
  • Assessable Unit (AU)
  • Mission
  • Risk/Vulnerability
  • Understand your responsibility as
  • Evaluator
  • Approving Official

12
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Before getting started
  • Understand key issues
  • NSA Management Challenges
  • NSA OIG Challenges
  • DoD Systemic Weaknesses

13
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Defining the Assessable Unit
An assessable unit should be a subdivision of an
organization that ensures a reasonable level of
span of IC to allow for adequate control
analysis. Management defines the appropriate
number/level of Assessable Units (AU) and
completes a Vulnerability Assessment (VA) for
each AU.
14
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Defining your mission
  • What do you do?
  • Efforts should tie into your organizations
  • Strategic Plan
  • Goals and Objectives
  • Budget

15
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Assessing your risks/vulnerabilities
Risk is the probability (likelihood) that an
event or action may adversely affect (impact) the
organization.
16
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Risk considerations
Management should evaluate risk in terms of
1. Consequence 2. Likelihood of
occurrence 3. Cause 4. Cost/benefit of lowering
risk
Guide for Evaluating Risk
High
II Area of minimal concern
IV Area of most concern
Likelihood
I Area of least concern
III Area of moderate concern
Low
Low
High
Consequence
17
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Your role in the VA process
The Evaluator and Approving Official should have
sufficient knowledge of the organization and
internal controls to identify the key processes,
risks and vulnerabilities of their
organization. Note VA should only be signed by
NSA Civilian Employee or Military
Personnel. When identifying vulnerabilities,
also consider
18
UNCLASSIFIED/FOR OFFICIAL USE ONLY
NSA Management OIG Challenges
  • Information Sharing (OIG)
  • Developing a Need to Share Culture (MC)
  • Denial Deception (OIG)
  • Analysis Driven, Service Based Ops (MC)
  • Integrating Computer Network Ops (MC)
  • Mission Assurance (OIG)
  • SID/IAD Relationship (MC)
  • Exploitation of Digital Communications (OIG)
  • System Engineering (OIG)
  • Information Assurance for DoD Systems (OIG)

19
UNCLASSIFIED/FOR OFFICIAL USE ONLY
NSA Management OIG Challenges
  • Polygraph Backlog (OIG)
  • Managing the Revolving Door Syndrome (MC)
  • Recruitment Retention of Linguists (OIG)
  • Improve the Cache of Leadership at NSA/CSS (MC)
  • Building the Bench (MC)
  • Field Governance (OIG)
  • Certification and Accreditation of Networks and
    Systems (OIG)
  • Security for National Security Systems Critical
    Infrastructures (OIG)
  • Acquisition Management (OIG)
  • Financial Management (OIG)

20
DoD Systemic Weaknesses
UNCLASSIFIED/FOR OFFICIAL USE ONLY
  • DoD Financial Management Systems and Processes
  • Management of Information Technology and
    Assurance
  • Environmental Liabilities
  • Personnel Security Investigations Program
  • Real Property Infrastructure
  • Government Card Program Management
  • Valuation of Plant, Property and Equipment on
    Financial Reports
  • Valuation of Inventory of Financial Reports
  • Improper use of Non-DoD Contracting Vehicles

21
UNCLASSIFIED/FOR OFFICIAL USE ONLY
What controls are in place?
Given your organizations risks and
vulnerabilities, what do you do to prevent or
detect such threats and how do you minimize their
impact if/when they occur? Consider GAO control
activities (policies procedures, approval,
authorization, reconciliation, documentation,
security, etc.)
22
UNCLASSIFIED/FOR OFFICIAL USE ONLY
How/When were controls last tested?
Often times, management assumes controls are in
place, but for various reasons (e.g.,
reorganization, employee turnover) they are
not. How is tests of controls (monitoring)
performed and documented and when was it done
most recently?
23
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Are controls adequate?
After identifying your high risk
vulnerabilities and the extent to which internal
controls are operating, does your organization
need additional controls? Consider cost v.
benefit tolerable risk.
24
UNCLASSIFIED/FOR OFFICIAL USE ONLY
Vulnerability Assessment Form
Page 2
25
UNCLASSIFIED/FOR OFFICIAL USE ONLY
GAO Standards for Internal Control
Monitoring
Control Activities
Information Communications
Information Communications
Risk Assessment
Control Environment
26
Be conscious of
UNCLASSIFIED/FOR OFFICIAL USE ONLY
  • Linkage within the VA
  • Risks identified
  • Controls identified for mitigating risks
  • Tests of controls
  • Linkage between information included in the VA
    and that communicated in the SoA.

27
Final thoughts
UNCLASSIFIED/FOR OFFICIAL USE ONLY
  • Keep it simple
  • Terminology can be a barrier
  • Translate into operations language
  • Capitalize on whats already being done
  • Major marketing effort
  • Achieving buy-in is not easy
  • Organization culture
  • Mission v. administrative burden
  • This is a Finance issue
  • Must hit home
  • Training, training, training!
About PowerShow.com