Annually conduct an improper payment review in accordance with PIIA and follow the guidance outlined in OMB Circular A-136, section II.4.5 [Payment Integrity Information Act].
-
Number of Reports:13Number of Recommendations:28Potential Cost Saving:$0
FY 2021 Annual Report on the U.S. Equal Employment Opportunity Commission’s Compliance with the Payment Integrity Information Act of 2019
-
-
Report the OIG's finding of non-compliance with the FY 2021 PIIA requirements, as outlined in OMB Memorandum M-21-19, Section VI.D, "Agency Responsibility When a Program is Non-Compliant."
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION FEDERAL INFORMATION SECURITY MODERNIZATION ACT OF 2014 (FISMA)
-
We recommend that EEOC defines, communicates, and implements an organization-
wide SCRM strategy to guide supply chain analyses, provide communication channels
with internal/external partners and stakeholders, and assist in building consensus
regarding the appropriate resources for SCRM.
FY 2022 FEDERAL INFORMATION SECURITY MODERNIZATION ACT INDEPENDENT EVALUATION
-
We recommend that EEOC:
- Determine if listening ports or entire system should be blocked from public access;
- Regularly review network device search engines for new systems belonging to EEOC or those that may be masquerading as EEOC systems;
- Perform a forensic analysis on identified system to ensure no malicious access has taken place;
- For authorized remote sessions, create a control to address remote access being left open after the session has concluded. The controls should at minimum require the session owner to ensure the remote session was closed at the conclusion of the session as well as an overall control run on a set basis that will identify any open remote sessions on endpoints;
- Create an auditability feature that checks internally via an agent when a device with remote access is listening;
- Create an auditability feature that checks for remote connection software being installed.
-
We recommend that EEOC implement strong authentication mechanisms for privileged and non-privileged users in accordance with Federal guidance, to meet the required use of PIV or an Identity Assurance Level (IAL)3/Authenticator Assurance Level (AAL) 3 credential of the agency's networks, including remote access sessions, in accordance with Federal targets. The agency should continue developing their plans for organization-wide use of strong authentication mechanisms for non-privileged users and require multifactor authentication to network access for all user accounts.
-
We recommend that EEOC review and remediate the level 4 severity vulnerabilities identified during internal vulnerability scanning to avoid compromises to agency systems.
- To remediate vulnerabilities and prevent further exploitation, the agency should implement risk mitigation procedures such as: performing system updates, operating systems with administrative rights, downloading patches, uninstalling unprotected applications, etc.
- Where risk acceptance is required for vulnerabilities based on EEOC's network operations and risk assessments, we recommend that EEOC formally document the risk acceptance along with any associated mitigation activities.
-
We recommend that EEOC review and remediate the medium level severity vulnerabilities identified during external penetration testing by:
- Disabling IKE Aggressive Mode if supported;
- Refraining from the use of pre-shared authentication keys;
- If using a pre-shared key cannot be avoided, use strong keys;
- Do not allow VPN connections from an non-approved IP addresses, if possible.
-
We recommend that EEOC review and remediate the level 5 severity vulnerabilities identified during internal vulnerability scanning to avoid compromises to agency systems.
- To remediate vulnerabilities and prevent further exploitation, the agency should implement risk mitigation procedures such as: applying vendor-released security fixes, disabling certain user access rights, upgrading to the latest supported version, and removing vulnerable/obsolete hardware from its network.
- These vulnerabilities should be added and tracked on POAMS.
- Where risk acceptance is required for vulnerabilities based on EEOC's network operations and risk assessments, we recommend that EEOC formally document the risk acceptance along with any associated mitigation activities.
PERFORMANCE AUDIT REPORT U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION FEDERAL INFORMATION SECURITY MODERNIZATION ACT OF 2014 (FISMA)
-
We recommend that EEOC plans and prepares to meet the goals of the TIC initiative, consistent with OMB M-19-26. The agency should define and customize, as appropriate, a set of policies, procedures, and processes to implement TIC 3.0, including updating its network and system boundary policies, in accordance with OMB M-19-26. This includes, as appropriate, incorporation of TIC security capabilities catalog, TIC use cases, and TIC overlays.
-
We recommend that EEOC review and remediate the medium level severity vulnerabilities identified during external penetration testing by: (1) Disabling IKE Aggressive Mode. (2) Refraining from the use of pre-shared authentication keys.(3) Implementing multi-factor authentication for all VPN access.
-
We recommend that EEOC review and remediate the informational vulnerabilities identified during external penetration testing by: (1) Ensuring that passwords meet complexity requirements. (2) Requiring 2-Factor Authentication mechanisms for all externally accessible systems. (3) Recommending that employees not use their work email addresses for personal accounts. (4) Recommending that employees avoid using previously breached passwords.
Evaluation of EEOC’s Management of Private Sector Customer Service
-
EEOC must manage customer expectations by making customer service standards available to the public.
-
. EEOC should develop a customer service plan to include establishing goals and objectives, developing performance metrics that target the goals, and measuring performance against the goals. This plan must include goals and metrics for the IIG.
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION CHARGE CARD PROGRAM
-
We recommend EEOC ensure that emailed policy memos are promptly updated in the appropriate EEOC Directives Transmittal Order.
-
For purchase cards, EEOC management should create a control where management reviews, on a sample basis, purchase cards transactions to ensure all obligating documents and purchase orders are in conformity with EEOC Directives Transmittal Order 360.003, Commercial Purchase Charge Card Program Practical User's Guide. For travel cards, EEOC management should create a control where management reviews, on a sample basis, travel card transactions to ensure all travel authorization or vouchers and receipts are in conformity with EEOC Directives Transmittal Order 345.001, Travel and Transportation Administrative Policies and Procedures Manual.
-
We recommend EEOC management update its policies and procedures to include all required safeguards and internal controls to be compliant with the Government Charge Card Abuse Prevention Act of 2012. In addition, EEOC should create a monitoring control to review the policy when changes or updates are made to federal law or Office of Management and Budget or General Services Administration guidance
Audit of the U.S. Equal Employment Opportunity Commission’s Fiscal Year 2020 Financial Statements
-
We recommend EEOC management create a control where management reviews, on a sample basis, at least quarterly, the approved PP&E disposals/retirements for conformity to EEOC SOP for OIT Excess Property that states, “When equipment is disposed of, an SF 120, SF 122, or SF 120 copy using GSAXcess, is approved by the EEOC Approving Official, CSD Backup or Property manager, evidenced by their signature and date.” EEOC management should follow-up with Approving Official(s), CSD Backup or Property management who have been found to not adhere to requirements of the SOPs for OIT Excess Property and require them to obtain additional training, to include certifying they have read the Approving Officials responsibilities, as it relates to the aforementioned control. (Repeat Finding)
EVALUATION OF THE EEOC’S SOCIAL MEDIA PROGRAM
-
Implement a consistent content approval process run by OCLA.
-
Complete revisions to the social media handbook and provide to all staff managing social media channels.
Report 2019-001-EOIG - Evaluation of EEOC’s Contracts Administration Activities
-
OCFO should revise EEOC Order 360.001 as needed to assist CORs in performing their
duties. Include implementation guidance for contract administration activities, such as
submitting contract modifications.
Report 2018-007-AOIG - Performance Audit Report on the EEOC Charge Card Program: Fiscal Years Ending September 30 2018 and 2017
-
We recommend that the Office of the Chief Financial Officer of the U.S. Equal
Employment Opportunity Commission enhance the documentation, monitoring, and
enforcement of its controls over the closure of charge card accounts.
- For purchase cards, the Administrative Officer (AO) or District Resources Manager
(DRM) should maintain documentation of all account closures electronically or in
hard copy. Documentation should include evidence of the name of the AO or DRM
who received the employee's charge card, the date the card was turned in, the date the
card was physically destroyed, and the date that account closure was confirmed by the
Charge Card Vendor. The policy or procedure should include monitoring by the
Agency/Organization Program Coordinator (A/OPC) and/or Agency
Alternative/Organization Program Coordinator (AA/OPC) and appropriate
disciplinary actions for noncompliance. - For travel cards, the Charge Card Program Manager (CCPM) should maintain
documentation of all account closures electronically or in hard copy. Documentation
should include evidence of the name of the immediate supervisor and/or servicing
Fiscal
Year
Report Number Report Name Date Issued
2021 2020-002-AOIG Management Letter - FY 2020 Financial
Statement Audit
12/16/2020
1. We recommend EEOC management create a control where management reviews, on a
sample basis, at least quarterly, the approved PP&E disposals/retirements for
conformity to EEOC SOP for OIT Excess Property that states, “When equipment is disposed of, an SF 120, SF 122, or SF 120 copy using GSAXcess, is approved by the
EEOC Approving Official, CSD Backup or Property manager, evidenced by their
signature and date.” EEOC management should follow-up with Approving Official(s),
CSD Backup or Property management who have been found to not adhere to
requirements of the SOPs for OIT Excess Property and require them to obtain additional
training, to include certifying they have read the Approving Officials responsibilities,
as it relates to the aforementioned control. (Repeat Finding)
- For purchase cards, the Administrative Officer (AO) or District Resources Manager
EEOC Federal Hearings and Appeals Processes
-
Assign a target amount of days for intake so that management can determine if changes
implemented impact the efficiency of the process. -
OIT developers should meet directly with software users, such as OFO attorneys and
supervisory attorneys and OFP AJs and Supervisory AJs (SAJ) to determine additional
requirements.
Report 2017-007-AOIG - Independent Evaluation of the U.S. Equal Employment Opportunity Commission’s Compliance with Provisions of the Federal Information Security Modernization Act of 2014 (FISMA)
-
The EEOC should develop and implement a Trusted Internet Connection (TIC) program in accordance with Office of Management and Budget (OMB) requirements to assist in protecting the agency’s network from cyber threats. (Repeat finding)
-
The EEOC OIT should fully implement multifactor authentication for logical and remote access enterprise-wide. (Repeat finding)
Report 2013-008-PSA - Performance Audit of the Agency’s Personnel Security Program
-
Implement a formalized training program for individuals who use classified information as a part of their duties. If an external agency is to assume the responsibility of training these individuals, this agreement should be documented in an MOU.
-
Immediately correct any known weaknesses. If EEOC determines not to correct a noted weakness, EEOC should document this analysis and their acceptance of the associated risk.
-
Develop and implement policies and procedures to address the safeguarding, transfer, storage, or disposal of classified information. The policy should include the requirements for Memorandums of Understanding between agencies.