You are on page 1of 2
MARK R. WARNER, — Waited States Senate on RULES AND ADMINISTRATION September 16,2019 Mark A. Morgan Acting Commissioner of U.S. Customs and Border Protection 1300 Pennsylvania Ave NW Washington, DC 20004 Dear Mr. Morgan, In 2014, a year before the OPM data breach that compromised the personal data of 20 million federal ‘employees, two separate federal contractor breaches exposed the personal data of 73,000 federal ‘employees.’ Three years before those incidents, in 2011, a government contractor exposed the data of 4.9 million military health care beneficiaries.” Last year it was reported that 5.6 percent of aerospace and defense contractors and 4.3 percent of technology contractors suffered at least one data breach since 2016. Federal healthcare and wellness contractors reported breaches at 8 percent during the same period.’ Despite the many examples of poor third party management and subcontractor information security practices, federal agencies continue to fail to ensure that contractors and subcontractors adequately ‘manage the sensitive information of the American people. Considering your position as the largest federal law enforcement ageney of the Department of Homeland Security, I am particularly alarmed by the eyberattack on one of your ageney’s subcontractors that allowed the theft of facial images betonging to thousands of travelers. It is my understanding that the contractor improperly transferred information from CPB to their own company database, which was breached by attackers.° The attack resulted in the removal of the facial images of at least 100,000 travelers.” According to another report, the breach resulted in the exposure of several gigabytes of data, including confidential agreements, budget spreadsheets, and internal photos.* While all of the stolen “GSA announces new requirement for contractors.” January 9, 2019. AFBA Newsroom. hip:/newsroom.afba.com/uniformed- setviees-news/psu-creaes-new-rules-for-eporting-povernment-contactor-datacbreaches! Miles, Donna, “Iricare investigates beneficiary data breach,” October 11 2011, US Amy Website, ‘ups: sw. army: snil/arcicle’6708 Vvicare investigates beneficiary data breach, 2 “Report finds contractors face significant security threats.” February 16, 2018. Washington Technology ‘nts: vashingtontechnology convarticles/2018/02/I6lconteactor-data-breach-report.aspx “Beyond Unele Sam: analyzing the security posure of US. government contactors and subcontractors,” February 16,2018, BiitSightInsighs, ‘nups:edn2 hubspot nevhubis277648/nsights/BitSight Insights Analyzing Secutty_Pederal_ Contractors pd?%"=15186277013. ‘S4deutm_campaign=Q117%20BitSight%20Insightséeutm_source=hs_automationdutm_medium=email&uim conten 60575255 ‘& hnsene=p2ANgtz-_090lHk3gpgNnQhxOINyQPmnlLIIMjQTPr6KSL.CU-fe6ydnLGAVy B= y]Q1Zuquzi9evjhinkS Il6_QooVomXin2mA& hsmi-60S75255 Fussell, Sidney. “This is exactly what privacy experts said would happen,” June 11, 2019, !hups:/www.theatlantc.comtechnology/archive/2019/06\travelers-images-stoleneatack-cbp/591403/ § Reichert, Cotrine. “US Customs and Border Protection says traveler images were taken in eyberattack,” June 12, 2019. Lhupss/www.cnet.conv/newsus-customs-and-border-protection-says-traveler-images-were-taken-in-subcontactor-eyber-attack! ® Whitaker, Zack. “CRP says traveler photos and license plate images stolen in data breach,” June 10,2919. hpsuitechcrunch.com/2019106/10/cbpedstacbreach’ * Harwell, Drew. "Hacked documents detail sensitive details of expanding border surveillance,” une 21, 2019, lps:/www.washingtonpostcom/technology/201910612 hacked-documents-reveal-sensitive-detils-expanding-border- surveillance’ MARK , WARNER NANCE BANKING, HOUSING, AND United States Senate ee WASHINGTON, DC 20510-4608 InTELUGeNce information was sensitive and required protection, facial image data is especially sensitive, since such permanent personal information cannot be replaced like a password or a license plate number. Thave frequently pointed out the derisory state of third-party contractor and subcontractor information security practices and management in industry and across the government. It is absolutely critical that federal agencies and industry improve their track records, especially when handling and processing biometric data. Americans deserve to have their sensitive information secured, regardless of whether being handled by a first or a third-party. To better understand the state of your third-party management and contractor and subcontractor information security practices, especially regarding permanently identifiable biometric data, I request answers to the following questions: 1. What are your contractual requirements for security controls and for third-party contractor/subcontractor management of biometric data? 2. Do you require contractors and subcontractors to maintain full-disk encryption of their databases? 3. What identity and access management requirements do you place on contractors/subcontractors? 4, Do you require that your contractors/subcontractors ensure segregated accounts and credentials for each unique user? 3. What are your third-party conttactor/subcontractor security requirements for managing administrative accounts? 6. What are your eontractor/subcontractor configuration management requirements? What are your contractot/subcontractor vulnerability management requirements? What are your ccontractor/subcontractor data loss prevention and encryption requirements? 7. What are your contractor/subcontractor requirements for monitoring, auditing and logging capabilities? How long do you or your contractors or subcontractors, or sub-suppliers retain your logging data? What type of data do you provide to your contractors? 8. How do you evaluate the information security systems and data retention policies of your contractors and sub-suppliers? | would appreciate receiving your answers within two weeks. Please contact Leisel_Bogan@wamer.senate.gov. Sincerely, Mok R Mine, Mark Warner United States Senator