E
l
S
d
e
p
a
r
t
m
e
n
t
o
f
L
a
b
o
r
s
F
P
-
7
Z
~
~
z
O
f
f
ice
o
f
I
n
s
p
ecto
r
G
e
ne
r
al
~
~ENF
o
a
W
a
s
h
i
n
g
to
n
,
D
.
C
.
2
02
1
0
Q
~
~
`
*
e
~
~
~h
T
~
~
s
T
~
e
s
o
<
~
~
~
4
T
.
M
I
CH
AE
L
K
ER
R
C
h
i
e
f
n
f
o
r
m
a
t
i
o
n
o
f
f
i
c
e
r
t
.
E
L
L
I
~
T
P
.
L
E
W
l
S
A
s
s
i
s
t
a
n
t
i
n
s
p
e
c
t
o
r
G
e
n
e
r
a
l
f
o
r
A
u
d
i
t
S
U
B
J
E
C
T
.
A
l
e
r
t
M
e
m
o
r
a
n
d
u
m
:
D
O
L
e
e
d
s
a
T
a
k
e
i
m
m
e
d
i
a
t
e
A
c
t
i
o
n
t
o
C
o
r
r
e
c
t
S
e
c
u
r
i
t
y
W
e
a
k
n
e
s
s
e
s
n
t
h
e
P
IV
f
S
y
s
t
e
m
,
R
e
p
o
r
t
N
u
m
b
e
r
2
3
-
12
-
O
Q
9
-
07
-
00
1
T
h
e
p
u
r
p
o
s
e
o
f
h
i
s
m
e
m
o
r
a
n
d
u
m
s
t
o
i
n
f
o
r
m
y
o
u
o
f
s
i
g
n
i
f
i
c
a
n
t
w
e
a
k
n
e
s
s
e
s
n
t
h
e
P
I
V
I
I
s
e
c
u
r
i
t
y
p
r
o
g
r
a
m
.
T
h
e
i
m
p
o
r
t
a
n
c
e
o
f
t
h
e
P
IV
i
f
s
y
s
t
e
m
c
a
n
n
o
t
b
E
u
n
d
e
r
s
t
a
t
e
d
b
e
c
a
u
s
e
t
p
r
o
t
e
e
~
s
D
Q
L
'
s
n
f
r
a
s
t
r
u
c
t
u
r
e
,
i
n
c
l
u
d
i
n
g
d
a
t
a
,
o
t
h
e
r
s
y
s
t
e
m
s
,
a
n
d
p
~
o
p
f
e
,
f
r
o
m
p
o
t
e
n
t
i
a
l
h
a
r
m
c
a
us
e
d
b
y
u
n
a
u
t
h
o
r
i
z
e
d
a
c
c
e
s
s
.
O
v
e
r
a
l
l
,
w
e
e
l
i
e
v
e
C
)
A
S
A
M
'
s
x
e
c
u
t
i
v
e
m
a
n
a
g
e
m
e
n
t
i
d
n
o
t
ad
e
q
ua
t
e
{
y
e
n
g
a
g
e
i
r
t
h
e
e
c
u
r
i
t
y
o
f
th
e
P
I
V
I
E
s
y
s
t
e
m
.
T
h
i
s
a
c
k
o
f
e
n
g
a
g
e
m
e
n
t
b
y
O
A
S
A
M
s
h
i
g
h
-
r
a
n
k
i
n
g
e
x
e
c
u
t
i
v
e
s
i
s
i
n
d
i
r
e
c
t
a
p
p
o
s
i
t
i
o
n
t
o
N
E
S
T
g
u
i
d
e
l
i
n
e
s
a
n
d
a
s
a
t
r
i
c
k
l
e
d
d
a
w
n
t
o
t
h
o
s
e
w
h
o
a
w
n
e
d
,
p
e
r
a
t
e
d
,
a
n
d
m
o
n
i
t
o
r
e
d
t
h
e
P
IV
-
I
s
y
s
t
e
m
a
n
d
o
p
e
r
a
t
i
o
n
s
,
c
a
u
s
i
n
g
d
e
f
i
c
i
e
n
t
s
y
s
t
e
m
s
e
c
u
r
i
t
y
.
S
p
e
c
i
f
i
c
a
l
l
y
,
O
A
S
A
M
e
x
e
c
u
t
i
v
e
m
a
n
a
g
e
m
e
n
t
as
s
i
g
ne
d
a
s
y
s
t
e
m
o
w
n
e
r
w
i
t
h
o
u
t
t
h
e
e
d
u
c
a
t
i
o
n
a
l
o
r
w
o
r
k
e
x
p
e
r
i
e
n
c
e
n
e
c
e
s
s
a
r
y
o
p
r
o
p
e
r
l
y
o
v
e
r
s
e
e
e
c
u
r
i
t
y
f
o
r
t
h
e
P
f
V
i
i
s
y
s
t
e
m
.
Q
u
r
e
s
t
i
n
g
i
d
e
n
t
i
f
i
e
d
s
e
v
e
r
e
c
a
n
t
r
o
f
w
e
a
k
n
e
s
s
e
s
n
t
h
e
f
a
l
l
o
w
i
n
g
a
r
e
as
:
a
c
c
o
un
t
m
a
n
a
g
e
m
e
n
t
,
y
s
t
e
m
l
o
g
i
n
,
s
y
s
t
e
m
p
r
i
v
i
l
e
g
e
s
a
n
d
a
g
r
e
e
m
e
n
t
s
,
s
y
s
t
e
m
s
e
c
u
r
i
t
y
a
s
s
e
s
s
m
e
n
t
s
,
y
s
t
e
m
t
r
a
i
n
i
n
g
,
c
o
n
t
i
n
g
e
n
c
y
p
l
a
n
n
i
n
g
,
s
y
s
t
e
m
s
e
c
u
r
i
t
y
p
l
a
n
,
s
y
s
t
e
m
r
u
l
e
s
o
f
b
e
h
a
v
i
o
r
,
a
n
d
c
o
n
f
i
g
u
r
a
t
i
o
n
r
n
a
n
a
g
e
m
e
r
t
t
.
F
o
r
e
x
a
m
p
l
e
,
we
f
o
u
n
d
:
5
6
2
s
e
p
ar
at
e
d
D
aL
m
p
{
o
y
e
e
s
h
e
l
d
a
c
t
i
v
e
P
V
I
I
a
c
c
o
un
t
s
a
f
t
e
r
s
e
p
a
r
a
t
i
o
n
,
I
V
f
l
s
y
s
t
e
m
r
o
t
e
-
b
a
s
e
d
u
s
e
r
s
h
e
l
d
a
c
t
i
v
e
P
E
V
E
I
a
c
c
o
u
n
t
s
a
f
t
e
r
s
e
p
a
r
a
t
i
o
n
.
P
I
V
I
I
r
a
t
e
-
b
a
s
e
d
u
s
e
r
a
c
c
o
u
n
t
s
w
e
r
e
n
o
t
d
i
s
a
b
{
e
d
a
f
t
e
r
~
a
y
s
o
f
i
n
a
c
t
i
v
i
t
y
O
f
2
2
3
P
V
I
I
r
o
l
e
-
b
a
s
e
d
u
s
e
r
a
c
c
o
u
n
t
s
,
1
2
5
w
e
r
e
n
o
t
a
c
c
e
s
s
e
d
a
r
d
i
s
a
b
l
e
d
w
i
t
h
i
n
-
t
h
e
p
a
s
t
6
a
y
s
.
t
~
o
r
k
i
n
g
f
v
r
t
n
e
r
i
c
c
~
s
W
o
r
k
f
f
~
r
c
e
The
system
did
not
ock
out users
fter
the
Third
failed
iagin
attempt.
T
h
e
remediation
far
this
issue
was
approved
a
r
cEosure
b
y
a
hird
-party
assessor
East
(.?ctaber.
2
8
f
the
3
6
P
l
V
-
I
rote
-based
users
tested
were
ranted
system
access
privileges
exceeding
authorization.
2
8
f
45
TV
-
f
role
-based
users
have
r
more
oles
that federal
paficy
(PIPS
20
1
-1)
equires to
b
e
mutually
exclusive,
meaning
hat
n
o
ingle
user
should
possess
more
han
one
o
f
h
e
following
rates:
(1)
ponsor,
2
}
Registrar,
o
r
(3)
ssuer.
W
e
lso
expressed
concerns
ith
the
P
V
-If
system
n
our
March
31,
2011,
eport
(
0
4
-11-
001-07
-001),
"The
Department
eou(d
Do
More
o
Strengthen
Controls
Ouer
t
s
Personal
dentity
Verification
System."
n this
report,
we
dentifred
issues
refaced
t
o
the
implementation
o
f
management,
perational,
ar~d
technical
corttrois
aver
the
P
(
V
-EI
system.
A
s
a
esult,
we
made
ecommendations
elated tQ
employee
Eigibility
for
PIV
ards,
a
s
ell
recommendations
o
r
~'EV
card
issuance
and
revocation.
These
recommendations
have
not
been
closed
o
r
implemented.
Taken
individually,
these
weaknesses
r
e
very
serious.
Taken
a
s
a
whale,
heir
impact
o
n
the
P
I
V
-tl
security
program
places
the
Department
t
a
~igh
risk
f
o
r
harm
o
infrastructure,
systems,
ata,
employees,
ontractors,
and
visitors.
Tf~erefore,
we
onsider
these
weaknesses
a
ignificant
deficiency,
and
a
material
weakness,
as
efined
b
y
OMB
emoraneium
M
-
1
1
-33
and
A
-123
revise.
Within
5
ays
f
receipt
o
f
this
memorandum,
we
ecommend
the
CIC)
stablish
a
prioritized
corrective
action
plan,
including
milestones,
that
details
a
trategy
t
o
reduce
r
eliminate
the
risks
we
dentified.
We
lso
recommend
that
the
C
I
O
ensure
h
e
system
owners
eceive
the
raining
hat
they
need
t
o
meet
heir
responsibilities.
This
memorandum
contains
sensitive
inforrnatian
and
s
restricted
t
o
a~cial
use.
f
should
only
b
e
istributed
t
o
individuals
with
a
egitimate
"need
t
o
know."
Recipients
o
f
his
report
are
not
authorized
t
o
distribute
o
r
release
i
t
without
t
he
express
permission
o
f
the
}IG.
[
f
you
have
any
questions,
please
contact
Keith
E
,
Galayda,
udit
Director,
a
t
(202}
6
9
3
-5259.
View on Scribd