Categories: Government

USPS Investigation: South Florida District Vulnerability Assessment Audit Report, October 22, 2013

Background

The U.S. Postal Service Office of Inspector General’s risk modeling identified the South Florida District as the _________ based on collected data showing malicious software programs on district computer systems. These security incidents can damage information system hardware and software and affect the integrity, confidentiality, and availability of data.

The South Florida District serves more than 14 million customers, delivers mail to more than 3.1. million homes, and generates annual revenue of about
$1.1 billion. Districts are responsible for adhering to. U.S. Postal Service policies for maintaining and securing their information systems. The (b)(3) 39 usc 410
Service Center is responsible or updating all South Florida District information systems, including installing security dates. Engineering personnel in ______ manage the applications supporting the mail processing environment in the district.

What the OIG Found

Security controls in the South Florida District did not adequately protect Postal Service data and infrastructure against potential corruption and unauthorized access. Of ___ Internet addresses that operated as servers, databases, and workstations at three mail processing plants, we found significant security control weaknesses on ___ of them. Administrators did not consistently install security updates (patches) and configure all operating systems and
databases as required by policy.

Continue scrolling for more...

What the OIG Recommended

We recommended management implement vendor recommendations for patching and Postal Service configuration standards, correctly configure the _________ and ensure personnel with access to Postal Service resources receive annual security awareness training.

The Report

The following document was received under the USPS/IG FOIA Case 2017-IGFP-00029.

 Report Number IT-AR-14-001- South Florida District Vulnerability Assessment Audit Report – dated October 22, 2013 [29 Pages, 5.3MB]

https://documents.theblackvault.com/documents/ig/IT-AR-14-001.pdf

 

Follow The Black Vault on Social Media:

This post was published on November 17, 2016 9:54 pm

John Greenewald

Recent Posts

AARO Releases Final Report on “Eglin UAP” Incident

Today, the All-domain Anomaly Resolution Office (AARO) of the U.S. Department of Defense provided their…

April 24, 2024

AATIP and the Pentagon: The Struggle Over UFO Program Records

Since October 2017, The Black Vault has investigated the Advanced Aerospace Threat Identification Program (AATIP),…

April 23, 2024

FOIA Documents Reveal AARO’s Authorized and Repeated Attempts to Engage with David Grusch

https://www.youtube.com/watch?v=3GNITLBj0hM The All-domain Anomaly Resolution Office (AARO), tasked to investigate Unidentified Anomalous Phenomena (UAP), made…

April 18, 2024

DoD Releases “KONA BLUE” Documents

The following was the description by the DoD about KONA BLUE. It is reproduced here,…

April 16, 2024

Newly Released 1963 Report Sheds Light on Nuclear Era Urban Defense Strategies

After nearly a decade of waiting, The Black Vault has successfully acquired a document through…

April 12, 2024

National Guard Bureau Transition Book, Date Unknown

These records were provided by the family of anthologist and transparency activist Russ Kick, from his…

April 9, 2024