U.S. flag

An official website of the United States government Here’s how you know

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you're on a federal government site.

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Document
Document

The U.S. Department of Housing and Urban Development (HUD) Office of Inspector General (OIG) conducted penetration testing concurrently with our fiscal year 2024 Federal Information Security Modernization Act of 2014 (FISMA) evaluation. The objective of the penetration testing evaluation was to test the technical implementation of a limited set of security controls for a selection of HUD information systems and applications: the Office of Housing’s Federal Housing Administration Catalyst system, the Office of the Chief Financial Officer’s Line of Credit Control System (LOCCS), the Office of Community Planning and Development’s Disaster Recovery Grant Reporting (DRGR) system, and the Office of Public and Indian Housing’s National Standards for the Physical Inspection of Real Estate (NSPIRE) system.

Our assessment identified nine significant weaknesses related to data protection and website security, underscoring the need to strengthen technical security controls.  To address these findings, we provide 13 new recommendations, which will be formally tracked by our office, and 7 opportunities for improvement.  These recommendations are designed to enhance HUD’s IT security posture by preventing unauthorized data access, ensuring the integrity and confidentiality of sensitive information, and protecting against web-based threats.

OIG has determined that this report contains sensitive information and is therefore not appropriate for public disclosure.

Recommendations

Chief Information Officer

  •  
    Status
      Open
      Closed
    2024-OE-0002a-01

    HUD OCIO should block access to commonly used cloud storage URLs that are not associated with a verified business need.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-02

    HUD OCIO should mitigate the risk of data exfiltration and block the use of external storage devices, such as optical drives, cell phones, and tablets, that have not been formally approved for use based on a verified business need.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-03

    HUD OCIO should enhance data loss prevention configurations and continue efforts to implement user and entity behavior analytics solutions. Both solutions should be appropriately configured to effectively identify and prevent the exfiltration of sensitive data, including PII, while addressing the limitations of pattern-based detection methods.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-04

    HUD OCIO should conduct an assessment, including tests of existing controls, to identify gaps in network traffic monitoring coverage and develop plans to address these gaps.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-05

    HUD OCIO should conduct an assessment to evaluate the potential for data exfiltration from non-GFE devices and implement appropriate controls to address the identified risks. Such controls could include blocking the use of non-GFE devices, limiting data access for sensitive fields during remote access, prohibiting the download of sensitive data to non-GFE devices, requiring the use of virtual desktop infrastructure with non-GFE devices, and implementing network access control to validate the security posture of non-GFE devices.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-06

    HUD OCIO, in coordination with CPD, should implement and enforce a whitelist of trusted sites for resource sharing in DRGR

  •  
    Status
      Open
      Closed
    2024-OE-0002a-07

    HUD OCIO, in coordination with the Office of Housing, CPD, and OCFO, should configure FHA Catalyst, DRGR, and LOCCS web servers to ensure that all HTTP request headers are properly validated and processed to address the risk of CSD.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-08

    HUD OCIO, in coordination with CPD, OCFO, and PIH, should configure DRGR, LOCCS, and NSPIRE content security policies to ensure that only necessary web server resources are accessible by clients.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-09

    HUD OCIO, in coordination with OCFO, should update the LOCCS web server software to a newer version of ColdFusion or to a similar web application hosting platform that receives regular updates and security patches.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-10

    HUD OCIO, in coordination with OCFO, should ensure that the LOCCS testing and production environments appropriately limit access to client bank account information, ensuring that individual users have only the minimum level of access necessary to perform their duties. This measure should include masking all or part of bank account numbers when appropriate.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-11

    HUD OCIO, in coordination with the Office of Housing, should ensure that sensitive information in the Parameter Store is stored securely with encryption; for example, by using the “SecureString” format, which encrypts the data using the AWS Key Management Service. Additionally, authenticators in the Parameter Store should be rotated in accordance with Federal requirements and applicable HUD policy.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-12

    HUD OCIO, in coordination with the Office of Housing, should ensure that private keys are appropriately stored and managed; for example, by using the Amazon Web Services Key Management Service, configured for compliance with FIPS 140-2.

  •  
    Status
      Open
      Closed
    2024-OE-0002a-13

    HUD OCIO, in coordination with the Office of Housing, should ensure that only necessary and current FHA Catalyst pages are accessible to users.