25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

VA Information Security Weaknesses Will Take Further 22 Months To Remediate

Last week, the VA Office of Inspector General issued a report of a 2015 Department of Veteran Affairs (VA) audit conducted to determine whether the VA’s Security Program complied with Federal Information Security Modernization Act (FISMA) requirements and NIST guidelines.

The audit report indicates progress has been made to improve cybersecurity protections at the VA, but there is still a long way to go before the VA’s InfoSec program raises standards to the level required by FISMA.

dept-veteran-affairsAuditors discovered a number of significant security deficiencies in the VA’s identity management and access controls, configuration management controls, contingency planning processes, incident response and monitoring procedures, contractor systems oversight, continuous monitoring, system development/change management controls, and its agency-wide security management program.

While some efforts have been made to improve access and configuration management controls, security control standards had not yet been applied to all servers, databases, and network devices and a number of system security vulnerabilities had yet to be remedied. According to the report, approximately 9,500 separate security risks still need to be addressed by the VA.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

The report makes 31 new recommendations for improving the VA’s information security program, although there are still four unaddressed recommendations from previous audits bringing the total to 35.

Progress Is Being Made to Improve VA Cybersecurity Protections

The VA responded to the audit findings at a hearing on March 16, 2016., saying that around 30% of the recommendations would be addressed by the end of the year, but that it would take until the end of 2017 to comply with all of the recommendations detailed in the report.

While that timescale is viewed to be realistic by the VA, during the hearing of the House Oversight and Government Reform Committee’s subcommittee on IT, subcommittee chair William Hurd, R-Texas said a time frame of “two years is too long.” He went on to say, “The bad guys are moving at the speed of light, and we’ve moving at the speed of bureaucracy.” Hurd believes that more of an effort can be made to speed up the process of addressing the security vulnerabilities, saying “I think we can do better.”

The VA’s task is difficult. A considerable amount of work is required to bring all systems up to date. There are many outdated information systems in use, many of which are writing in outdated computer language, while some software dates back to the 1960’s. Medical systems are no longer supported by vendors, many hundreds of custom apps are still in use, and many medical apps are still run on the unsupported Windows XP operating system.

Plans are underway to migrate off many of the VAs custom apps to off-the-shelf options, some systems will be moved to the cloud, and email-as-a-service is to be implemented. VA CIO LaVerne Council said at the hearing that the VA “is on track to eliminate our material weaknesses by the end of 2017,” but that would require nearly twice the VA’s current cybersecurity budget. A budget increase to $370 million is planned for 2017.

The full OIG report can be viewed here.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist