We contracted with the independent certified public accounting firm of RMA Associates LLC (RMA) to conduct an audit of the Inter-American Foundation’s (IAF’s) information security program for fiscal year 2021 as required by the Federal Information Security Modernization Act of 2014 (FISMA). The audit firm concluded that IAF generally implemented an effective information security program, which was defined as having an overall mature program based on the fiscal year 2021 inspector general FISMA reporting metrics. Nevertheless, RMA identified weaknesses in all nine FISMA reporting metric domains. We made nine recommendations to address these weaknesses and further strengthen IAF’s information security program.
IAF Generally Implemented an Effective Information Security Program for Fiscal Year 2021 in Support of FISMA
Recommendations
We recommend that IAF's chief information officer fully document and implement a process to include in the risk acceptance forms a clear business reason for risk acceptance and the compensating controls implemented to reduce the risk that vulnerabilities can be exploited.
Develop and implement supply chain risk management policies, procedures, and strategies.
We recommend that IAF's chief information officer develop and implement a procedure to document risk acceptance when vulnerabilities cannot be remediated within the timeframes specified in IAF's operating procedures.
We recommend that IAF's chief information officer approve and implement IAF's Information Resource Management Strategic Plan.
We recommend that IAF's chief information officer document and implement a procedure to approve IAF's table-top exercise plans before conducting the exercises.
We recommend that IAF's chief information officer document and implement a written process for obtaining and evaluating feedback on IAF's privacy and security training content, including role-based training.
We recommend that IAF's chief information officer develop and implement a process to document lessons learned related to risk management, configuration management, identity and access management, data protection and privacy, and information security continuous monitoring to improve IAF's security posture.
We recommend that IAF's chief information officer develop and implement an information security continuous monitoring strategy.
We recommend that IAF's chief information officer develop and implement a written process to document participants in IAF's contingency plan training.