Agencies Need to Address “Significant Weaknesses” in Information Technology Policies and Practices

Editor’s Note:  The issue of IT costs is crucial to both fiscal and cyber security.  Because meaningful, accurate IT cost estimates that comply with the requirements of the Data Quality Act are essential to both the public and private sectors, FISMA Focus expects to be focusing increasing attention on the analysis of this issue.

The GAO Report to the Ranking Member of the Senate Committee on Homeland Security and Governmental Affairs, “Information Technology Cost Estimation: Agencies Need to Address Significant Weaknesses in Policies and Practices,” is attached here.

Why GAO Did This Study

The federal government plans to spend at least $75 billion on information technology (IT) investments in fiscal year 2012. The size of this investment highlights the importance of reliably estimating the costs of IT acquisitions. A reliable cost estimate is critical to the success of any IT program, providing the basis for informed decision making and realistic budget formation. Without the ability to generate such estimates, programs risk missing their cost, schedule, and performance targets.

What GAO Found
  •  While the eight agencies GAO reviewed—the Departments of Agriculture, Commerce, Defense, Homeland Security, Justice, Labor, and Veterans Affairs, and the Environmental Protection Agency—varied in the extent to which their cost-estimating policies and procedures addressed best practices, most had significant weaknesses.

 

  • The 16 major acquisition programs had developed cost estimates and were using them, in part, to support program and budget decisions. However, all but 1 of the estimates were not fully reliable—meaning that they did not fully reflect all four characteristics of a reliable cost estimate identified in the GAO cost-estimating guide: comprehensive, well-documented, accurate, and credible (see figure).

Facebooktwittergoogle_plusredditpinterestlinkedinmail

4 responses to “Agencies Need to Address “Significant Weaknesses” in Information Technology Policies and Practices”

  1. Fiona says:

    It’s good that technologies are moving forward. But what about security? Now even big corporations are at risk to be hacked. Can data leak happen because of a cybersecurity attack?

  2. Kendry Ross says:

    I had some experience with software development companies. Also I’ve found some good security testing tools – https://qawerk.com/blog/top-10-open-source-software-security-testing-tools/. It is important for preventing hacking attacks which are so widespread now. So don’t forget to check your app or software before releasing. Also it protects your consumers from data leak

  3. Dave says:

    The best way to prevent hack attacks is to provide good level of quality assurance. Read more here: https://jaydevs.com/staff-augmentation/hire-qa-tester/

Leave a Reply

Your email address will not be published.

Please Answer: *