Groups 23 and 25
Date: 23 October 2020
Question and answers from previous committee
hearing
Ř Questions
related to information technology (IT)
·
Which of your IT systems are at the end of their
supported lives, and is there a concern in an age of cybersecurity and cyber espionage?
o We
monitor the aging of our applications via the TIME (tolerate, invest, migrate,
eliminate) methodology prescribed by the Treasury Board of Canada Secretariat.
Several systems have been identified as being end-of-life and have been included
in our 3-year plan for IT investments.
·
Examples
of back-end systems that need upgrades
o
Windows
server upgrades (2008)
o
Oracle
Linux upgrades
o
Database
upgrades (Oracle)
o
.NET
Core upgrade (Development)
·
Examples
of applications that are end-of-life
o
Auditing:
auditing working paper file (TeamMate) and report communication application (Controlled
Document Interface (CODI))
o
Communications:
replace correspondence tracking system
o
Human
Resources (HR): applicant tracking system (Monster)
o
Finance:
financial system (GX) and product costing
·
Is your IT software behind the private sector’s?
o We do not
currently benchmark our software against the private sector. We are working on
implementing enterprise architecture processes that will help us to understand
auditor needs and will likely include comparing our target state with private
sector firms.
·
Do the weaknesses in your IT systems affect
productivity? Has some audit work been affected as a result?
o We are
interested in modernizing our IT systems in order to achieve benefits for our
business, which includes improving productivity. We do not have any specific
instances in which audit work was affected.
·
Would you be able to get more audits done with more
sophisticated, up-to-date IT software?
o We are
interested in modernizing our IT systems in order to achieve benefits for our
business, which includes improving productivity. However, technology is only 1 facet
of productivity, and it would be premature to state what the impact will be on
the number of audits completed. The return on investment for IT software
modernization is on average 2 to 3 years after the investment is made.
·
Would you be able to attract more recent graduates
if you had the more advanced and current software that they are trained on?
o We are
working on implementing enterprise architecture processes that will help us to
understand auditor needs. This will allow us to revisit the current tools and
applications available to auditors and determine what changes are needed. We
are not in a position to say how this will affect recruiting. However, having
more advanced tools may provide an incentive for recent graduates.
·
Do you have contingency plans in the event of a
cybersecurity event, based on the current technology you have?
o Yes, we
do have contingency plans and an incident management response plan in place. We
have a recovery site that is tested regularly. Work continues in order to
strengthen our security posture and improve our resiliency to potential
security incidents.
·
The Office of the Auditor General of Canada (OAG)
will replace the HR management systems and audit software. What safeguards do
you have to ensure you don’t encounter issues such as those that arose with the
Phoenix experience?
o We will
follow strong practices to ensure that the HR system meets our needs and is
secure. The OAG is also a direct-entry client, where there is no automated link
with the pay system.
o
What are you deferring in terms of support services
(for example, IT software and security, HR systems) because of lack of funding,
and what are the potential consequences (for example, on the security of your
computer systems)?
o
Investment decisions are made over a 3-year period. These
decisions are being risk managed. For example, we have prioritized the
implementation of security software, but the implementation of a new financial
system, communications systems, learning management systems, and human capital
management systems have been delayed. We have also not been able to fully
maintain our legacy systems and have many unsupported systems, which increases
security risks. We have also not been able to make investments to modernize our
processes and systems (for example, we still rely on manual processes instead
of automation, and we do not leverage cloud and open source).
Departmental plans and departmental
results reports
2020–21 Departmental
Plan |
||||||
No. |
Page |
Reference |
Question/comment |
Answer: Last year (from 2019–20 Departmental
Plan, where applicable) |
Answer: 2020–21 |
Key contact |
1 |
3 |
The key
risk that the OAG faces is our ability to effectively acquire, develop, and
use new technologies and methodologies to keep pace with the changing
environment. We recently received the report
from the international peer review team that audited the OAG at our request.
The peer review team found that our system of quality control was suitably
designed and effectively implemented and was impressed overall with the high
standard of work done by the OAG. The team also noted the need to address
emerging technologies. Managing this risk means that the
OAG must invest in its information technology security and architecture,
including the modernization of audit tools and emerging technologies. As a
result of this investment, the OAG is reducing the number of performance
audits that it conducts to remain within current funding levels. |
What is the OAG
doing to modernize?
|
We continue to have legacy systems that are no longer supported or that
will be out of support in the short or medium term. Examples include ·
correspondence
management software (where we track inquiries from the public) ·
INTRAnet
search engine (to search for internal information) ·
IT
ticketing system ·
financial
system ·
document
management system ·
CODI
(to secure our electronic documents), which needs to be migrated ·
reports
system, which needs to be upgraded ·
editorial
services systems (help with audit reporting) ·
OAG
learning management system (tracks our employee training) |
The OAG is focused
on modernizing our IT environment and processes. Additional funding
was requested to maintain legacy systems (keep the lights on) and to modernize:
·
Maintain
operations: An additional 12 IT full-time equivalents were requested in order
to address existing staffing shortfalls and maintain existing applications
and to support projected increases in employees. ·
Modernize:
14 additional full-time equivalents were requested in order to modernize and
find innovative ways of auditing. ·
An
additional $3 million in funding was requested for IT over the coming 5 years
to update systems and modernize. In 2020–21, the IT
budget is $7.56 million and 41 full-time equivalents; however, we are going
over this budget by 29 additional full-time equivalents and an additional $3
million in non-salary dollars (mostly going to consultant work). |
Nadine |
2 |
4 |
Modernizing the office focuses on
improving our tools and use of technology, and our processes and practices. |
Where would you say
your office is at in term of adapting to new technology? |
The OAG has been
focusing on modernizing our IT. We are also training staff and creating a
modernization working group with a focus on new technologies (such as cloud,
data analytics, and blockchain) to audit and use for auditing purposes. The focus
has also been to expose staff to these technologies (for example, a pilot
project on the Mindbridge data analytics tool). We are also in the process of
acquiring a new audit tool that will include disruptive technology. |
The OAG is focused on
modernizing our IT environment and processes. We have established
an innovation unit in a partnership between audit services and IT representatives.
This unit aims to modernize audit approaches and the use of new technologies. Enterprise
architecture as a process is being implemented, and we are looking at how
best to adopt new technologies. Efforts continue in
order to increase digital awareness and the use of new technologies and ways
of working (such as, agile and design thinking). We are focusing on
upskilling our employees (additional funding request). |
Nadine |
|
||||||
2019–20 Departmental
Plan |
||||||
No. |
Page |
Reference |
Question/comment |
Answer: Last year |
Answer for 2020–21 |
Key contact |
1 |
6 |
We need to improve our governance
and management of our information technology (IT). We recently completed an
IT self-assessment and internal audit, both of which identified that we had
not maintained our IT security controls well enough. We also need to renew
the IT infrastructure that supports our audits. |
a) What
improvements do you need? |
From the 2017–18
Q&A (answer from Nadine): a) What
improvements? We need to renew
our older IT and manage our security risks related to our IT systems. For
example, our older technologies are presenting some connectivity issues in
the regions. Another example is our HR system. It is an older technology,
which is presenting both an operational and security risk. We also have to
prepare for the new IT policies that are in force as of 1 April 2018. For
example, there is a new requirement for a cloud-first approach. |
The OAG is focused
on modernizing our IT environment and processes. Older technology is
being updated. For example, progress was made to ·
update
and replace networking equipment ·
improve
connectivity for regional offices ·
increase
network bandwidth ·
replace
firewalls and the virtual private network (VPN) with an interim solution ·
deploy
new human resources and timesheet systems ·
update
the data storage system In addition, there are plans that
include modernization initiatives, such as adopting a modern Human Capital Management
System (HCMS), a modern financial system, and content management system, as
well as adopting data analytics capabilities. We are also working
to align with the strategic direction of the Government of Canada, including
the use of cloud services first. |
Nadine |
|
|
|
b) You received $8 million—Is
that enough to implement your IT plan? |
b) You received $8
million—is that enough to implement your IT plan? We will continue
our work on security compliance for tier 1 applications and systems (for example,
implementing security tools, self-assessment) and address some key support
and maintenance gaps (for example access and account management, maintaining
tier 1 application and systems compliance, and working on resolving key
technical issues with tier 1 systems). We will also replace some critical
end-of-life applications and systems (HR and timesheet system, data storage
system, and VPN/firewall). We will not be able
to complete the security self-assessment for all remaining (70+) applications
(all tier 2 and tier 3 applications and systems) |
The $8 million previously
received was invested to address critical end-of-life applications and
systems (HR and timesheet system, data storage system, and VPN/firewall). We
are also in the process of implementing important security tools. Additional funding
was requested in order to maintain legacy systems for existing operations and
to modernize. |
Nadine |
|
4 |
In addition, we are facing the
potential failure of some of our IT systems, with an immediate need to
replace our human resource management system. |
Is the $8 million sufficient
to cover this? What IT systems could potentially fail? |
From the 2017–18
Q&A (answer from Erin, Alain, and Nadine): Is the $8 million sufficient
to cover this? Refer to Q1-b. What IT systems
could potentially fail? Legacy systems that are no longer supported or that will be out of
support in the short or medium term. In addition, systems or
infrastructure that no longer meet the ever-increasing security requirements
of the Government of Canada, such as ·
HR
system ·
time
tracking system at the core of our audit management and operations ·
correspondence
management software (where we track inquiries from the public) ·
INTRAnet
search engine (to search for internal information) ·
IT
ticketing system ·
financial
system ·
firewall/VPN ·
document
management system ·
CODI
(to secure our electronic documents), which needs to be migrated ·
reports
system, which needs to be upgraded ·
editorial
services systems (which help with audit reporting) ·
OAG
learning management system (which tracks our employee training) Systems that need to be implemented as they fail to meet current or new
business needs or would favour a major cost savings: ·
Network
components need to be updated and bandwidth augmented to serve new
applications. ·
Internet
Protocol telephony would allow long-term savings compared with our current
telephone system. ·
Data
analytics tools are required to absorb the amount of data our auditors now
need to review. ·
Current
environmental petition system used by citizens is currently paper-based. ·
INTRAnet
platform. ·
Entities
database (to store knowledge and information from departments). ·
Internal
database systems need to be replaced and modernized (need an integrated and
accurate data model). In summary, we have
several factors that contribute to the revamping of our systems and
infrastructure: old legacy systems, systems that don’t meet new security
requirements, systems that no longer meet business requirements, new
technology that provides cost savings in the long run, becoming cloud-ready,
and so on. |
·
Examples
of back-end systems that need upgrades: o
Windows
server upgrades (2008) o
Oracle
Linux upgrades o
Database
upgrades (Oracle) o
.NET
Core upgrade (Development) ·
Examples
of applications that are end-of-life: o
auditing:
auditing working paper file (TeamMate) and report communication application
(CODI) o
communications:
correspondence tracking system o
HR:
applicant tracking system (Monster) o
finance:
financial system (GX) and product costing |
Nadine |
|
|
In 2019–20, we will complete the
replacement of our human resource management systems, begin to replace our
audit management software, and finalize a detailed IT maintenance and
operations plan. However, some IT systems that
will be at the end of their supported
lives in 2019–20 will not be replaced until 2021–22, and our management of IT security risk will not be
reduced to an acceptable level
until at least 2021. We will also not be able to
invest in new technologies or audit approaches that are necessary to prepare
the OAG for the future. |
Examples of
investments in new technologies that would be needed? Impact on your
business? |
Examples of investments
in new technologies that would be needed? Impact on your business? Systems that need
to be implemented as they fail to meet current or new business needs or would
favour a major cost savings: ·
Network
components need to be updated and bandwidth augmented to serve new
applications and increase connectivity with the regions and prepare for cloud
implementation. ·
Internet
Protocol telephony would allow long-term savings compared with our current
telephone system. ·
Data
analytics tools are required to absorb the amount of data our auditors now
need to review and bring efficiencies to corporate services groups. ·
INTRAnet
platform. ·
Entities
database (to store knowledge and information from departments). ·
Internal
database systems need to be replaced and modernized (need an integrated and
accurate data model). ·
Cloud. ·
Blockchain. ·
Artificial
intelligence (AI). In
summary, we have several factors that contribute to the revamping of our
systems and infrastructure: old legacy systems, systems that don’t meet new
security requirements, systems that no longer meet business requirements, new
technology that provides cost savings in the long run, becoming cloud ready,
and so on. |
New technologies
are being made available, such as ·
Power
BI for data analysis ·
collaboration
tools, including BlackBerry dynamics and Microsoft Teams New systems are
also needed, such as a new HR system, financial system, learning management
system, data analytics tools, and automation tools. The innovation unit
is also investigating the use of technologies such as ·
mobile
applications for both Android and iOS ·
microservices
and containers ·
voice
assistants, like Siri and Hey Google ·
Azure
Cognitive Services (AI / machine learning) |
Nadine |
|
|
|
|
|
|
|
2 |
6 |
We need to improve our governance
and management of our information technology (IT). We recently completed an
IT self-assessment and internal audit, both of which identified that we had
not maintained our IT security controls well enough. We also need to renew
the IT infrastructure that supports our audits. |
What is missing in
your IT security controls? |
What is missing in
your IT security controls? Our IT security
self-assessment found that we do not have the measures in place for our
systems to be safeguarded at an acceptable risk level. We looked at 17 families
of controls based on guidance from the centre (Canadian Security
Establishment). Currently, for our tier 1 systems, 90% of the primary IT
security controls are in place (202/224 tasks identified in action plan now
completed). For our other systems, there is a calendar in place that extends
to 2020 to conduct self-assessments and implement action plans. |
Security
The OAG’s
cybersecurity risk remains at an unacceptable level, but activities are
underway to resolve the most significant gaps by the end of the fiscal year
(March 2021) and be at an acceptable level of risk by December 2021. |
Nadine |
2 |
6 |
In 2019–20, we will complete the
replacement of our human resource management systems, begin to replace our
audit management software, and finalize a detailed IT maintenance and
operations plan. However, some IT systems that
will be at the end of their supported
lives in 2019–20 will not be replaced until 2021–22, and our management of IT security risk will not be
reduced to an acceptable level
until at least 2021. We will also not be able to invest
in new technologies or audit approaches that are necessary to prepare the
Office for the future. |
What is an
acceptable level? How far are you from being at an acceptable level? |
What is an
acceptable level? How far are you from being at an acceptable level? Our IT security self-assessment for critical systems revealed
that we were not managing security risks at a level acceptable to the OAG. We
did our annual assessment based on Treasury Board of Canada Secretariat and
Canadian Security Establishment guidance (ITSG‑33 controls) and chose a
particular security profile in order to test our controls. We are currently
conducting a self-assessment of all of our systems that has revealed
that we are not managing risks at a level acceptable to the OAG. We have a
staggered plan that will get us to an acceptable level by 2021. |
Security The OAG’s
cybersecurity risk remains at an unacceptable level, but activities are underway
to resolve the most significant gaps by the end of the fiscal year (March
2021) and be at an acceptable level of risk by December 2021. The OAG is
making significant investments to address cybersecurity risks. The OAG
employs the ITSG-33 controls developed by the Government of Canada to manage
these risks, which mirror those provided by the US National Institute of
Standards and Technology (NIST) and the NIST Cybersecurity Framework. The
long-term objective is to complete this investment and move to a sustainable
management program of maintaining an acceptable risk posture at a balanced
cost. |
Nadine |
2018–19 Departmental
Results Report |
||||||
No. |
Page |
Reference |
Question/comment |
Answer: Last year |
Answer: 2020–21 |
Key contact |
1 |
6 |
We have been working to implement
both the plan we developed last year to reduce our information technology
(IT) security risk and the roadmap we prepared to maintain and update our IT
systems. We advanced the replacement of our human resource management
systems, which we will complete in the 2019–20 fiscal year. Although we
made progress on some projects for IT security, we do not expect to reduce
our risk to an acceptable level until at least 2021, because of funding
pressures. Similarly, we have had to postpone other IT projects until the
2019–20 fiscal year and beyond, also because of funding pressure. |
See above |
See above |
See above |
Nadine |
2 |
49 |
Some IT security and applications
projects were not completed, owing to a lack of resources. One of four
financial audit efficiency projects was not complete. |
What projects were
delayed? |
N/A |
Projects delayed for
this fiscal year (2020–21) include 4 projects that will move into next year,
including the audit working paper file replacement and C2 replacement, the data
program management, and the security self‑assessment. This list of
projects that were delayed because of a lack of resources in 2018–19 includes ·
time
sheet renewal ·
HR management information system (HRMIS) ·
VPN
and main firewall ·
Network
Access control (NAC) ·
survey
tool ·
business
data model ·
OAG
client connect |
Nadine |
2017–18 Departmental
Results Report |
||||||
No. |
Page |
Reference |
Question/comment |
Answer: Last year |
Answer: 2020–21 |
Key contact |
|
7 –exhibit 1 |
IT Roadmap and multi-year IT
security self-assessment plan |
What are those? What progress has been made in
implementing the roadmap and the IT security plan? |
The IT Roadmap is a tool that
provides the OAG with a holistic view of all OAG systems and applications. It
is used to select the investments that will maximize the use of our IT
capacity while minimizing risk and addressing the highest business value
first. Features of the tool include ·
a
mapping of the recommended renewal and replacement lifecycle for each
application and system ·
forecasted
costs, IT developer capacity and business capacity to renew or replace
according to lifecycle ·
indicators
to help decisionmakers, such as end-of-life, manual process replacements,
pilots, and so on Business processes supported by
the tool include ·
strategic
planning and prioritization of projects based on risk, capacity, and business
need ·
transparent
and informed consultation with the business, aligning IT priorities with
business imperatives ·
short-term
planning, such as work plans, annual and quarterly budget reviews, and so on ·
medium-term
planning, such as 3- to 5-year investment plans and risk management
plans ·
compliance,
risk, and security assessments ·
enterprise
architecture planning and design ·
procurement
planning ·
IT
competencies development plan and succession planning The IT Roadmap was completed in
2017 and is currently used to support the processes listed above. Pursuant
to Treasury Board policy, the OAG must conduct an annual assessment of its IT security program and practices to monitor
compliance with government and departmental security policies and standards
using the IT Security Self‑Assessment methodology and guidance
developed by the Treasury Board of Canada Secretariat and the Canadian
Security Establishment. The purpose of an IT Security self‑assessment is
to help identify IT security deficiencies and recognize and implement
remedial action. On the basis of the results of the self-assessment,
departments must develop or update their IT security action plan and
determine the resources required to implement it. The OAG IT Security Self-Assessment Plan was developed following our
IT security self-assessment on OAG critical systems. We have implemented 98%
of the plan related to our assessment of OAG critical systems. The 2% that
still needs to be implemented is the acquisition of a new monitoring tool and
the completion of our security architecture. For the other OAG systems, we
will be conducting self‑assessments and developing implementation plans
that will be staggered for the next 3 years. |
We continue to leverage tools
such as the roadmap, and we have moved to align with Treasury Board of Canada
Secretariat direction and are conducting annual aging assessments on
applications based on the recommended TIME methodology. This analysis is a
primary input to the 3-year plan. Processes are also being revisited including
project management, IT investment planning, and performance management. |
Nadine |
|
9 |
… we noted that we are facing the
potential failure of some of our IT systems… Both the IT security plan and the
new HR management system will require additional resources to complete, some
of which we expect to come from the Budget 2018 increase to our funding. |
Elaborate on which systems and
potential impact on OAG’s operations Elaborate on additional funding
received and the extent to which it was used for IT security and HR systems. |
Which systems and potential
impacts on OAG’s operations We need to renew our older IT and
manage our security risks related to our IT systems. For example, our older
technologies are presenting some connectivity issues in the regions. Another
example is our HR system. It is an older technology, which is presenting both
an operational and security risk. Other systems that are no longer
supported or that will be out of support in the short or medium term, or that
no longer meet the security requirements, are as follows: ·
HR
system (as mentioned above) ·
time
tracking system (this is at the core of our audit management and operations) (addressed 2018–19) ·
correspondence
management software ·
INTRAnet
search engine ·
C2
(IT ticketing system), for 2021–22 ·
financial
system—for? ·
VPN
(addressed 2018–19) ·
firewall
(addressed 2018–19) ·
CODI
(document management system) ·
editorial
services systems ·
OAG
learning management system (to track our employee training) Additional funding received and
the extent to which it was used for IT security and HR system Additional funding is being used
to continue our work on security assessment and implementing our action
plans. Additional funding is also being used to replace some critical
end-of-life applications and systems (HR and timesheet system, data storage
system, and VPN/firewall). It is important to note that we
will continue to have a resource deficit as a result of at-risk applications
and systems (increased support requirements due to systems not being
adequately maintained, properly tested, inadequate knowledge transfer as
staff retire), services will continue to degrade as more resources are
redirected to support and maintain aging systems (business process
automation, corporate reporting, and so on), and we will not be able to
deliver 60% of the projects recommended on the applications and systems
roadmap (other end-of-life systems, systems required for treasury board
compliance, and so on) or invest in new technologies such as disruptive
technologies. |
See above |
Nadine |