A recent internal Canada Revenue Agency (CRA) audit reveals that computer security at the agency continues to be poorly monitored, despite growing cyber threats that auditors say pose risks to taxpayers’ information.
“There was a lack of monitoring,” the report said, with auditors highlighting “a lack of management oversight.”
CRA managers “were not always aware of or did not clearly understand the security assessment and authorization process, more specifically for monitoring,” the report said.
The auditors emphasized the need to enhance security across multiple domains. This includes strengthening corporate policy instruments, defining roles and responsibilities more clearly, refining authorization procedures, improving the monitoring of performance indicators, and implementing formal procedures and tools.
According to the audit, the CRA has one of the most extensive IT environments and repositories of personal and financial information within the government of Canada. During the fiscal year 2020 to 2021, a substantial 90.2 percent of income tax and benefit returns, as well as 94.2 percent of corporate income tax returns, were submitted digitally.
“It is essential for the CRA to meet Canadians’ expectations for delivering client service while maintaining trust that their information will be protected from potential data breaches and identity theft,” the report said.
Marc Brouillard, the government’s chief technology officer at the time, defended the CRA’s response, asserting that the system worked efficiently, enabling the identification of fraudulent transactions.
“We have thousands of transactions every day,” Mr. Brouillard said in 2020, according to Blacklock’s Reporter. When asked about whether the cyberattacks indicated a “total failure” in security, he responded, “I would argue no, quite the opposite.”
The audit provided a series of suggestions, among them being the recommendation that the Security Branch should establish a centralized monitoring strategy for system authorization across the CRA to document security decisions based on risk.
“Addressing security in the early stages of information technology projects and throughout the information system’s life cycle is vital to ensuring security is integrated into the design, that security objectives are met and that planning and resources are optimized,” said the report.