Internal Audit of the Personnel Security Screening Process - Internal Audit Report
Presented by Internal Audit Directorate
September 26, 2023
Table of Contents
- Executive Summary
- Background
- Audit Objective, Scope, Criteria, and Approach
- Overall Opinion and Statement of Conformance
- Summary of Findings
- Management Response and Action Plans
- Appendix A – Compliance Testing Results
- Appendix B – Sampling Strategy
- Appendix C – Key Information Reviewed
- Appendix D – Risk Ranking Methodology
Executive Summary
The Audit of Personnel Security Screening Process was authorized as part of the Department of Finance Canada's (the Department) 2022-2023 Risk-based Audit Plan, which was approved by the Deputy Minister on June 29, 2022.
What we examined
The objective of this audit was to provide reasonable assurance that the Department's personnel security screening process' internal controls are effective and efficient, and that the process is compliant with applicable policies.
Why it is important
Employees at the Department require access to sensitive information to perform their work in support of providing strategic analysis and advice to the Minister of Finance. Effective personnel security screening can provide some level of reassurance that employees can be trusted to safeguard government information, assets and facilities, and to reliably fulfill their duties.
What we found
Up to the granting of a security clearance, the Department has effective controls in place for the personnel security screening process. However, significant control weaknesses were identified regarding the close-out of the process.
Areas of improvement were identified with respect to the overall efficiency of the personnel security screening process. Given the context of the remote work period, processing delays by other involved organizations, and the current resources assigned to the process, these findings are not unexpected.
Also, the Department's personnel security screening process is not compliant with some applicable Treasury Board policy suite requirements. The Department does not currently have a Departmental Security Plan and a security delegation instrument.
The following table summarizes the overall findings and the associated risk to the Department:
Overall Findings | Risk | Policy Requirement (Y/N) |
---|---|---|
The Department currently has no Departmental Security Plan. | High | Y |
The Department currently has no security delegation instrument to document decision-making authorities. | Medium | Y |
No tracking is currently being done to ensure that all employees have attended the Department's mandatory security briefing. | Medium | Y |
Security certificates (TBS form 330-47) were generally not signed in a timely manner or were not signed at all. | Medium | Y |
Notifications to the Canadian Security Intelligence Service (CSIS) regarding the status of security clearances issued were generally not sent in a timely manner or were not sent at all. | Medium | Y |
No exit security debriefs are being conducted for employees leaving the Department. | Medium | Y |
The security screening process is currently paper-based, which resulted in a large backlog of files waiting to be processed during the remote-work period caused by the COVID-19 pandemic. | Medium | N |
Transfer-in security files of employees coming from other departments were either never received by the Department, received significantly after the date requested, or were incomplete. However, the audit team was able to confirm that the employees did have a valid security clearance. | Medium | N |
Personnel security officers have checklists to ensure completeness of files but do not use the checklists effectively. | Medium | N |
There is limited communications to managers and employees reminding them of their security-related responsibilities. | Medium | N |
The Departmental Security Policy was last revised in 2011 and contains outdated information. | Medium | N |
A significant amount of time is spent on manual data entry by personnel security officers. | Low | N |
An agreement is in place with CSIS to prioritize security assessments for candidates hired through the University Recruitment and Advanced Policy Analyst Program processes. This agreement is not formally documented. | Low | N |
The Department's main forum for discussing sensitive security-related issues has stopped meeting. Meetings between the Department's key security officials currently take place informally. | Low | N |
Marie-Josée Yelle
Acting Chief Audit Executive
Background
Within the Department of Finance Canada (the Department), employees are required to access protected and/or classified information to perform their work in support of providing strategic analysis and advice to the Minister of Finance. To reduce the risk that protected and/or classified information is inappropriately accessed, used or shared, the Government of Canada has established security controls and policies, including policies related to personnel security screening.
Personnel security screening involves the collection of personal information from individuals, with their informed consent, and information from law enforcement, intelligence sources, and other sources and methods to assess an individual's reliability and loyalty to Canada. Effective personnel security screening can provide some level of reassurance that employees can be trusted to safeguard government information, assets and facilities, and to reliably fulfill their duties.
The management of personnel security screening is primarily governed by the Treasury Board's (TB) Policy on Government Security, Directive on Security Management, and Standard on Security Screening (Standard). The objective of the Standard is to ensure that security screening in the Government of Canada is conducted in a way that is effective, efficient, rigorous, consistent and fair to provide reasonable assurance that individuals can be trusted to safeguard government information and assets and can reliably conduct their work duties, as well as to enable transferability of security screening between departments and agencies.
The Standard also defines the following security status and clearances:
- Reliability status is the minimum standard of security screening for positions requiring unsupervised access to Government of Canada protected information, assets, facilities or information technology systems.
- Secret clearance is the standard of security screening for all positions requiring access to Government of Canada information, assets, facilities or information technology systems classified as Secret.
- Top Secret clearance screening is conducted for positions requiring access to top secret Government of Canada information, assets, facilities or IT systems.
Given the sensitive nature of information within the Department, all its employees are required to have a minimum of a Secret clearance.
Within the Department, the Assistant Deputy Minister, Corporate Services Branch (CSB), has been designated as the Department's Chief Security Officer. The Security Services Division (SSD), within the Human Resources and Security Directorate of CSB, is responsible for the personnel security screening process. In addition, SSD is responsible for security incident management, emergency preparedness, ministerial security, physical security, security event management, business continuity management, and security in contracts and other arrangements. At the time of the audit, the SSD team consisted of five (5) full-time employees (FTEs), with one (1) FTE dedicated full-time to personnel security screenings.
The following government departments also play a role in the security screening process:
- The Canadian Security Intelligence Service's (CSIS) Government Security Screening program investigates and provides security assessments for persons requiring Secret or Top Secret level security clearances as part of their employment.
- The Royal Canadian Mounted Police (RCMP) is responsible for performing the criminal record check portion of the personnel security screening.
Audit Objective, Scope, Criteria, and Approach
Audit Objective and Scope
Audit Objective:
- The objective of this audit engagement was to provide reasonable assurance that the Department of Finance Canada's (the Department) personnel security screening process' internal controls are effective and efficient, and that the process is compliant with applicable policies.
Audit Scope:
- The audit scope included an assessment of the key controls pertaining to the personnel security screening process, as well as a review of personnel security screening transactions (assignment, renewal, and revocation of security clearances) between April 1, 2019, and September 30, 2022.
- The scope did not include:
- Processes for site access screenings, used for individuals external to government who do not require access to sensitive information but require access to restricted or controlled government facilities.
- Parts of the personnel security screening process that are owned by other federal organizations (for example, the Canadian Security Intelligence Service and the Royal Canadian Mounted Police).
- Other preventative, detective or corrective controls that are part of an Insider Risk Program.Footnote 1
- The efficiency and effectiveness of the Department's Human Resources staffing processes.
- An assessment of compliance against policy suite requirements not related to personnel security screening.
Audit Criteria
Criterion 1: The Department's personnel security screening process' internal controls are effective; and are in compliance with the Treasury Board (TB) Policy on Government Security, Directive on Security Management, and Standard on Security Screening.
Criterion 2: Personnel security screenings are processed effectively and efficiently.
Audit Approach
In conducting this audit we:
- Reviewed relevant documentation such as legislation, policies and guidance, administrative agreements, and departmental guidance.
- Interviewed personnel from the Corporate Services Branch.
- Identified key controls and developed process maps.
- Tested a judgmental sample of 46 personnel security files from the period examined to assess compliance with relevant legislation, policies, and guidance.
- Performed benchmarking against other federal departments and agencies.
Overall Opinion and Statement of Conformance
Overall Opinion
Sufficient and appropriate procedures were performed, and evidence gathered to support the accuracy of the audit conclusion. The audit findings and conclusion are based on a comparison of the conditions that existed as of the date of the audit against established criteria that were agreed upon with management.
The findings and conclusion are only applicable to the entities examined and for the scope and time period covered by the audit.
Statement of Conformance
The audit was conducted in conformance with the International Standards for the Professional Practice of Internal Auditing, as supported by the results of the quality assurance and improvement program.
Summary of Findings
Key Findings − Note
Given the current resources within the Security Services Division assigned to the personnel security screening process, the internal audit team has issued a formal recommendation for findings non-compliant with policy. Where a formal recommendation has been issued, management has developed a Management Action Plan (MAP). The Internal Audit Directorate (IAD) will follow-up on these MAPs to ensure that they have been implemented.
The IAD will not follow-up on areas of consideration on the overall efficiency and effectiveness of the process as it is management's prerogative to risk-manage these areas.
Key Findings − Criterion 1
We expected to find that the Department of Finance Canada's (the Department) personnel security screening process' internal controls are effective; and are in compliance with the Treasury Board (TB) Policy on government Security, Directive on Security Management, and Standard on Security Screening.
The internal audit team found that the three (3) major verifications that take place during the security screening (criminal record check, credit check and the Canadian Security Intelligence Service (CSIS) security assessment) were conducted 100% of the time in the files that were reviewed. The internal audit team also noted that when adverse informationFootnote 2 was uncovered or information was incomplete, that there are processes in place to conduct security interviews when necessary or to obtain missing information. The following table outlines findings, as well as recommendations for management's action:
Findings | Recommendations | Risk |
---|---|---|
The Deputy Minister (DM) is responsible for approving a three-year Departmental Security Plan (DSP) that is reviewed annually, sets out strategies for meeting departmental security requirements reflective of and contributing to government-wide security priorities, and addresses required security controls. The Department previously had a 2019-21 DSP that was approved by the DM in January 2020. At the time of the examination phase work completed by the audit team, there was no current DSP in place. [This information has been severed.] The Corporate Services Branch has hired a consultant to develop a DSP and is aiming to have one drafted by Spring 2023. The Chief Security Officer (the Assistant Deputy Minister, Corporate Services Branch) is required to report annually to the DM on the progress made against the priorities defined in the DSP. Given that there is no current DSP in place, there has been no annual reporting to the DM. Reviewing and reporting annually on the DSP allows departments to demonstrate that appropriate governance is in place to provide a comprehensive understanding of security management, security priorities, and risk mitigations throughout the organization and provides the opportunity to course-correct or re-prioritize activities as needed. |
The Chief Security Officer should develop a three-year Departmental Security Plan (DSP), have it approved by the Deputy Minister (DM), and report annually to the DM on the progress made against its priorities. | High |
The Chief Security Officer has responsibilities to define and document security related roles, responsibilities and decision-making authorities to ensure consistency, efficiency and maintaining compliance with relevant legislation. The Department currently has no security delegation instrument in place. |
The Chief Security Officer should create a security delegation instrument and have it approved by the Deputy Minister. |
Medium |
Employees are required to attend a mandatory security briefing when they join the Department and then acknowledge their responsibilities by signing a security certificate (Treasury Board Secretariat form 330-47). There is currently no tracking being done to ensure that all employees at the Department have attended the mandatory briefing. The internal audit team noted from the files reviewed that, generally, security certificates were not signed by employees, or not signed on a timely basis. This increases the risk that employees may not be aware of their responsibilities towards the protection of information with regards to their security clearance. [This information has been severed.] |
The Chief Security Officer should improve the controls in place to ensure that all employees receive the mandatory security briefing and acknowledge their responsibilities by signing their security certificate. |
Medium |
The Department is responsible for notifying the Canadian Security Intelligence Service (CSIS) when new security clearances are granted (CSIS form 4195) or when there has been a change in security clearance, such as a transfer, a downgrade, an upgrade or a re-activation (CSIS form 4160). The internal audit team noted, from the files reviewed, that notifications to CSIS were not sent in a timely manner or were not sent at all. [This information has been severed.] |
The Chief Security Officer should improve the controls in place to ensure that personnel security officers are notifying CSIS in a timely manner when a clearance is granted (CSIS form 4195) or an employee security file is transferred between departments, downgraded, upgraded or re-activated (CSIS form 4160). |
Medium |
The Department is responsible for providing a formal debriefing to employees who are leaving the Department to remind them of their continuing responsibilities to maintain the confidentiality of the sensitive information to which they previously had access to. The internal audit team noted that no exit security debriefs were currently being conducted. There is currently a risk that employees can leave the department and not be aware of their continued responsibilities for the protection of information for which they had access to at the Department and may divulge sensitive information. |
The Chief Security Officer should ensure that a process is put in place to debrief employees of their continued security responsibilities prior to leaving the Department. |
Medium |
Key Findings − Criterion 2
We expected to find that personnel security screenings are processed effectively and efficiently.
Areas of improvement were identified with respect to the efficiency and effectiveness of the security screening process as a whole. The following table outlines the internal audit team's findings as well as some suggestions for management's consideration.
Findings | Areas of Consideration | Risk |
---|---|---|
The Department's security screening process is paper based. Following the onset of the COVID-19 pandemic and the remote work orders, the Security Services Division (SSD) stopped processing certain types of transactions as they were working from home and did not have access to printers, thus creating a large backlog of files that needed to be processed in person. It was also observed during file reviews that printing the personnel security files was very time consuming, given that several of the reports generated during the screening process were already in digital format. From outreach done to other government departments, the internal audit team noted that several departments have switched to digital files and are accepting digital signatures on security screening forms in order to increase efficiency in the new hybrid work environment. This also increased efficiency in the ability to transfer files to other departments once an employee had transferred to a different department. |
The Chief Security Officer may consider working towards the digitization of all personnel security files and use digital signatures where possible. The Chief Security Officer should ensure that the backlog of transfer-in and transfer-out files to other departments is cleared on a regular basis. | Medium |
Transfer-in security files of employees coming from other departments were either never received by the Department, received significantly after the date requested, or were incomplete. However, the audit team was able to confirm that the employees did have a valid security clearance. The internal audit team noted that some departments redo the reliability status for all transfer-in employees. Ensuring that the employee has no adverse results on a criminal record check or credit check reduces the risk to the Department that the employee may divulge sensitive information in exchange for money. |
The Chief Security Officer may consider redoing the reliability status of federal employees transferring in from other departments using a risk-based approach. | Medium |
Checklists are used by personnel security officers to document that all required steps in the process have been completed. Checklists can be an effective tool in ensuring that all steps of a process have been completed. From a review of personnel security files, the internal audit team noted that the checklists were often not signed, dated, or they noted that certain steps of the process had been completed when in fact they had not. The internal audit team also noted that the checklists were generally completed by a junior member of the Security Services Division (SSD). |
The Chief Security Officer may consider incorporating a monitoring process conducted by a more senior employee to review completeness of files. |
Medium |
Managers have responsibilities to ensure that their employees have been informed of their security responsibilities. Managers also have responsibilities for monitoring their employees for significant changes in behaviour and reporting these changes to SSD. Employees have responsibilities to notify SSD of changes in personal circumstance, persistent or unusual contact, or any unusual behaviours of other individuals. The internal audit team found that there is limited communications to managers and employees reminding them of their responsibilities regarding personnel security. |
The Chief Security Officer may consider increasing security awareness throughout the Department, including roles and responsibilities. |
Medium |
The Departmental Security Policy was last revised in 2011 and contains outdated information. Not having an up-to-date policy increases the risk that roles, responsibilities and overall security-related objectives are not clearly defined and understood. |
The Chief Security Officer may consider reviewing and updating the Department's Security Policy. |
Medium |
There is a significant amount of time spent by personnel security officers doing manual data entry. Not only is this time consuming, but manual data entry increases the risk of human input errors. From outreach to other government departments, it was noted that several departments have already implemented, or are looking to implement, digital form submission portals. This would reduce the need for manual data entry, the submission of incomplete forms, and the subsequent back and forth between the personnel security officer and the applicant. |
The Chief Security Officer may consider exploring options to implement a new automated security screening system to reduce the need for manual data entry from security screening forms. |
Low |
Significant delays in the screening process are caused by a backlog at CSIS in conducting security assessments. The Department has a special agreement with CSIS to give priority to the security assessment for candidates hired through the University Recruitment (UR) program and the Advanced Policy Analyst Program (APAP). This agreement is informal and is not documented. Given high turnover at CSIS, there is a risk that this agreement may not carry forward if certain employees with CSIS leave their positions. |
The Chief Security Officer may consider formalizing a written agreement with CSIS. |
Low |
Formalizing governance structures and documenting decisions assists in holding individuals accountable for decisions and in ensuring appropriate follow-up action can be taken. The Department of Finance Security Coordinating Committee (FINSCC), the Department's main forum for discussing sensitive security-related issues, has stopped meeting. Meetings between key security officials are now taking place informally. Given that no records of these meetings are kept, the internal audit team was unable to conclude on the effectiveness of oversight. |
The Chief Security Officer may consider reformalizing the governance of the Department's security program. |
Low |
Overall Conclusion
Up to the granting of a security clearance, the Department of Finance Canada (the Department) has effective controls in place for the personnel security screening process. However, significant control weaknesses were identified regarding the close-out of the process.
Areas of improvement were identified with respect to the overall efficiency of the personnel security screening process. Given the context of the remote work period, processing delays by other involved organizations, and the current resources assigned to the process, these findings are not unexpected.
Also, the Department's personnel security screening process is not compliant with some applicable Treasury Board policy suite requirements. The Department does not currently have a Departmental Security Plan and a security delegation instrument.
Management Response and Action Plans
Overall Management Response:
Management agrees with the findings of the Audit of the Personnel Security Screening Process. The Chief Security Officer will work with the Security Services Division to ensure that audit recommendations are addressed through corrective actions, as described below.
Recommendation | Management Response | Action Plan | Lead | Target Date |
---|---|---|---|---|
1. The Chief Security Officer should develop a three-year Departmental Security Plan (DSP), have it approved by the Deputy Minister, and report annually to the Deputy Minister on the progress made against the priorities defined in the DSP. | Management agrees with the recommendation. | The Chief Security Officer (CSO) will develop a three-year Departmental Security Plan (DSP) and submit it for Deputy Minister approval. The CSO will also report annually to the Deputy Minister on progress made against the priorities defined in the approved DSP. | Chief Security Officer, Assistant Deputy Minister – Corporate Services Branch |
Three-year Departmental Security Plan: October 31, 2023 First annual progress report to Deputy Minister: March 31, 2025 |
2. The Chief Security Officer should create a security delegation instrument and have it approved by the Deputy Minister. | Management agrees with the recommendation. | The Chief Security Officer will develop a security delegation instrument and present it to the Deputy Minister, for approval. | Chief Security Officer, Assistant Deputy Minister – Corporate Services Branch |
September 30, 2023 |
3. The Chief Security Officer should improve the controls in place to ensure that all employees receive the mandatory security briefing and acknowledge their responsibilities by signing their security certificate. |
Management agrees with the recommendation. |
The Director, Security Services Division (SSD), will integrate enhanced controls in the departmental onboarding process to ensure that all employees have received the mandatory security briefing and acknowledged their responsibilities by signing their security certificate. The Director, SSD, will provide an annual report of results achieved to the Deputy Chief Security Officer. |
Director, Security Services Division |
March 31, 2024 |
4. The Chief Security Officer should ensure that a process is put in place to debrief employees of their continued security responsibilities prior to leaving the Department. |
Management agrees with the recommendation. |
The Director, Security Services Division (SSD), will develop and implement a process to ensure that employees receive a briefing on their continued security responsibilities prior to leaving the Department. The Director, SSD, will provide an annual report of results achieved to the Deputy Chief Security Officer. |
Director, Security Services Division |
March 31, 2024 |
5. The Chief Security Officer should improve the controls in place to ensure that personnel security officers are notifying the Canadian Security Intelligence Service (CSIS) in a timely manner when a clearance is granted (CSIS form 4195) or an employee security file is transferred between departments (CSIS form 4160). |
Management agrees with the recommendation. |
The Director, Security Services Division (SSD), will adapt existing operating procedures and improve controls in place to ensure that personnel security officers notify CSIS in a timely manner when clearance is granted or when an employee security file is transferred between departments. The Director, SSD, will provide an annual report of results achieved to the Deputy Chief Security Officer. |
Director, Security Services Division |
March 31, 2024 |
Appendix A – Compliance Testing Results
Test Criteria – New clearances and Renewals | Transactions tested | Files with issues | Additional Information |
---|---|---|---|
Applicant completed and signed security screening form providing consent to conduct the security screening (TBS form 330-23) | 31 | 3 |
|
Applicant completed and signed 330-60 | 31 | 4 |
|
Criminal record check completed | 31 | 0 |
|
Credit check completed | 31 | 0 |
|
When adverse information is uncovered, further investigation is completed | 1 | 0 |
|
Personnel Security Officer granted reliability status | 31 | 2 |
|
CSIS security assessment completed | 31 | 0 |
|
Personnel Security Officer granted security clearance | 31 | 2 |
|
CSIS was notified of decision to grant a security clearance (CSIS form 4195) | 31 | 2 |
|
Employee received a mandatory security briefing | 31 | Unable to assess |
|
Employee acknowledged their responsibilities by signing a security certificate (TBS form 330-47) | 31 | 19 |
|
Test Criteria – Transfer-In Employees | Transactions tested | Files with Issues | Additional Information |
---|---|---|---|
The Department received an initial security clearance confirmation from the originating department | 12 | 1 |
|
The Department requested the transfer of the personnel security file | 12 | 0 |
|
The file was received | 12 | 2 |
|
The file transferred was complete (included credit check, criminal record check, and CSIS assessment) | 10 | 5 |
|
CSIS was notified of employee's transfer (CSIS form 4160) | 10 | 2 |
|
Employee received a mandatory security briefing | 12 | Unable to assess |
|
Employee acknowledged their responsibilities by signing a security certificate (TBS form 330-47) | 12 | 12 |
|
Test Criteria – Transfer-Out Employees | Transactions tested | Files with Issues | Additional Information |
---|---|---|---|
CSIS was notified of employee's transfer (CSIS form 4160) | 3 | 0 |
|
The Department transferred the personnel security file to the requesting Department | 3 | 0 |
|
Appendix B – Sampling Strategy
The internal audit team identified a population of 510 new and renewal security clearances, a population of 484 transfer-in security clearances and a population of 264 transfer-out security clearances for the period of April 1, 2019 to September 30, 2022.Footnote 3
- For the new and renewal security clearances, out of the 510 security clearance files, 30 were selected using a judgemental random sampling method.Footnote 4
- For the transfer-in security clearances, out of the 484 security clearance files, 12 were selected using a judgemental random sampling method.
- For the transfer-out security clearances, out of the 264 security clearance files, 3 were selected using a judgemental random sampling method.
The sample and population distribution is as follows:
StratificationFootnote 5 | Sample Count | Population Count | ||||||
---|---|---|---|---|---|---|---|---|
April 1, 2019 - March 15, 2020 | March 16, 2020 - May 3, 2020 | May 4, 2020 - August 31, 2020 | September 1, 2020 - September 30, 2022 | April 1, 2019 - March 15, 2020 | March 16, 2020 - May 3, 2020 | May 4, 2020 - August 31, 2020 | September 1, 2020 - September 30, 2022 | |
New and renewal security clearances | 6 | 3 | 6 | 16 | 195 | 20 | 39 | 256 |
Transfer-in security clearances | 4 | 8 | 138 | 346 | ||||
Transfer-out security clearances | 3 | 264 | ||||||
Total | 45 | 1258 |
Appendix C – Key Information Reviewed
Key Information Reviewed
The following is a non-exhaustive list of key information reviewed by the internal audit team:
Legislation, policies and guidelines:
- Treasury Board (TB) Policy on Government Security
- TB Directive on Security Management
- TB Standard on Security Screening
Documents specific to Department of Finance Canada:
- Departmental Security Policy (2011)
- 2019-21 Departmental Security Plan
- Department of Finance Management Accountability Framework Departmental Reports (2020-21 and 2021-22)
- Department of Finance Canada's Threat Risk Assessments
- Departmental of Finance governance committee documentation, such as Terms of Reference and records of decision
- Security Services Division internal process documentation
Other Documents:
- Canadian Security Intelligence Service's Insider Risk Program Reference Guide
Appendix D – Risk Ranking Methodology
The risks assigned to the findings were based on the Internal Audit Directorate's own assessment of the risks. The following table defines the criteria used in assigning risk/priority:
High-Risk Zone | Risks that significantly exceed the risk acceptance threshold and need extensive management and, in some cases, urgent action. |
---|---|
Medium-Risk Zone | Risks that exceed the risk acceptance threshold and require proactive management. |
Low-Risk Zone | Risks that are below the risk acceptance threshold and do not generally require active management. |
Page details
- Date modified: