Enterprise-wide Risk Assessment Audit of NARA’s Internal Controls
Cotton & Company LLP independent report on the NARA's enterprise-wide risk assessment of internal controls and the risks to NARA’s mission, operations, and procedures.
United States
Cotton & Company LLP independent report on the NARA's enterprise-wide risk assessment of internal controls and the risks to NARA’s mission, operations, and procedures.
The objective of this audit was to determine NARA's compliance with improper payment requirements based on Office of Management and Budget Memorandum 15-02 and OMB Circular A-136.
The audit assessed the effectiveness and adequacy of management controls in place for refiles of IRS records at six FRCs: Atlanta, Dayton, Kansas City, Kingsridge, Lee’s Summit, and Lenexa.
The objective of this audit was to review the preparation and planning for the transfer of the Obama Administration’s records.
The objective of this audit was to evaluate the security of NARA’s publicly-accessible websites. We also evaluated NARA’s progress toward implementing Hypertext Transfer Protocol Secure on all of its websites as required by Office of Management and Budget Memorandum M-15-13, and verified NARA...
The NARA Office of Inspector General engaged, CliftonLarsonAllen LLP, to audit the consolidated financial statements of National Archives andRecords Administration.
The OIG's audit of the NARA) Refile Processes in Federal Records Centers assessed the effectiveness and adequacy of management controls in place for the refile processes at selected FRCs.
The NARA Office of Inspector General engaged, CliftonLarsonAllen LLP, to conduct an audit in support of the FISMA requirement for an annual evaluation of NARA’s information security program. The objective of this performance audit was to determine whether NARA implemented selected security and...
This is a summary of the complete audit report. The Inspector General has determined publically releasing the complete audit report would unacceptably increase the risk to the agency’s information technology systems by disclosing too much information on persistent security deficiencies.