Stay Informed
of New Reports
Twitter
Where To Report Waste
Fraud, Abuse, Or Retaliation
Where To Report Waste Fraud, Abuse, Or Retaliation
Recommendation Details
Text of Recommendation
Collaborate with the vendor of the Agency’s information security weakness tracking system to determine whether audit logging to capture “all data changes” is an available security feature within the Agency’s information security weakness tracking system and, if so, activate the audit log settings to capture all data changes. If audit logging is not available, establish compensating controls within the Agency’s information security weakness tracking system that would record or describe what data has been changed.
Recommendation Number
19-P-0158_3
Recommendation Status
Open
Significant Recommendation
No
Recommendation Questioned Costs
$0
Recommendation Funds for Better Use
$0