Text of Recommendation | Implement critical security patches within prescribed timelines, remediate vulnerabilities through configuring the software (e.g., turning off or limiting access to ports or services), or obtain and document the open vulnerabilities in a Plan of Action and Milestones. |
---|---|
Recommendation Number | 7 |
Recommendation Status | Closed |
Significant Recommendation | No |
Recommendation Questioned Costs | $0 |
Recommendation Funds for Better Use | $0 |
Submitting OIG | |
---|---|
Linked Report |