|Text of Recommendation|| |
Complete an assessment of information security risks related to the identified deficiencies and document a corresponding priority listing to address identified information security deficiencies and their associated recommendations. A corrective action plan should be developed that documents the priorities and timing requirements to address these deficiencies (Risk Management iv/v/vi).
|Recommendation Number|| |
|Recommendation Status|| |
|Significant Recommendation|| |