Text of Recommendation | Complete an assessment of information security risks related to the identified deficiencies and document a corresponding priority listing to address identified information security deficiencies and their associated recommendations. A corrective action plan should be developed that documents the priorities and timing requirements to address these deficiencies (Risk Management iv/v/vi). |
---|---|
Recommendation Number | 8 |
Recommendation Status | Open |
Significant Recommendation | Yes |
Submitting OIG | |
---|---|
Linked Report |