Text of Recommendation | The Chief Information Officer should ensure that privileged access scans are completed on required devices to determine the full extent of vulnerabilities affecting the installed operating systems and applications. |
---|---|
Recommendation Number | 6 |
Recommendation Status | Closed |
Significant Recommendation | No |
Submitting OIG | |
---|---|
Linked Report |