Text of Recommendation | Complete and document a risk-based justification for not implementing an automated solution (e.g. Splunk) to help maintain an up-to-date, complete, accurate, and readily available view of the security configurations for all information system components connected to the organization’s network. |
---|---|
Recommendation Number | 7 |
Recommendation Status | Closed |
Significant Recommendation | Yes |
Submitting OIG | |
---|---|
Linked Report |