Deficiencies in the EPA’s information technology internal controls could be used to exploit weaknesses in Agency applications and hinder the EPA’s ability to prevent, detect, and respond to emerging cyberthreats.
Report File
Date Issued
Submitting OIG
Environmental Protection Agency OIG
Other Participating OIGs
Environmental Protection Agency OIG
Agencies Reviewed/Investigated
Environmental Protection Agency
Report Number
21-E-0124
Report Description
Report Type
Audit
Agency Wide
Yes
Number of Recommendations
5
Questioned Costs
$0
Funds for Better Use
$0
Open Recommendations
This report has 1 open recommendations.
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
21-E-0124_1 | No | $0 | $0 | ||
Update information security procedures to make them consistent with current federal directives, including the National Institute of Standards and Technology Special Publication 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations. |