We determined that USDA’s IT security directives are not sufficiently relevant and effective to address recent threats, as they are not consistently updated and some are similar in content or function, resulting in potential risks to USDA’s IT security posture.
Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 1 | Yes | $0 | $0 | ||
| Document and implement a process to identify, prioritize, track and communicate changes in cybersecurity requirements, threats, technology, and organizational mission as they occur to facilitate the review of directives at least annually to ensure emerging cybersecurity risks and potential compliance gaps are addressed timely. | |||||
| 2 | Yes | $0 | $0 | ||
| Implement a process to screen for duplication and overlap across Departmental directives during the drafting, review, and revision of IT security directives. | |||||