Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 1 | No | $0 | $0 | ||
| Prioritize the definition and incorporation of a cybersecurity risk tolerance into the agency's cybersecurity policies, procedures, and processes, as appropriate. | |||||
| 3 | No | $0 | $0 | ||
| Document and implement a process to consistently inventory the Board's web applications, including its public-facing websites. | |||||
| 4 | No | $0 | $0 | ||
| Document and implement a process to consistently inventory and prioritize the Board's third-party systems, including the identification of subcontractors. | |||||
| 5 | No | $0 | $0 | ||
| Enforce the agency's iOS Update and Device Inactivity Policy to ensure that agency services are denied to mobile devices that are out of compliance. | |||||
| 6 | No | $0 | $0 | ||
| Develop, document, and implement a process to review and update the Board's privacy impact assessments. | |||||