Open Recommendations
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
15 | No | $0 | $0 | ||
We recommend that GHC develop and implement policies and procedures which define how unsupported software should be handled before the end-of-life date. | |||||
11 | No | $0 | $0 | ||
We recommend that GHC continue to remediate the specific technical weaknesses discovered during this audit as outlined in the vulnerability scan audit inquiry. | |||||
13 | No | $0 | $0 | ||
We recommend that GHC implement a routine process to audit security configuration settings of its servers to ensure compliance with approved security configuration settings. |