Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 11 | No | $0 | $0 | ||
| We recommend that GHC continue to remediate the specific technical weaknesses discovered during this audit as outlined in the vulnerability scan audit inquiry. | |||||
| 13 | No | $0 | $0 | ||
| We recommend that GHC implement a routine process to audit security configuration settings of its servers to ensure compliance with approved security configuration settings. | |||||