Open Recommendations
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
5 | No | $0 | $0 | ||
We recommend that HAM ensure [redacted]. Note - this recommendation cannot be implemented until the controls from Recommendation 4 are in place. | |||||
2 | No | $0 | $0 | ||
We recommend that HAM ensure [redacted]. | |||||
6 | No | $0 | $0 | ||
We recommend that HAM ensure [redacted]. | |||||
7 | No | $0 | $0 | ||
We recommend that HAM ensure [redacted]. | |||||
8 | No | $0 | $0 | ||
We recommend that HAM ensure [redacted]. Note - this recommendation cannot be implemented until the controls from Recommendation 7 are in place. | |||||
9 | No | $0 | $0 | ||
We recommend that HAM develop and then implement [redacted]. | |||||
15 | No | $0 | $0 | ||
We recommend that HAM install all security-relevant software updates identified during this audit. | |||||
10 | No | $0 | $0 | ||
We recommend that HAM [redacted]. | |||||
13 | No | $0 | $0 | ||
We recommend that HAM replace or identify extended support for software identified during this audit which is no longer supported by the developer, vendor, or manufacturer. | |||||
16 | No | $0 | $0 | ||
We recommend that HAM [redacted]. |