Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 7 | No | $0 | $0 | ||
| Grant Thornton recommends that OPM ensures policies and procedures governing the provisioning and de-provisioning of access to information systems are followed in a timely manner and documentation of completion of these processes is maintained. | |||||
| 8 | No | $0 | $0 | ||
| Grant Thornton recommends that OPM perform a comprehensive periodic review of the appropriateness of personnel with access to systems. | |||||
| 12 | No | $0 | $0 | ||
| Grant Thornton recommends that OPM document access rights to systems to include roles, role descriptions and privileges or activities associated with each role and role or activity assignments that may cause a segregation of duties conflict. | |||||
| 14 | No | $0 | $0 | ||
| Grant Thornton recommends that OPM establish a means of documenting all users who have access to systems. | |||||
| 19 | No | $0 | $0 | ||
| Grant Thornton recommends that OPM establish a methodology to systematically track all configuration items that are migrated to production and be able to produce a complete and accurate listing of all configuration items for both internal and external audit purposes, which will in turn support closer monitoring and management of the configuration management process. | |||||