Open Recommendations
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
3 | No | $0 | $0 | ||
We recommend that OPM document and enforce system roles and functions for each system, identify and de-conflict incompatible role assignments, and implement changes to enable the ability to generate complete and accurate listings of users from all systems. | |||||
4 | No | $0 | $0 | ||
We recommend that OPM establish an ability to systematically track configuration changes that have been implemented into system production environments for auditability and monitoring purposes. | |||||
1 | No | $0 | $0 | ||
We recommend that OPM perform and formally document periodic reviews of system access in accordance with agency defined frequencies to validate the appropriateness of user access. | |||||
2 | No | $0 | $0 | ||
We recommend that OPM establish, enforce, and communicate system access provisioning and deactivation policies. |