Without documented procedures governing software management and vulnerability remediation processes, the EPA continues to be at risk of outsiders gaining access to compromise and exploit Agency systems and data.
Open Recommendations
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
22-E-0028_1 | No | $0 | $0 | ||
Develop and document procedures for detecting and removing unapproved software on the Agency’s network, to include time frames for removal, risk classifications, and identification of software collecting privacy data. | |||||
22-E-0028_2 | No | $0 | $0 | ||
Develop and provide training on the Agency’s processes for detecting and removing unapproved software to users with privileges to install software on the EPA’s network. |