Open Recommendations
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
5 | Yes | $0 | $0 | ||
Implement controls to continuously monitor and work with components to ensure network administrators are informed and action is taken to disable system accounts when users no longer require access or have been inactive beyond established thresholds. | |||||
8 | Yes | $0 | $0 | ||
Implement processes verifying that personnel performing certain security related roles receive specialized training needed to meet OCIO guidance. |