Sorry, you need to enable JavaScript to visit this website.
Skip to main content

We recommend that the ICE Office of the Chief Information Officer develop and implement policies and procedures to improve the vulnerability management process to ensure:• credentialed scans are completed and assessed, per DHS guidance;• limitations posed by non-credentialed scans are properly and promptly reported per DHS guidance;• plans to address vulnerabilities are created and implemented promptly, per DHS guidance; and• formal acceptance of, or mitigate the risk of, noncompliant enterprise-level system settings.

Questioned Costs
$0
Funds for Better Use
$0
Recommendation Status
Closed
Source UUID
363e5efd-7cb6-44b6-ae4e-852fb84344d7-3
Recommendation Number
3
Significant Recommendation
No