We recommend that the ICE Office of the Chief Information Officer develop and implement policies and procedures to improve the vulnerability management process to ensure:• credentialed scans are completed and assessed, per DHS guidance;• limitations posed by non-credentialed scans are properly and promptly reported per DHS guidance;• plans to address vulnerabilities are created and implemented promptly, per DHS guidance; and• formal acceptance of, or mitigate the risk of, noncompliant enterprise-level system settings.
Questioned Costs
$0
Funds for Better Use
$0
Recommendation Status
Closed
Source UUID
363e5efd-7cb6-44b6-ae4e-852fb84344d7-3
Recommendation Number
3
Significant Recommendation
No