Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 1 | No | $0 | $0 | ||
| The Chief Information Officer should prioritize and resolve the backlog of configuration compliance vulnerabilities in the platform. | |||||
| 2 | No | $0 | $0 | ||
| Complete POA&Ms and/or RBDs to document and track the **2** overdue configuration compliance vulnerabilities. | |||||
| 3 | No | $0 | $0 | ||
| Ensure that the Standard Operating Procedures and IRM reflect consistent guidance regarding the requirements and timing of POA&Ms and/or RBDs. | |||||
| 4 | No | $0 | $0 | ||
| The Chief Information Officer should develop and approve an RBD or POA&M for deviating from the requirement to employ *****2******** ******2******* for all systems. | |||||
| 5 | No | $0 | $0 | ||
| The Chief Information Officer should reconcile the platform asset inventory to the new inventory management system to ensure its completeness and accuracy. | |||||