Open Recommendations
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
3 | No | $0 | $0 | ||
The General Access Control Policy and attendant procedures should be updated to include the elements outlined in the report. | |||||
4 | Yes | $0 | $0 | ||
Develop, document, and maintain a software inventory including license management policies and procedures. | |||||
5 | Yes | $0 | $0 | ||
Comply with and enforce HSPD-12 multifactor authentication supported by the Personal Identity Verification Card. | |||||
2 | No | $0 | $0 | ||
Provide training or document training completion by individual system owners on establishing, implementing, and maintaining logical access policies and procedures for systems that contain PII. |