Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 1 | No | $0 | $0 | ||
| Inadequate Cybersecurity Governance | |||||
| 2 | No | $0 | $0 | ||
| Inadequate Cybersecurity Governance | |||||
| 8 | No | $0 | $0 | ||
| Risk and Asset Management | |||||
| 9 | No | $0 | $0 | ||
| Risk and Asset Management | |||||
| 10 | No | $0 | $0 | ||
| Risk and Asset Management | |||||
| 11 | No | $0 | $0 | ||
| Risk and Asset Management | |||||
| 12 | No | $0 | $0 | ||
| Risk and Asset Management | |||||
| 19 | No | $0 | $0 | ||
| Information Security Continuous Monitoring | |||||
| 21 | No | $0 | $0 | ||
| Information Security Continuous Monitoring | |||||
| 22 | No | $0 | $0 | ||
| Information Security Continuous Monitoring | |||||
| 23 | No | $0 | $0 | ||
| USAC - Access Controls | |||||
| 26 | No | $0 | $0 | ||
| USAC - Access Controls | |||||
| 27 | No | $0 | $0 | ||
| USAC - Access Controls | |||||