Open Recommendations
Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
---|---|---|---|---|---|
7 | No | $0 | $0 | ||
Develop and implement controls to ensure that the data entered into PMS and IFS is accurate and consistent with CPSC policies and procedures. | |||||
8 | No | $0 | $0 | ||
Develop procedures to review applicable regulations and laws on an annual basis in order to ensure the property management policies and procedures remain accurate and complete. | |||||
9 | No | $0 | $0 | ||
Perform and document a formal analysis on the PMS operating environment and system mission to determine the appropriate system categorization for PMS. | |||||
10 | Yes | $0 | $0 | ||
Upon a justifiable determination of the PMS system categorization, design, implement, and assess the PMS security controls and formally authorize PMS to operate in accordance with CPSC organizational security policies and procedures as well as other applicable government standards. | |||||
11 | No | $0 | $0 | ||
Establish and implement POA&M management procedures to ensure that all identified security weaknesses, including PMS application-specific and inherited control weaknesses, are fully documented and tracked. | |||||
13 | No | $0 | $0 | ||
Establish and implement POA&M management procedures to ensure that changes to estimated completion dates should be documented and reflected in the POA&M tracker. | |||||
14 | No | $0 | $0 | ||
Estimated completion dates should be documented and reflected in the POA&M tracker. | |||||
15 | No | $0 | $0 | ||
Perform and document a formal analysis of PMS’s operating environment and system mission to determine the appropriate risk level categorization for PMS. | |||||
16 | Yes | $0 | $0 | ||
Upon a justifiable determination of PMS’s system categorization, design and implement standard procedures for requesting and approving user access to roles and resources in PMS. | |||||
20 | No | $0 | $0 | ||
Perform and document a risk analysis to identify SoD conflicts that may exist between PMS and other CPSC systems. | |||||
21 | No | $0 | $0 | ||
Upon completion of the risk analysis, develop and implement procedures to ensure that CPSC users do not have unmonitored conflicting access across multiple systems. | |||||
22 | No | $0 | $0 | ||
Perform and document a risk analysis to identify potential SoD conflicts within PMS. | |||||
23 | No | $0 | $0 | ||
Upon the completion of the risk analysis noted above, management should develop and implement procedures that ensure PMS users do not have sufficient access to allow the unmonitored execution of incompatible transactions. | |||||
24 | No | $0 | $0 | ||
Update and implement configuration change management procedures which include requirements to perform and document quality control reviews. | |||||
25 | No | $0 | $0 | ||
Develop and implement procedures to log, track, and maintain a list of changes made to the PMS application. |