Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Develop and implement a process to regularly reconcile vulnerability scanning results to the inventory list of wireless infrastructure devices, so as to ensure that all devices are included in the FDIC’s vulnerability scans.

Questioned Costs
$0
Funds for Better Use
$0
Recommendation Status
Closed
Source UUID
2dfed2e0-3e5b-4f89-a39a-7ad49e88d765-6
Recommendation Number
6
Significant Recommendation
No