Establish and implement a policy and procedure to ensure that only authorized hardware and software execute on the agency’s network (Risk Management ii/iii).
Date Issued
Oversight.gov UUID
de983d45-2e6a-4c5b-9180-6859c785433c
Status
Closed
Recommendation Number
4
Sync
No
Questioned Costs
0
Significant Recommendation
On