Complete an assessment of information security risks related to the identified deficiencies and document a corresponding priority listing to address identified information security deficiencies and their associated recommendations. A corrective action plan should be developed that documents the priorities and timing requirements to address these deficiencies (Risk Management iv/v/vi).
Date Issued
Oversight.gov UUID
fe16c2cb-5f1a-4c30-a23a-1dc9c37a2e3f
Status
Open
Recommendation Number
8
Sync
No
Questioned Costs
0
Significant Recommendation
On