Define and document policies and procedures outlining the CPSC’s remote access configuration/connection requirements, including use of Federal Information Processing Standards 140-2 validated cryptographic modules, system timeouts, and monitoring and control of remote access sessions.
Date Issued
Oversight.gov UUID
5b1a10cf-96c3-4370-be8a-22087380852c
Status
Closed
Recommendation Number
8
Sync
No
Questioned Costs
0
Significant Recommendation
Off