USAID Has Implemented Controls in Support of FISMA, but Improvements Are Needed

Recommendation
1

We recommend that the chief information officer document and implement a process to track and remediate persistent vulnerabilities, or document acceptance of the associated risks.

Questioned Cost
0
Close Date
Recommendation
2

We recommend that the chief information officer document and implement a process to verify that vulnerability assessment tools are configured to detect vulnerabilities previously undiscovered by internal scans.

Questioned Cost
0
Close Date
Recommendation
3

We recommend that the chief information officer develop and implement a documented process to migrate unsupported applications from their existing platform to vendor-supported platforms. The risk and approval, including adequate compensating controls, should be documented if an exception must be made until the unsupported software is migrated to vendor-supported platforms.

Questioned Cost
0
Close Date
Recommendation
4

We recommend that the chief information officer document and implement a process to verify that Microsoft Windows systems comply with the U.S. Government Configuration Baseline, and to grant and disseminate approved deviations from the baseline configuration settings.

Questioned Cost
0
Close Date
Recommendation
5

We recommend that the chief information officer document and implement a plan to confirm all internal and external systems are currently authorized to operate.

Questioned Cost
0
Close Date
Recommendation
6

We recommend that the chief information officer document and implement a plan to annually assess risks for all internal and external systems in accordance with agency policy.

Questioned Cost
0
Close Date
Recommendation
7

We recommend that the chief information officer establish a process to monitor the operation of the automated script that disables accounts after 90 days of inactivity.

Questioned Cost
0
Close Date
Recommendation
8

We recommend that the chief information officer (a) identify system owners; (b) require them to verify their procedures for revoking system access accounts for separated and transferred employees and contractors are enforced; and (c) document their responses.

Questioned Cost
0
Close Date
Recommendation
9

We recommend that the chief information officer document and implement a procedure to check for unauthorized software at established intervals.

Questioned Cost
0
Close Date
Recommendation
10

We recommend that the chief human capital officer document and implement a process to verify that all employees' exit clearance forms are completed and maintained in accordance with policy.

Questioned Cost
0
Close Date
Recommendation
11

We recommend that the chief information officer document and implement a
procedure to review and analyze remote access connections.

Questioned Cost
0
Close Date