USADF's Chief Information Security Officer document and implement scan configuration reviews to analyze, detect and remediate vulnerabilities.
USADF's Chief Information Security Officer document and implement a process to verify USADF's Authorizing Officials review the authorization packages from provider organizations as a fundamental basis for determining risk and issue the respective Authorizations to Use for USADF's external systems and/or services.
USADF's Chief Information Security Officer design and implement a process, such as a periodic reconciliation of access agreements on file with a listing of new hires, to validate that all new information system users complete USADF system access agreements.