Recommendation
1
Develop and implement a process to include compensating controls to
mitigate risk when accepting the risk of known vulnerabilities.
Questioned Cost
0
Funds for Better Use
0
Recommendation
2
Document and implement a process to verify that laptops are encrypted and remediate instances of nonencrypted laptops.
Questioned Cost
0
Funds for Better Use
0
Recommendation
3
Document and implement a strategy, policy, and procedures to manage supply chain risks with suppliers, contractors, and systems.
Questioned Cost
0
Funds for Better Use
0