We recommend that IAF's chief information officer fully document and implement a process to include in the risk acceptance forms a clear business reason for risk acceptance and the compensating controls implemented to reduce the risk that vulnerabilities can be exploited.
Develop and implement supply chain risk management policies, procedures, and strategies.
We recommend that IAF's chief information officer develop and implement a procedure to document risk acceptance when vulnerabilities cannot be remediated within the timeframes specified in IAF's operating procedures.
We recommend that IAF's chief information officer approve and implement IAF's Information Resource Management Strategic Plan.
We recommend that IAF's chief information officer document and implement a procedure to approve IAF's table-top exercise plans before conducting the exercises.
We recommend that IAF's chief information officer document and implement a written process for obtaining and evaluating feedback on IAF's privacy and security training content, including role-based training.
We recommend that IAF's chief information officer develop and implement a process to document lessons learned related to risk management, configuration management, identity and access management, data protection and privacy, and information security continuous monitoring to improve IAF's security posture.
We recommend that IAF's chief information officer develop and implement an information security continuous monitoring strategy.
We recommend that IAF's chief information officer develop and implement a written process to document participants in IAF's contingency plan training.