IAF Generally Implemented an Effective Information Security Program for Fiscal Year 2021 in Support of FISMA

Recommendation
1

We recommend that IAF's chief information officer fully document and implement a process to include in the risk acceptance forms a clear business reason for risk acceptance and the compensating controls implemented to reduce the risk that vulnerabilities can be exploited.

Questioned Cost
0
Funds for Better Use
0
Close Date
Recommendation
2

Develop and implement supply chain risk management policies, procedures, and strategies.

Questioned Cost
0
Funds for Better Use
0
Close Date
Recommendation
3

We recommend that IAF's chief information officer develop and implement a procedure to document risk acceptance when vulnerabilities cannot be remediated within the timeframes specified in IAF's operating procedures.

Questioned Cost
0
Funds for Better Use
0
Close Date
Recommendation
4

We recommend that IAF's chief information officer approve and implement IAF's Information Resource Management Strategic Plan.

Questioned Cost
0
Funds for Better Use
0
Close Date
Recommendation
5

We recommend that IAF's chief information officer document and implement a procedure to approve IAF's table-top exercise plans before conducting the exercises.

Questioned Cost
0
Funds for Better Use
0
Close Date
Recommendation
6

We recommend that IAF's chief information officer document and implement a written process for obtaining and evaluating feedback on IAF's privacy and security training content, including role-based training.

Questioned Cost
0
Funds for Better Use
0
Recommendation
7

We recommend that IAF's chief information officer develop and implement a process to document lessons learned related to risk management, configuration management, identity and access management, data protection and privacy, and information security continuous monitoring to improve IAF's security posture.

Questioned Cost
0
Funds for Better Use
0
Close Date
Recommendation
8

We recommend that IAF's chief information officer develop and implement an information security continuous monitoring strategy.

Questioned Cost
0
Funds for Better Use
0
Close Date
Recommendation
9

We recommend that IAF's chief information officer develop and implement a written process to document participants in IAF's contingency plan training.

Questioned Cost
0
Funds for Better Use
0
Close Date