Audit of the Cost and Security Policies and Procedures for USAID's Mobile Devices

Recommendations

Recommendation
4

USAID's Chief Information Officer implement documented policies that define the conditions for remotely wiping mobile devices if the device is lost or stolen and is at risk of having its data recovered by an unauthorized individual or entity and for failed password attempts.

Questioned Cost
0
Close Date
Recommendation
5

USAID's Chief Information Officer implement documented policies that define the conditions for remotely locking devices suspected of being left unlocked in an unsecured location.

Questioned Cost
0
Close Date
Recommendation
6

USAID's Chief Information Officer implement documented procedures for digitally signing USAID-developed applications.

Questioned Cost
0
Close Date
Recommendation
7

USAID's Chief Information Officer implement documented procedures that describe how policies will be managed on BlackBerry Enterprise Servers.

Questioned Cost
0
Close Date
Recommendation
8

USAID's Chief Information Officer implement
documented policies that define which types of mobile devices are permitted to access the Agency's resources.

Questioned Cost
0
Close Date
Recommendation
9

USAID's Chief Information Officer implement
documented policies that define the degree of access that various classes of mobile devices (e.g., organization-issued devices versus those that are personally owned) can have to Agency resources.

Questioned Cost
0
Close Date