FISMA: Effectiveness of IAF's Information Security Program for FY 2025 Could Not Be Determined and Weaknesses Continue to Exist

Recommendation
1

Conduct a comprehensive review of IAF's software and hardware inventories and update them to ensure that they are accurate and complete.

Questioned Cost
0
Funds for Better Use
0
Recommendation
2

IAF's Chief Information Security Officer update IAF's procedures to include all elements for tracking the Agency's software and hardware assets. At a minimum these elements should include device type, location, and software license information.

Questioned Cost
0
Funds for Better Use
0
Recommendation
3

IAF's Chief Information Security Officer conduct a security controls assessment for the two systems identified.

Questioned Cost
0
Funds for Better Use
0
Recommendation
4

IAF's Chief Information Security Officer develop and implement procedures to hold system owners accountable for conducting security controls assessments and completing system security plans, and document which security controls are assessed and when.

Questioned Cost
0
Funds for Better Use
0
Recommendation
5

IAF's Chief Information Security Officer update security plans for the two systems identified to include all required components as outlined in NIST Special Publication 800-53.

Questioned Cost
0
Funds for Better Use
0
Recommendation
6

IAF's Chief Information Security Officer document the controls IAF is responsible for implementing for the external system identified and develop and implement a security plan for the system.

Questioned Cost
0
Funds for Better Use
0