Recommendation Dashboard

OIG makes recommendations in our reports to improve the efficiency and effectiveness of agency programs and help agencies identify questioned costs and funds that could be put to better use. The aim is to spur our audited agencies to take corrective actions, which allow us to close the recommendations.

This dashboard identifies current open recommendations along with the associated questioned costs.  Open recommendations may be resolved or unresolved:

  • A recommendation is resolved when OIG agrees with the agency's plan of action.
  • A recommendation is unresolved when the agency has yet to share a plan of action or OIG disagrees with the plan.

The dashboard below may not reflect accurate numbers due to temporarily unavailable resources. We apologize for any inconvenience. Please check back soon.

 

Total Open Recommendations (As of 5/30/25)

343

Open Financial Recommendations (As of 5/30/25)

$56,304,556


Please see an updated list of recommendations with their corresponding report below.

2017

Dec 14, 2016
NFA Transmittal
4-669-17-019-R
Recommendation
1

USAID/M/OAA/CAS/CAM determine the allowability of $28,739 in questioned costs ($16,270 ineligible and $12,469 unsupported) identified on page 9 of Akus Consult's audit report and recover from EQUIP Liberia the amounts determined to be unallowable.

Questioned Cost
28739
Funds for Better Use
0
Recommendation
2

USAID/M/OAA/CAS/CAM ensure that EQUIP Liberia corrects the four instances of material noncompliance detailed on pages 13 to 14 and 16 to 18 of Akus Consult's audit report.

Questioned Cost
0
Close Date
Jan 17, 2018
Nov 15, 2016
Audit Report
M-000-17-001-C
Recommendation
1

We recommend that MCC's Department of Administration and Finance and the chief financial officer update its Expense Accruals Financial Management Procedure Manual to a) Require justification and analysis to be documented, supported, and approved by MCC's management when deviating from its accrual policy and procedures. This should include MCC verification of information provided by the Millennium Challenge Account to support the accrual. b) Include the guidance provided to the Millennium Challenge Accounts on how and what each Millennium Challenge Account will provide as support in addressing the reasonableness of their accrual.

Questioned Cost
0
Close Date
Jun 18, 2019
Recommendation
2

We recommend that MCC's Department of Administration and Finance and the chief financial officer conduct a comprehensive review and formalize the Grant Accrual Validation Whitepaper as an official policy and procedures document that includes: a) Establishing a documented supervisory review of the grant accrual validation to ensure that the validation is performed correctly and is in accordance with MCC's validation methodology. b) Establishing procedures that clearly state how the accrual validation will be carried out when a Millennium Challenge Account is closed out and no longer exists.

Questioned Cost
0
Close Date
Mar 28, 2018
Recommendation
3

We recommend that MCC's Department of Administration and Finance and the chief financial officer establish internal control procedures to properly review the accounting and reporting of funds returned by the Millennium Challenge Accounts and foreign governments, and other transactions that are not routinely prepared in its financial operations to ensure that these transactions are recorded correctly and in accordance with United States Standard General Ledger.

Questioned Cost
0
Funds for Better Use
0
Close Date
Mar 18, 2022
Recommendation
4

We recommend that MCC's Department of Administration and Finance and the chief financial officer establish an internal control process to ensure that financial statements are prepared in accordance with the most current version of Office of Management and Budget A-136.

Questioned Cost
0
Close Date
Mar 28, 2018
Recommendation
5

We recommend that MCC's Department of Administration and Finance and the chief financial officer conduct a quarterly reconciliation between the status of budgetary resources and the Office of Management and Budget SF-132, Apportionment and Reapportionment Schedule.

Questioned Cost
0
Close Date
Mar 20, 2019
Recommendation
6

We recommend that MCC's Department of Administration and Finance and the chief financial officer implement a management control to properly review and approve unapportioned funds by programs/projects at the fund level before entries are made.

Questioned Cost
0
Close Date
Mar 20, 2019
Recommendation
7

We recommend that MCC's Department of Administration and Finance and the chief financial officer implement a management control to review the impact of funds unapportioned at the fund level before apportionment and recoveries adjustments are recorded.

Questioned Cost
0
Close Date
Mar 20, 2019
Recommendation
8

We recommend that MCC's Department of Administration and Finance and the chief financial officer continue requiring all compact obligating documents be accompanied by an entry-into-force memo prior to recognizing obligation.

Questioned Cost
0
Close Date
Mar 28, 2018
Nov 15, 2016
Audit Report
0-000-17-001-C
Recommendation
1

The Office of the Chief Financial Officer resolve all unexplained differences between USAID's Fund Balance With Treasury account and the Department of the Treasury by December 31, 2016, and institutionalize the monthly reconciliation of the Fund Balance With Treasury account.

Questioned Cost
0
Funds for Better Use
0
Close Date
Nov 12, 2019
Recommendation
2

The Office of the Chief Financial Officer implement a quality assurance program to validate the quarterly information that missions submit.

Questioned Cost
0
Close Date
Sep 29, 2017
Recommendation
3

The Office of the Chief Financial Officer implement a plan to immediately investigate all potential funds control violations reported as of September 30, 2016, and resolve them by June 30, 2017.

Questioned Cost
0
Close Date
Aug 30, 2017
Recommendation
4

The Office of the Chief Financial Officer enhance its policies and procedures to evaluate potential funds control violations so that they are investigated and resolved promptly.

Questioned Cost
0
Close Date
Aug 30, 2017
Nov 07, 2016
Audit Report
A-OPC-17-005-C
Recommendation
1

The Overseas Private Investment Corporation's chief information officer remediate vulnerabilities on the network identified by the Office of Inspector General's contractor, as appropriate, or document acceptance of the risks of those vulnerabilities.

Questioned Cost
0
Close Date
Dec 29, 2016
Recommendation
2

(SBU) The Overseas Private Investment Corporation's chief information officer document a separation-of-duties matrix for Oracle E-Business Suite user roles and responsibilities.

Questioned Cost
0
Close Date
Mar 31, 2017
Recommendation
3

(SBU) The Overseas Private Investment Corporation's chief information officer implement a written process to recertify Oracle EBusiness Suite accounts annually, including evaluating the separation of duties.

Questioned Cost
0
Close Date
Mar 29, 2017
Recommendation
4

(SBU) The Overseas Private Investment Corporation's chief information officer implement a written process to disable inactive Oracle E=Business Suite accounts.

Questioned Cost
0
Close Date
Mar 31, 2017
Recommendation
5

(SBU) The Overseas Private Investment Corporation's chief information officer implement Homeland Security Presidential Directive 12 personal identity verification for authentication of network user accounts as required by Office of Management and Budget M-16-04, "Cybersecurity Strategy and Implementation Plan (CSIP) for the Federal Civilian Government," (October 30, 2015)
and document the results.

Questioned Cost
0
Close Date
Sep 28, 2017
Recommendation
6

(SBU) The Overseas Private Investment Corporation's chief information officer either disable Citrix local drive mapping where non-Corporation equipment is used, and document the results, or document acceptance of the risk of allowing Citrix local drive mapping where non-Corporation equipment is used.

Questioned Cost
0
Close Date
Jan 31, 2017
Recommendation
7

The Overseas Private Investment Corporation's chief information officer document and implement asset management procedures, including inventorying information system assets on an organization-defined frequency.

Questioned Cost
0
Close Date
Sep 27, 2017
Recommendation
8

(SBU) The Overseas Private Investment Corporation's chief information officer document and implement a separation-of-duties matrix for OPIC Insight user roles and responsibilities.

Questioned Cost
0
Close Date
Feb 28, 2017
Recommendation
9

The Overseas Private Investment Corporation's chief information security officer, in coordination with the security officer, document and implement physical and environmental security policies and procedures including reviews of physical access as defined by National Institute of Standards and Technology Special Publication 800-53, Revision 4, "Security and Privacy Controls for Federal Information Systems and Organizations."

Questioned Cost
0
Close Date
Sep 28, 2017
Recommendation
10

The Overseas Private Investment Corporation's chief information officer document and implement an enterprise architecture methodology in line with the Federal enterprise architecture and risk
management framework.

Questioned Cost
0
Close Date
Sep 26, 2017
Recommendation
11

The Overseas Private Investment Corporation's chief information officer update the Corporation's incident response plan to include the time frames for reporting incidents as specified in the "United States Computer Emergency Readiness Team Federal Incident Notification Guidelines."

Questioned Cost
0
Close Date
Nov 28, 2016
Recommendation
12

The Overseas Private Investment Corporation's chief information officer complete the implementation of the Training Management System and verify in writing that records are retained for the Corporation-specified period.

Questioned Cost
0
Close Date
Jan 31, 2017
Recommendation
13

(SBU) The Overseas Private Investment Corporation's chief information officer implement a documented process to validate whether the annual testing of the Corporation's information system contingency plan is completed.

Questioned Cost
0
Close Date
Mar 29, 2017
Recommendation
14

(SBU) The Overseas Private Investment Corporation's chief information officer document and implement processes to achieve acceptable compliance with configuration baseline settings for Windows 2003, Windows 2008, and CentOS servers.

Questioned Cost
0
Close Date
Apr 28, 2017
Recommendation
15

The Overseas Private Investment Corporation's chief information officer implement the process to validate whether plans of action and milestones are completed and updated on time and document the results.

Questioned Cost
0
Close Date
Mar 29, 2017
Recommendation
16

(SBU) The Overseas Private Investment Corporation's chief information security officer review the accreditation boundaries of the OPIC External Services system, align external services with related mission functions, and document the results.

Questioned Cost
0
Close Date
Apr 28, 2017
Recommendation
17

(SBU) The Overseas Private Investment Corporation's chief information security officer implement a written process to assess external services before their authorizations to operate expire.

Questioned Cost
0
Close Date
May 31, 2017
Nov 07, 2016
Audit Report
A-ADF-17-002-C
Recommendation
1

The United States African Development Foundation's president appoint in writing a senior-level chief information security officer in accordance with the Federal Information Security Modernization Act and the National Institute of Standards and Technology.

Questioned Cost
0
Close Date
Dec 01, 2016
Recommendation
2

The United States African Development Foundation's chief information security officer document and implement a process to review and update system security plans to reflect National Institute of Standards and Technology Special Publication 800-53, Revision 4, "Security and Privacy Controls for
Federal Information Systems and Organizations." At a minimum, this process should include determining whether the security requirements and controls for the system are adequately documented and reflect the current information system environment.

Questioned Cost
0
Close Date
May 26, 2017
Recommendation
3

The United States African Development Foundation's chief information security officer document and implement a process to perform security assessments in accordance with National Institute of Standards and Technology standards. This process should include documenting assessment
procedures to be used to determine security control effectiveness and testing the operating effectiveness of security controls.

Questioned Cost
0
Close Date
Jun 02, 2017
Recommendation
4

The United States African Development Foundation's chief information security officer document and implement a process for assessing risk in internal and cloud service provider's systems-taking into account all known vulnerabilities and threat sources, security controls planned or in place, and
residual risk-to make the authorizing official for each system aware of its security state.

Questioned Cost
0
Close Date
May 31, 2017
Recommendation
5

The United States African Development Foundation's chief information security officer document and implement a process to update all known security weaknesses and associated corrective plans quarterly as required by the foundation's policy and include them in the plan of action and
milestones.

Questioned Cost
0
Close Date
Dec 12, 2016
Recommendation
6

The United States African Development Foundation's chief information security officer document and implement a process to develop, communicate, and implement an organization-wide risk management strategy associated with the operation and use of the foundation's information systems in accordance with National Institute of Standards and Technology standards.

Questioned Cost
0
Close Date
May 15, 2017
Recommendation
7

The United States African Development Foundation's chief information security officer document and implement a process to review and maintain an up-to-date information system inventory.

Questioned Cost
0
Close Date
Nov 30, 2016
Recommendation
8

The United States African Development Foundation's chief information security officer document and implement a process to develop, document, and implement an enterprise architecture in accordance with National Institute of Standards and Technology standards.

Questioned Cost
0
Close Date
Apr 14, 2017
Recommendation
9

The United States African Development Foundation's chief information security officer document and implement a process to perform quarterly scans of all Internet protocol ranges in the network.

Questioned Cost
0
Close Date
Dec 12, 2016
Recommendation
10

The United States African Development Foundation's chief information security officer document and implement a process to track and remediate vulnerabilities timely in accordance with the foundation's policy. This process should include ascertaining that patches are tested before being put into production and applied promptly in accordance with policy.

Questioned Cost
0
Close Date
Jan 31, 2017
Recommendation
11

The United States African Development Foundation's chief information security officer document and implement a process to migrate unsupported applications to platforms supported by vendors. For unsupported applications that cannot be migrated immediately, this process must include
documenting the risk of leaving them on their current platforms, acceptance of that risk, and compensating controls that will be used until migration is possible.

Questioned Cost
0
Close Date
Mar 31, 2017
Recommendation
12

The United States African Development Foundation's chief information security officer document and implement a process to scan each workstation for compliance with the United States Government
Configuration Baseline settings, including remediating any noncompliant settings.

Questioned Cost
0
Close Date
Dec 08, 2016
Recommendation
13

The United States African Development Foundation's chief information security officer document and implement a process to remove users' administrator access to foundation workstations and prevent
granting that access in the future. This process must include documenting the risk of such access and documenting the approval of any exceptions, along with adequate compensating controls.

Questioned Cost
0
Close Date
Dec 01, 2016
Recommendation
14

The United States African Development Foundation's chief information security officer document and implement a process to document, approve, and disseminate approved deviations from the United States Government Configuration Baseline settings.

Questioned Cost
0
Close Date
Feb 03, 2017
Recommendation
15

The United States African Development Foundation's chief information security officer document and implement a process to configure and regularly monitor password settings in accordance with the foundation's policy and encrypt passwords during authentication.

Questioned Cost
0
Close Date
Dec 01, 2016
Recommendation
16

The United States African Development Foundation's chief information security officer document and implement a process to specify an organization-defined frequency for reviewing and updating the inventory of information system components.

Questioned Cost
0
Close Date
Jan 20, 2017
Recommendation
17

The United States African Development Foundation's chief information security officer document and implement a process to maintain the inventory according to policy.

Questioned Cost
0
Close Date
May 15, 2017
Recommendation
18

The United States African Development Foundation's chief information security officer document and implement a process to remove and decommission unused systems promptly.

Questioned Cost
0
Close Date
Jan 10, 2017
Recommendation
19

The United States African Development Foundation's chief information security officer document and implement a process to implement and enforce multifactor authentication for network access to privileged accounts.

Questioned Cost
0
Close Date
Apr 26, 2017
Recommendation
20

The United States African Development Foundation's chief information security officer document and implement a process to implement and enforce the use of personal identity verification credentials for access to the foundation's facilities, computers, and network.

Questioned Cost
0
Close Date
Sep 19, 2018
Recommendation
21

The United States African Development Foundation's chief information security officer document and implement a process to change default usernames and passwords before system installation.

Questioned Cost
0
Close Date
Dec 01, 2016
Recommendation
22

The United States African Development Foundation's chief information security officer document and implement a process to review and analyze all required audit logs in accordance with National Institute of Standards and Technology standards and the foundation's policy.

Questioned Cost
0
Close Date
Apr 14, 2017
Recommendation
23

The United States African Development Foundation's chief information security officer document and implement a process to reevaluate the security categorization of the general support, travel, and
human resources systems in accordance with the Office of Management and Budget and National Institute of Standards and Technology guidance given that the systems contain personally identifiable information.

Questioned Cost
0
Funds for Better Use
0
Close Date
May 15, 2017
Recommendation
24

The United States African Development Foundation's chief information security officer document and implement a process to maintain a current interconnection security agreement and memorandum of understanding between the foundation and the U.S. Department of Interior's Interior Business Center.

Questioned Cost
0
Close Date
Nov 18, 2016
Recommendation
25

The United States African Development Foundation's chief information security officer document and implement a process to provide annual security awareness training to overseas partners.

Questioned Cost
0
Close Date
Jan 20, 2017
Recommendation
26

The United States African Development Foundation's chief information security officer document and implement a process to provide annual role-based training to all personnel with significant information security responsibilities.

Questioned Cost
0
Close Date
Dec 08, 2016
Nov 07, 2016
Audit Report
A-IAF-17-004-C
Recommendation
1

The Inter-American Foundation's chief information officer remediate vulnerabilities in the network identified by the Office of Inspector General's contractor and document the results or document acceptance of the risks of those vulnerabilities.

Questioned Cost
0
Close Date
Sep 01, 2017
Recommendation
2

The Inter-American Foundation's chief information officer develop and implement a continuous monitoring plan and program.

Questioned Cost
0
Close Date
Mar 15, 2017
Recommendation
3

The Inter-American Foundation's chief information officer develop and implement monitoring controls of baseline configurations for the Enterprise Network and document the results.

Questioned Cost
0
Close Date
Mar 15, 2017
Recommendation
4

The Inter-American Foundation's chief information officer complete a system risk assessment for the Enterprise Network that takes into account all known vulnerabilities, threat sources, and security controls planned or in place, determine the residual risk, and inform the authorizing official of the security state of the information system.

Questioned Cost
0
Close Date
Jan 18, 2018
Recommendation
5

The Inter-American Foundation's chief information officer obtain a current authorization to operate the Enterprise Network that results from a completed security controls assessment and updated system security plan, risk assessment, and plan of action and milestones.

Questioned Cost
0
Close Date
Jan 18, 2018
Recommendation
6

The Inter-American Foundation's chief information officer document and implement a process to review and analyze auditable events.

Questioned Cost
0
Close Date
Mar 20, 2017
Recommendation
7

The Inter-American Foundation's chief information officer implement multifactor authentication for all network accounts and document the results.

Questioned Cost
0
Funds for Better Use
0
Close Date
Aug 11, 2022
Recommendation
8

The Inter-American Foundation's chief information officer update the continuity of operations plan to include a business impact analysis.

Questioned Cost
0
Close Date
Sep 26, 2017
Recommendation
9

The Inter-American Foundation's chief information officer document and implement a process to validate annual testing of the continuity of operations plan.

Questioned Cost
0
Close Date
Sep 30, 2017
Recommendation
10

The Inter-American Foundation's chief information officer develop and implement a written process to validate whether the plan of action and milestones is completed and updated promptly and includes all applicable control weaknesses.

Questioned Cost
0
Close Date
Mar 15, 2017
Recommendation
11

The Inter-American Foundation's chief information officer update and implement the Information System Security Program Standard Operating Procedures to include the privacy controls identified in National Institute of Standards and Technology Special Publication 800-53, Revision 4, "Security and Privacy Controls for Federal Information Systems and Organizations."

Questioned Cost
0
Close Date
Mar 15, 2017
Recommendation
12

The Inter-American Foundation's chief information officer update the organization's Enterprise Network and Software Applications System Security Plan to reflect the current operating environment.

Questioned Cost
0
Close Date
Mar 15, 2017
Recommendation
13

The Inter-American Foundation chief information officer obtain a written, fully executed Interconnection Security Agreement with the Department of Interior Business Center.

Questioned Cost
0
Close Date
Nov 07, 2016
Nov 07, 2016
Audit Report
A-MCC-17-003-C
Recommendation
1

We recommend that Millennium Challenge Corporation's Chief Information Officer document and implement a process to update baseline configurations for workstations periodically or document acceptance of the risk.

Questioned Cost
0
Close Date
Mar 14, 2018
Recommendation
2

We recommend that Millennium Challenge Corporation's Chief Information Officer implement written procedures to complete, approve, and maintain users' access request forms for the Contract Management System Audit Tracking and Reporting System in accordance with "MCC Access Control Procedures."

Questioned Cost
0
Close Date
Dec 07, 2016
Recommendation
3

We recommend that Millennium Challenge Corporation's Chief Information Officer either implement environmental controls for the secondary data center and document results or document acceptance of the risk.

Questioned Cost
0
Close Date
Sep 20, 2017
Recommendation
4

We recommend that Millennium Challenge Corporation's Chief Information Officer document and implement a written physical and environmental protection policy that includes all security controls required by National Institute of Standards and Technology Special Publication 800-53, Revision 4, "Security and Privacy Controls for Federal Information Systems and Organizations," and reflects the current operating environment.

Questioned Cost
0
Close Date
May 30, 2018
Recommendation
5

We recommend that Millennium Challenge Corporation's Chief Information Officer document and implement written procedures to manage access to the secondary data center. At a minimum, the procedures should include periodically reviewing logs of personnel entering the data center, and implementing a visitor access log for the data center.

Questioned Cost
0
Close Date
Apr 23, 2018
Recommendation
6

We recommend that the Millennium Challenge Corporation's Chief Information Officer activate the alarm in the secondary data center and document the results.

Questioned Cost
0
Close Date
Dec 07, 2016
Recommendation
7

We recommend that Millennium Challenge Corporation's Chief Information Officer update the "Configuration Management Policies and Procedures" to include testing and approval requirements by the type of system changes.

Questioned Cost
0
Close Date
Sep 20, 2017
Recommendation
8

We recommend that Millennium Challenge Corporation's Chief Information Officer document and implement policy and procedures that include all personnel security controls required by National Institute of Standards and Technology Special Publication 800-53, Revision 4, "Security and Privacy Controls for Federal Information Systems and Organizations."

Questioned Cost
0
Close Date
May 30, 2018
Recommendation
9

We recommend that the Millennium Challenge Corporation obtain a written, fully executed Interconnection Security Agreement with the Department of Interior's Interior Business Center.

Questioned Cost
0
Close Date
Jun 27, 2017
Oct 28, 2016
Audit Report
1-519-17-001-P
Recommendation
1

USAID/El Salvador work with Nathan Associates Inc. to implement a plan for helping producers overcome obstacles noted by regional buyers.

Questioned Cost
0
Close Date
Oct 28, 2016
Recommendation
2

USAID/El Salvador, in coordination with Nathan Associates Inc., implement a plan for expediting delivery of equipment that grantees need to achieve their export goals.

Questioned Cost
0
Close Date
Oct 28, 2016
Recommendation
3

USAID/El Salvador document a plan to measure the impact of value-chain interventions on nutrition and income for small farmers supported by the project.

Questioned Cost
0
Close Date
Mar 15, 2017
Recommendation
4

USAID/El Salvador review and document the choice of value chains to determine whether they met the nutrition and income criteria established in the contract and make adjustments as appropriate.

Questioned Cost
0
Close Date
Oct 28, 2016
Recommendation
5

USAID/El Salvador document a meaningful indicator to measure the project's impact on supported producers.

Questioned Cost
0
Close Date
Oct 28, 2016
Recommendation
6

USAID/El Salvador document the rationale for expected targets for the Regional Trade and Market Alliances project and make adjustments as appropriate for the remainder of the activity.

Questioned Cost
0
Close Date
Feb 27, 2017
Recommendation
7

USAID/El Salvador develop written instructions to staff requiring them to comply with USAID policy by documenting targets.

Questioned Cost
0
Close Date
Jul 20, 2017
Recommendation
8

USAID/El Salvador instruct Nathan Associates Inc. to verify the number of small producer units participating in regional and export value chains supported by the project.

Questioned Cost
0
Close Date
Oct 28, 2016
Recommendation
9

USAID/El Salvador develop a joint training program for technical officers and the monitoring and evaluation specialist to review their shared responsibilities for performance monitoring and data quality, as described in Mission Order 203.

Questioned Cost
0
Close Date
Jul 20, 2017
Recommendation
10

USAID/El Salvador formally request that the Bureau for Latin America and the Caribbean review and issue a written decision on the curtailment of project activities in the Dominican Republic.

Questioned Cost
0
Close Date
Jun 27, 2017
Recommendation
11

USAID/El Salvador perform a financial review of Nathan Associates Inc. to determine whether its systems meet acquisition requirements.

Questioned Cost
0
Close Date
Jul 20, 2017
Recommendation
12

USAID/El Salvador determine the allowability of $172,570 in ineligible questioned costs for consulting contracts that did not follow acquisition regulations, and recover from Nathan Associates Inc. any amount deemed unallowable.

Questioned Cost
172570
Close Date
Apr 20, 2017
Recommendation
13

USAID/El Salvador issue written instructions to the contractor officer's representative on the proper procedures for contract approvals.

Questioned Cost
0
Close Date
Feb 27, 2017
Oct 27, 2016
Audit Report
A-000-17-001-C
Recommendation
1

The Deputy Administrator develop and implement a plan to ensure the chief information officer position reports directly to the Administrator or Deputy Administrator as required by the Federal Information Technology Acquisition Reform Act of 2014 and the Clinger-Cohen Act of 1996.

Questioned Cost
0
Funds for Better Use
0
Close Date
Oct 27, 2016
Recommendation
2

The Deputy Administrator develop a written plan to ensure the chief information officer has a significant role in the management, governance, and oversight of information technology as required by the Federal Information Technology Acquisition Reform Act of 2014.

Questioned Cost
0
Close Date
Oct 27, 2016
Recommendation
3

The chief information officer implement a plan to segregate the deputy chief information officer and chief information security officer positions and appoint in writing a senior-level chief information security officer in accordance with the Federal Information Security Modernization Act.

Questioned Cost
0
Close Date
Mar 21, 2017
Recommendation
4

The chief information officer remediate vulnerabilities on the network identified by the Office of Inspector General's contractor, as appropriate, or document acceptance of the risks of those vulnerabilities.

Questioned Cost
0
Close Date
Jul 31, 2017
Recommendation
5

The chief information officer document and
implement a process to track and remediate persistent vulnerabilities promptly, or document acceptance of the risk of those vulnerabilities.

Questioned Cost
0
Close Date
Feb 02, 2017
Recommendation
6

The chief information officer document and implement a process to ensure vulnerability assessment tools are configured to detect vulnerabilities previously not detected by internal scans.

Questioned Cost
0
Close Date
Feb 14, 2017
Recommendation
7

The chief information officer document and implement a process to centrally manage printers and apply hardened security configurations prior to placing printers into the production environment.

Questioned Cost
0
Close Date
Sep 27, 2017
Recommendation
8

The chief information officer document and implement a plan to make sure all internal and external systems have a current authority to operate.

Questioned Cost
0
Close Date
Mar 28, 2017
Recommendation
9

The chief information officer, in coordination with the chief financial officer, document and implement a procedure to minimize exposure of personally identifiable information in webTA.

Questioned Cost
0
Close Date
Jan 17, 2018
Recommendation
10

The chief information officer, in coordination with the chief financial officer, document and implement a procedure to complete, approve, and maintain access request forms for webTA users in accordance with policies, or document acceptance of the risk of not having such controls.

Questioned Cost
0
Close Date
Aug 22, 2017
Recommendation
11

The chief information officer, in coordination with the chief financial officer, document and implement a procedure to review webTA accounts periodically for appropriateness in accordance with policies or document acceptance of the risk of not having such controls.

Questioned Cost
0
Close Date
Jun 27, 2017
Recommendation
12

The chief information officer develop and implement a written process to validate that the AIDnet plan of action and milestones is completed and updated promptly.

Questioned Cost
0
Close Date
Oct 27, 2016
Recommendation
13

The director of the Office of Management Policy, Budget, and Performance, in coordination with the chief information officer and the chief human capital officer, document and implement a procedure to promptly remove system accounts associated with people no longer at the Agency.

Questioned Cost
0
Close Date
Jun 26, 2017
Recommendation
14

The chief information officer, in coordination with the chief human capital officer, document and implement a process to verify that all employees' exit clearance forms are completed and maintained in accordance with policy.

Questioned Cost
0
Close Date
Oct 27, 2016
Recommendation
15

The chief information officer document and implement a procedure to complete, approve, and maintain access request forms for individuals requiring access to the information technology rooms in the Ronald Reagan Building and Two Potomac Yard locations.

Questioned Cost
0
Close Date
Feb 14, 2017
Recommendation
16

The chief information officer document and implement a procedure to review individual access periodically and ensure only authorized personnel have access to information technology rooms in the Ronald Reagan Building and Two Potomac Yard locations.

Questioned Cost
0
Close Date
May 31, 2017
Recommendation
17

The chief information officer document and implement a validation process to confirm that all memorandums of understanding and interconnection security agreements are current and approved.

Questioned Cost
0
Close Date
Sep 28, 2017
Recommendation
18

The chief financial officer document and implement a procedure to review third-party assessment reports to ensure complementary user entity controls have been implemented for the Enterprise Loan Management System.

Questioned Cost
0
Close Date
Mar 28, 2017
Recommendation
19

The chief financial officer document and implement a procedure to review active Enterprise Loan Management System accounts that have not been used for a specified period and disable them as necessary in accordance with agency policy.

Questioned Cost
0
Close Date
Mar 28, 2017
Recommendation
20

The chief financial officer document and implement a procedure to periodically review the Department of State vulnerability scan results and remediation actions supporting the Phoenix application.

Questioned Cost
0
Close Date
Jun 28, 2017
Oct 02, 2016
NFA Transmittal
F-306-17-001-N
Recommendation
1

USAID/Afghanistan determine the allowability of $684,367 in questioned costs ($129,715 ineligible and $554,652 unsupported) identified on page 18 of Davis and Associates' audit report and recover from Advanced Engineering Associates International, Inc. any amounts determined to be unallowable.

Questioned Cost
684367
Funds for Better Use
0
Close Date
Mar 02, 2022
Recommendation
2

USAID/Afghanistan verify that Advanced Engineering Associates International, Inc. corrects the one significant deficiency in internal control (payment of local staff salaries and purchase of fuel in cash) identified on pages 27 of Davis and Associates' audit report and further detailed on pages 48-49.

Questioned Cost
0
Close Date
Sep 21, 2017
Recommendation
3

USAID/Afghanistan verify that Advanced Engineering Associates International, Inc. corrects the four instances of material noncompliance (purchase of business class airfare, lack of competition and vetting, making severance payment to TCN personnel, and not withholding taxes from payments made to certain companies) identified on pages 28-29 of Davis and Associates' audit report and further detailed on pages 33-47.

Questioned Cost
0
Close Date
Sep 21, 2017