Text of Recommendation | Strengthen configuration management processes by
a. Remediating configuration-related vulnerabilities in a timely manner.
b. Ensuring that optimal resources are allocated to perform vulnerability remediation activities. |
---|---|
Recommendation Number | 1 |
Recommendation Status | Open |
Significant Recommendation | Yes |
Recommendation Questioned Costs | $0 |
Recommendation Funds for Better Use | $0 |
Submitting OIG | |
---|---|
Linked Report |