Text of Recommendation | We recommend the CIO: Implement a centralized process to monitor vulnerabilities for information systems to ensure that each vulnerability is remediated within the Computer Security Handbook (CSH) defined timeframe. |
---|---|
Recommendation Number | 8 |
Recommendation Status | Open |
Significant Recommendation | Yes |
Submitting OIG | |
---|---|
Linked Report |