Improve vulnerability management processes to ensure plans of action and milestones are created for vulnerabilities that cannot be mitigated within OIT timelines.
Implement a more effective system life-cycle process to ensure network devices are running operating systems that are configured to approved baselines and free of vulnerabilities.
Implement a process to verify that when employees are terminated, all their accounts are disabled.
Ensure network segmentation controls are applied to all network segments with special-purpose systems.
Implement a process to retain database logs for a period consistent with VA’s record retention policy.