Implement a more effective vulnerability management program to address security deficiencies identified during the inspection. (This is a repeat recommendation from the prior inspection.)
Ensure vulnerabilities are remediated within OIT’s established time frames. (This is a repeat recommendation from the prior inspection.)
Ensure all servers and databases are part of the automated scanning process.
Implement approved baseline configurations for databases and document justifications and approvals for any deviations.
Implement more effective configuration control processes to ensure network devices maintain vendor support and receive security updates.
Implement an improved inventory process to ensure the accuracy of network ranges managed within the Enterprise Mission Assurance Support Service. (This is a repeat recommendation from the prior inspection.)
Implement an effective audit and monitoring process for all servers and databases. (This is a repeat recommendation from the prior inspection.)
Ensure that physical access logs for the data center and communication rooms are reviewed on a quarterly basis.