Report 12-15: Weaknesses Identified During FY 2011 FISMA Review
… its general support system’s end users and monitor remote access logs for unauthorized activity. Finally, the OIG … timely, recertifying network users, and reviewing remote access audit logs. The OIG re-issued a prior year …