Audit Report 14-12: Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review
… requirements. The OIG reports on the effectiveness of the agency’s information security program in accordance … the following 11 areas: configuration management identity and access management risk management continuous monitoring controls plan of actions and milestones remote access management security …