11-06 - Weaknesses Identified During the FY 2010 Federal Information Security Management Act Review
… security controls over information resources that support Federal operations and assets. The Act requires (1) … of Actions and Milestones (POA&M); (6) Remote Access; (7) Identity Management; (8) Continuous Monitoring; (9) …