Audit Report 14-12: Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review
… the following 11 areas: configuration management identity and access management risk management continuous … needs to further establish its configuration management, identity and access management, risk management, and …