Recommendations

933
755
Open Recommendations
816
Closed in Last Year
Age of Open Recommendations
522
Open Less Than 1 Year
231
Open Between 1-5 Years
5
Open More Than 5 Years
Key
Open Less Than 1 Year
Open Between 1-5 Years
Open More Than 5 Years
Closed
Total Recommendations found,
Total Reports found.
ID Report Number Report Title Type
14-01820-355 Federal Information Security Management Act Audit for Fiscal Year 2014 Audit

1
We recommended the Executive in Charge for Information and Technology fully develop policy to address Federal requirements and implement an agency-wide risk management governance structure, along with mechanisms to identify, monitor, and manage risks across the enterprise. (This is a repeat recommendation from prior years.)
Closure Date:
2
We recommended the Executive in Charge for Information and Technology implement mechanisms to ensure sufficient supporting documentation is captured in the central Governance Risk and Compliance tool to justify closure of Plans of Action and Milestones. (This is a modified repeat recommendation from last year.)
Closure Date:
3
We recommended the Executive in Charge for Information and Technology implement clear roles, responsibilities, and accountability for developing, maintaining, completing, and reporting Plans of Action and Milestones. (This is a modified repeat recommendation from prior years.)
Closure Date:
4
We recommended the Executive in Charge for Information and Technology implement mechanisms to ensure Plans of Action and Milestones are updated to accurately reflect current status information. (This is a repeat recommendation from prior years.)
Closure Date:
5
We recommended the Executive in Charge for Information and Technology develop mechanisms to ensure system security plans reflect current operational environments, including accurate system interconnections, boundary, and ownership information. (This is a modified repeat recommendation from last year.)
Closure Date:
6
We recommended the Executive in Charge for Information and Technology implement improved processes for updating key security documents such as risk assessments, Privacy Impact Assessments, and security control assessments on an annual basis and ensure all required information accurately reflects the current environment. (This is a modified repeat recommendation from last year.)
Closure Date:
7
We recommended the Executive in Charge for Information and Technology implement mechanisms to enforce VA password policies and standards on all operating systems, databases, applications, and network devices. (This is a repeat recommendation from prior years.)
Closure Date:
8
We recommended the Executive in Charge for Information and Technology implement periodic access reviews to minimize access by system users with incompatible roles, permissions in excess of required functional responsibilities, and unauthorized accounts. (This is a repeat recommendation from prior years.)
Closure Date:
9
We recommended the Executive in Charge for Information and Technology enable system audit logs and conduct centralized reviews of security violations on mission-critical systems. (This is a repeat recommendation from prior years.)
Closure Date:
10
We recommended the Executive in Charge for Information and Technology implement two-factor authentication for remote access throughout the agency. (This is a repeat recommendation from prior years.)
Closure Date:
11
We recommended the Executive in Charge for Information and Technology implement mechanisms to ensure all remote access computers have updated security patches and antivirus definitions prior to connecting to VA information systems. (This is a repeat recommendation from prior years.)
Closure Date:
12
We recommended the Executive in Charge for Information and Technology implement more effective automated mechanisms to continuously identify and remediate security deficiencies on VA¿s network infrastructure, database platforms, and Web application servers. (This is a modified repeat recommendation from last year.)
Closure Date:
13
We recommended the Executive in Charge for Information and Technology implement a more effective patch and vulnerability management program to address security deficiencies identified during our assessments of VA¿s Web applications, database platforms, network infrastructure, and work stations. (This is a modified repeat recommendation from last year.)
Closure Date:
14
We recommended the Executive in Charge for Information and Technology implement improved processes for monitoring standard security configuration baselines for all VA operating systems, databases, applications, and network devices. (This is a modified repeat recommendation from last year.)
Closure Date:
15
We recommended the Executive in Charge for Information and Technology implement improved network access controls to ensure medical devices and tenant networks are appropriately segregated from general networks and mission-critical systems. (This is a new recommendation)
Closure Date:
16
We recommended the Executive in Charge for Information and Technology consolidate the security responsibilities for tenant networks present under a common control for each site and ensure vulnerabilities are remediated in a timely manner. (This is a new recommendation)
Closure Date:
17
We recommended the Executive in Charge for Information and Technology implement procedures to enforce a standardized system development and change control framework that integrates information security throughout the life cycle of each system. (This is a modified repeat recommendation from last year.)
18
We recommended the Executive in Charge for Information and Technology implement processes to ensure information system contingency plans are updated with the required information. (This is a modified repeat recommendation from last year.)
Closure Date:
19
We recommended the Executive in Charge for Information and Technology develop and implement a process for ensuring the encryption of backup data prior to transferring the data offsite for storage. (This is a repeat recommendation from prior years.)
Closure Date:
20
We recommended the Executive in Charge for Information and Technology implement more effective agency-wide incident response procedures to ensure timely resolution of computer security incidents in accordance with VA set standards. (This is a repeat recommendation from prior years.)
Closure Date:
21
We recommended the Executive in Charge for Information and Technology identify all external network interconnections and implement improved processes for monitoring VA networks, systems, and exchanges for unauthorized activity. (This is a modified repeat recommendation from last year.)
Closure Date:
22
We recommended the Executive in Charge for Information and Technology implement and monitor incident response metrics to assist in tracking and remediating all cybersecurity events. (This is a new recommendation)
Closure Date:
23
We recommended the Executive in Charge for Information and Technology develop a listing of approved software and implement continuous monitoring processes to identify and prevent the use of unauthorized application software, hardware, and system configurations on its networks. (This is a repeat recommendation from prior years.)
Closure Date:
24
We recommended the Executive in Charge for Information and Technology develop a comprehensive software inventory process to identify major and minor software applications used to support VA programs and operations. (This is a repeat recommendation from prior years.)
Closure Date:
25
We recommended the Executive in Charge for Information and Technology implement procedures for overseeing contractor-managed, cloud-based systems and ensuring information security controls adequately protect VA sensitive systems and data. (This is a modified repeat recommendation from last year.)
Closure Date:
26
We recommended the Executive in Charge for Information and Technology implement mechanisms for updating the Federal Information Security Management Act systems inventory, including contractor-managed systems and interfaces, and annually review the systems inventory for accuracy. (This is a repeat recommendation from prior years.)
Closure Date:
27
We recommended the Executive in Charge for Information and Technology implement mechanisms to ensure all users with VA network access participate in and complete required VA-sponsored security awareness training. (This is a repeat recommendation from prior years.)
Closure Date:
28
We recommended the Executive in Charge for Information and Technology develop guidance and procedures to integrate information security costs into the capital planning process while ensuring traceability of Plans of Action and Milestones remediation costs to appropriate capital planning budget documents.
Closure Date:
29
We recommended the Assistant Secretary for Information and Technology develop mechanisms to ensure risk assessments accurately reflect the current control environment, compensating controls, and the characteristics of the relevant VA facilities.
Closure Date:
30
We recommended the Assistant Secretary for Information and Technology update all applicable position descriptions to better describe position sensitivity levels, and improve documentation of employee/contractor personnel records of ¿Rules of Behavior¿ and annual privacy training certifications.
Closure Date:
31
We recommended the Assistant Secretary for Information and Technology ensure appropriate levels of background investigations be completed for all applicable VA employees and contractors in a timely manner, implement processes to monitor and ensure timely reinvestigations on all applicable employees and contractors, and monitor the status of the requested investigations.
Closure Date:
32
We recommended the Assistant Secretary for Information and Technology reduce wireless security vulnerabilities by ensuring sites have up-to-date mechanisms to protect against interception of wireless signals and unauthorized access to the network, and ensure the wireless network is segmented from the general network.
Closure Date:
33
We recommended the Assistant Secretary for Information and Technology identify and deploy solutions to encrypt sensitive data and resolve clear text protocol vulnerabilities.
Closure Date:
14-04876-204 Inspection of VA Regional Office Indianapolis, Indiana Review

1
We recommended the Indianapolis VA Regional Office Director develop and implement a plan to ensure staff take timely action on reminder notifications to request medical reexaminations.
Closure Date:
2
We recommended the Indianapolis VA Regional Office Director conduct a review of the 353 temporary 100 percent disability evaluations remaining from their inspection universe as of September 2, 2014, and take appropriate action.
Closure Date:
3
We recommended the Indianapolis VA Regional Office Director implement plans to ensure the effectiveness of training conducted on processing claims for Special Monthly Compensation and ancillary benefits.
Closure Date:
4
We recommended the Indianapolis VA Regional Office Director implement a plan to ensure claims processing staff prioritize actions related to benefits reductions to minimize improper payments to veterans.
Closure Date:
15-00075-351 Combined Assessment Program Review of the VA St. Louis Health Care System, St. Louis, Missouri Comprehensive Healthcare Inspection Program
15-00112-338 Review of Community Based Outpatient Clinics and Other Outpatient Clinics of VA Puget Sound Health Care System, Seattle, Washington Comprehensive Healthcare Inspection Program
15-00076-350 Combined Assessment Program Review of the VA Nebraska-Western Iowa Health Care System, Omaha, Nebraska Comprehensive Healthcare Inspection Program
14-03380-356 FY 2014 Review of VA’s Compliance With the Improper Payments Elimination and Recovery Act Audit
15-00126-342 Review of Community Based Outpatient Clinics and Other Outpatient Clinics of VA Boston Healthcare System, Boston, Massachusetts Comprehensive Healthcare Inspection Program
15-00124-227 Review of Community Based Outpatient Clinics and Other Outpatient Clinics of VA Nebraska-Western Iowa Health Care System, Omaha, Nebraska Comprehensive Healthcare Inspection Program

1
We recommended that fire drills are performed every 12 months at the O’Neill VA Clinic.
2
We recommended that Clinic Registered Nurse Care Managers receive motivational interviewing training within 12 months of appointment to Patient Aligned Care Teams.
3
We recommended that providers and clinical associates in the outpatient clinics receive health coaching training within 12 months of appointment to Patient Aligned Care Teams.
4
We recommended that the Facility Director develops policies and procedures that facilitate human immunodeficiency virus testing as part of routine medical care for patients.
5
We recommended that clinicians provide human immunodeficiency virus testing as part of routine medical care for patients and that compliance is monitored.
15-00129-339 Review of Community Based Outpatient Clinics and Other Outpatient Clinics of VA Roseburg Healthcare System, Roseburg, Oregon Comprehensive Healthcare Inspection Program
15-00110-228 Review of Community Based Outpatient Clinics and Other Outpatient Clinics of VA Palo Alto Health Care System, Palo Alto, California Comprehensive Healthcare Inspection Program
11259