"Develop and implement a process to perform continuous monitoring activities to
fully evaluate third-party providers’ information technology environments for security changes or threats."
"Develop and implement a process to perform continuous monitoring activities to
fully evaluate third-party providers’ information technology environments for security changes or threats."
Date Issued
Recommendation Number
2
Status
Open
Significant Recommendation
No
Questioned Costs
$0
Funds for Better Use
$0