U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Open Recommendations


The Department of Energy’s Management of the ActioNet Information Technology Support Contract


Management Letter on the Southwestern Federal Power System’s Fiscal Year 2018 Financial Statement Audit

Coordinate with the Corps to Further establish review controls where power accountants review individual projects at year end to ensure Construction in Progress projects are placed in service in a timely manner. Coordinate with the Corps to Establish…

Recommendation Number
11
Open

Coordinate with the Corps to Further establish review controls where power accountants review individual projects at year end to ensure Construction in Progress projects are placed in service in a timely manner. Coordinate with the Corps to Establish review controls to ensure IDC is recorded only for eligible projects. Coordinate with the Corps to enhance existing procedures over review of power reports to ensure that all applicable revenue is included for each project. Coordinate with the Corps to Enhance existing procedures and related controls to ensure that items in the Construction in Progress accounts are placed in service in a timely manner.


Sandia National Laboratories’ Verification of Certificates of Conformance for Nuclear Weapon and Weapon-Related Products


The Department of Energy’s Fiscal Year 2023 Consolidated Financial Statements

We recommend that the Manager, PPPO, direct the Deputy Manager, PPPO to:3. Refine and implement the policies and procedures of the control governing manual review of risk register data prior to submission of the change requests to allow for more precise…

Recommendation Number
3
Open

We recommend that the Manager, PPPO, direct the Deputy Manager, PPPO to:3. Refine and implement the policies and procedures of the control governing manual review of risk register data prior to submission of the change requests to allow for more precise and reasonable estimates of the environmental liability at PPPO.

We recommend that the Manager, PPPO, direct the Deputy Manager, PPPO to:3. Refine and implement the policies and procedures of the control governing manual review of risk register data prior to submission of the change requests to allow for more precise…

Recommendation Number
3
Open

We recommend that the Manager, PPPO, direct the Deputy Manager, PPPO to:3. Refine and implement the policies and procedures of the control governing manual review of risk register data prior to submission of the change requests to allow for more precise and reasonable estimates of the environmental liability at PPPO.

We recommend that the Manager, PPPO:4. Refine and implement the policies and procedures of the risk register review control to properly review, identify, and discuss inaccurate information and inputs to specific risks as part of risk register updates.

Recommendation Number
4
Open

We recommend that the Manager, PPPO:4. Refine and implement the policies and procedures of the risk register review control to properly review, identify, and discuss inaccurate information and inputs to specific risks as part of risk register updates.

We recommend that the Manager, PPPO:4. Refine and implement the policies and procedures of the risk register review control to properly review, identify, and discuss inaccurate information and inputs to specific risks as part of risk register updates.

Recommendation Number
4
Open

We recommend that the Manager, PPPO:4. Refine and implement the policies and procedures of the risk register review control to properly review, identify, and discuss inaccurate information and inputs to specific risks as part of risk register updates.

Refine the policies and procedures of the control governing manual review of census data prior to submissions to allow for a narrower degree of precision required to detect and correct errors or discrepancies between LBNL and Redwood in a timely manner

Recommendation Number
5
Open

Refine the policies and procedures of the control governing manual review of census data prior to submissions to allow for a narrower degree of precision required to detect and correct errors or discrepancies between LBNL and Redwood in a timely manner

Refine the policies and procedures of the control governing manual review of census data prior to submissions to allow for a narrower degree of precision required to detect and correct errors or discrepancies between LBNL and Redwood in a timely manner

Recommendation Number
5
Open

Refine the policies and procedures of the control governing manual review of census data prior to submissions to allow for a narrower degree of precision required to detect and correct errors or discrepancies between LBNL and Redwood in a timely manner

We recommend that the Director, Office of Finance and Accounting, and the Office of Science’s Designated Financial Officer enhance and implement existing policies and procedures to specifically assess the risk of misstatement presented by stale UCOs left…

Recommendation Number
6B
Open

We recommend that the Director, Office of Finance and Accounting, and the Office of Science’s Designated Financial Officer enhance and implement existing policies and procedures to specifically assess the risk of misstatement presented by stale UCOs left uncosted as of the year-end financial reporting date.

We recommend that the Manager, PPPO:7. Enhance communication down and across the entity's reporting line to readily obtain and provide evidence necessary to support the internal controls systems and demonstrate that "stale" undelivered…

Recommendation Number
7
Open

We recommend that the Manager, PPPO:7. Enhance communication down and across the entity's reporting line to readily obtain and provide evidence necessary to support the internal controls systems and demonstrate that "stale" undelivered order balances are still valid as of the year-end financial reporting date.

We recommend that the Manager, PPPO:7. Enhance communication down and across the entity's reporting line to readily obtain and provide evidence necessary to support the internal controls systems and demonstrate that "stale" undelivered…

Recommendation Number
7
Open

We recommend that the Manager, PPPO:7. Enhance communication down and across the entity's reporting line to readily obtain and provide evidence necessary to support the internal controls systems and demonstrate that "stale" undelivered order balances are still valid as of the year-end financial reporting date.


The Department of Energy’s Unclassified Cybersecurity Program for Fiscal Year 2023

Implement system access authorization processes for Splunk administrators to include separation of duties controls. When separation of duties cannot be achieved for conflicting roles, assess the risk and document the control deviation and risk-based…

Recommendation Number
2A
Open

Implement system access authorization processes for Splunk administrators to include separation of duties controls. When separation of duties cannot be achieved for conflicting roles, assess the risk and document the control deviation and risk-based decisions.

Implement system access authorization processes for Splunk administrators to include separation of duties controls. When separation of duties cannot be achieved for conflicting roles, assess the risk and document the control deviation and risk-based…

Recommendation Number
2A
Open

Implement system access authorization processes for Splunk administrators to include separation of duties controls. When separation of duties cannot be achieved for conflicting roles, assess the risk and document the control deviation and risk-based decisions.

We recommend that the Manager, Thomas Jefferson Site Office (TJSO), direct Jefferson Science Associates, LLC (JSA) to ensure application security controls are implemented in the Management Information System (MIS) portal to protect against known types of…

Recommendation Number
8A
Open

We recommend that the Manager, Thomas Jefferson Site Office (TJSO), direct Jefferson Science Associates, LLC (JSA) to ensure application security controls are implemented in the Management Information System (MIS) portal to protect against known types of attacks, including cross-site scripting and unauthorized actions.

We recommend that the Manager, Thomas Jefferson Site Office (TJSO), direct Jefferson Science Associates, LLC (JSA) to ensure application security controls are implemented in the Management Information System (MIS) portal to protect against known types of…

Recommendation Number
8A
Open

We recommend that the Manager, Thomas Jefferson Site Office (TJSO), direct Jefferson Science Associates, LLC (JSA) to ensure application security controls are implemented in the Management Information System (MIS) portal to protect against known types of attacks, including cross-site scripting and unauthorized actions.

We recommend that the Manager, TJSO, direct JSA to update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process and monitoring patching tools to ensure patches are…

Recommendation Number
9A
Open

We recommend that the Manager, TJSO, direct JSA to update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process and monitoring patching tools to ensure patches are applied as intended.

We recommend that the Manager, TJSO, direct JSA to update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process and monitoring patching tools to ensure patches are…

Recommendation Number
9A
Open

We recommend that the Manager, TJSO, direct JSA to update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process and monitoring patching tools to ensure patches are applied as intended.

We recommend that the Manager, TJSO, direct JSA to enhance operational vulnerability management procedures to include regular credentialed scanning and centralized software management to ensure vulnerabilities are appropriately monitored and patches are…

Recommendation Number
9B
Open

We recommend that the Manager, TJSO, direct JSA to enhance operational vulnerability management procedures to include regular credentialed scanning and centralized software management to ensure vulnerabilities are appropriately monitored and patches are applied as intended.

We recommend that the Manager, TJSO, direct JSA to enhance operational vulnerability management procedures to include regular credentialed scanning and centralized software management to ensure vulnerabilities are appropriately monitored and patches are…

Recommendation Number
9B
Open

We recommend that the Manager, TJSO, direct JSA to enhance operational vulnerability management procedures to include regular credentialed scanning and centralized software management to ensure vulnerabilities are appropriately monitored and patches are applied as intended.

Enhance operational vulnerability and software patch management procedures to ensure vulnerabilities that cannot be patched, such as configuration weaknesses and unsupported software, are investigated and resolved in a timely manner, or implement a risk…

Recommendation Number
13B
Open

Enhance operational vulnerability and software patch management procedures to ensure vulnerabilities that cannot be patched, such as configuration weaknesses and unsupported software, are investigated and resolved in a timely manner, or implement a risk acceptance or POA&Ms process.

Enhance operational vulnerability and software patch management procedures to ensure vulnerabilities that cannot be patched, such as configuration weaknesses and unsupported software, are investigated and resolved in a timely manner, or implement a risk…

Recommendation Number
13B
Open

Enhance operational vulnerability and software patch management procedures to ensure vulnerabilities that cannot be patched, such as configuration weaknesses and unsupported software, are investigated and resolved in a timely manner, or implement a risk acceptance or POA&Ms process.

We continue to recommend that the Manager, Fermi Site Office, direct Fermi Research Alliance, LLC to update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process and…

Recommendation Number
14A
Open

We continue to recommend that the Manager, Fermi Site Office, direct Fermi Research Alliance, LLC to update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process and monitoring patching tools to ensure patches are applied, as intended.

We continue to recommend that the Manager, Fermi Site Office, direct Fermi Research Alliance, LLC to enhance operational vulnerability management procedures to ensure vulnerabilities that cannot be patched, such as configuration weaknesses and…

Recommendation Number
14B
Open

We continue to recommend that the Manager, Fermi Site Office, direct Fermi Research Alliance, LLC to enhance operational vulnerability management procedures to ensure vulnerabilities that cannot be patched, such as configuration weaknesses and unsupported software, are validated as unfixable, required for the mission, and mitigated to an acceptable risk with Authorizing Official concurrence.

Update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process, monitoring vendor patch releases and end-of-life notifications, and monitoring patching tools to ensure…

Recommendation Number
15A
Open

Update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process, monitoring vendor patch releases and end-of-life notifications, and monitoring patching tools to ensure patches are applied, as intended.

Update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process, monitoring vendor patch releases and end-of-life notifications, and monitoring patching tools to ensure…

Recommendation Number
15A
Open

Update the vulnerability remediation process, including monitoring corrective actions for vulnerabilities identified during the scanning process, monitoring vendor patch releases and end-of-life notifications, and monitoring patching tools to ensure patches are applied, as intended.

Identify all servers, workstations, and networked devices within the WARS boundary that are necessary for its successful operation. Remove any unnecessary assets, update system documentation to include relevant details, monitor the WARS for future…

Recommendation Number
17A
Open

Identify all servers, workstations, and networked devices within the WARS boundary that are necessary for its successful operation. Remove any unnecessary assets, update system documentation to include relevant details, monitor the WARS for future changes, and maintain an accurate asset list.

Identify all servers, workstations, and networked devices within the WARS boundary that are necessary for its successful operation. Remove any unnecessary assets, update system documentation to include relevant details, monitor the WARS for future…

Recommendation Number
17A
Open

Identify all servers, workstations, and networked devices within the WARS boundary that are necessary for its successful operation. Remove any unnecessary assets, update system documentation to include relevant details, monitor the WARS for future changes, and maintain an accurate asset list.

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions: C. Install endpoint…

Recommendation Number
17C
Open

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions: C. Install endpoint protection software on all applicable servers, workstations, and networked devices and ensure that this software can receive regular updates.

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions: C. Install endpoint…

Recommendation Number
17C
Open

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions: C. Install endpoint protection software on all applicable servers, workstations, and networked devices and ensure that this software can receive regular updates.

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions:D. Disable unencrypted…

Recommendation Number
17D
Open

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions:D. Disable unencrypted services and replace them with alternate services that are configured to use strong encryption. Establish a configuration monitoring process to prevent future use of unencrypted services and services using weak encryption settings.

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions:D. Disable unencrypted…

Recommendation Number
17D
Open

We continue to recommend that the Manager, ORNL Site Office, direct the contractor responsible for operating the WARS to implement security controls to correct the identified vulnerabilities by taking the following actions:D. Disable unencrypted services and replace them with alternate services that are configured to use strong encryption. Establish a configuration monitoring process to prevent future use of unencrypted services and services using weak encryption settings.

"Finalize implementation of the updated vulnerability management plan to ensure corrective actions for vulnerabilities identified are applied to effectively implement patches and fixes, as required. If required remediation timelines cannot be…

Recommendation Number
18B
Open

"Finalize implementation of the updated vulnerability management plan to ensure corrective actions for vulnerabilities identified are applied to effectively implement patches and fixes, as required. If required remediation timelines cannot be adhered to, consistently document the risk acceptance, business rationale, and/or technical issue(s) related to vulnerability remediation."


The Department of Energy’s Ransomware Countermeasures and Response

Conduct an analysis or risk assessment that evaluates ransomware threats and the cost to fully recover from a ransomware event, including considerations in the Department’s guidance on Analyzing Ransomware Risk: A Blueprint for Quantification.

Recommendation Number
1
Open

Conduct an analysis or risk assessment that evaluates ransomware threats and the cost to fully recover from a ransomware event, including considerations in the Department’s guidance on Analyzing Ransomware Risk: A Blueprint for Quantification.


Implementation and Administration of the Human Reliability Program at the Savannah River Site


Opportunities Exist to Improve Bonneville Power Administration’s Management of Fish and Wildlife Program Contracts

CO make a determination regarding the allowability of questioned costs identified in this report, recover those amounts determined to be unallowable, and determine whether additional steps are needed to validate the allowability of costs.

Recommendation Number
8
Open

CO make a determination regarding the allowability of questioned costs identified in this report, recover those amounts determined to be unallowable, and determine whether additional steps are needed to validate the allowability of costs.