Audit of EXIM's Cybersecurity Program
Report Information
Recommendations
Initiate coordination with responsible agencies to develop and document an alternative methodology.
Update policies to ensure that pertinent system documentation is recorded and readily accessible, and systems.
Implement an automated tracking mechanism designated to create, review, and maintain specialized security training records for all employees and contractors.