Independent Audit of EXIM’s Information Security Program Effectiveness for Fiscal Year 2019
Report Information
Recommendations
Fully implement and configure continuous monitoring across all of the Bank’s information systems.
Appropriately configure continuous monitoring.
Perform and document evidence of a periodic review of the reported activity and perform research and resolution, as appropriate.