Independent Evaluation of NRC’s Implementation of the Federal Information Security Modernization Act of 2014 For Fiscal Year 2019
Report Information
Recommendations
Fully define NRC’s ISA across the enterprise and businessprocesses and system levels.
a Use the fully defined ISA to assess enterprise, business process, and information system level risks.
b. Use the fully defined ISA to update the list of high value assets by considering risks from the supporting business functions and mission impacts.
c. Use the fully defined ISA to formally define enterprise, business process, and information system level risk tolerance and appetite levels necessary for prioritizing and guiding risk management decisions.
d. Use the fully defined ISA to conduct an organization-wide security and privacy risk assessment.
e. Use the fully defined ISA to conduct a supply chain risk assessment.
f. Use the fully defined ISA to identify and update NRC risk management policies, procedures, and strategy.
OIG Analysis: The OIG will close this recommendation after confirming that NRC has used the fully defined ISA [Information Security Architecture] to formally define enterprise, business process, information system level risk tolerance, and appetite levels necessary for prioritizing and guiding risk management decisions. Status: Open: Resolved.<br />
Identify and implement a software whitelisting tool to detectauthorized software and block the risk of unauthorized software on its network.
Perform an assessment of role-based privacy training gaps.
Identify individuals having specialized role-based responsibilities for PII or activities involving PII and develop role-based privacy training for them.
OIG Analysis: The OIG will close this recommendation after getting assurance from evidence that the agency has identified individuals having specialized role-based responsibilities for PII [personally identifiable information] or activities involving PII and has developed role-based privacy training for them. Status: Open: Resolved.