Independent Evaluation of the Security of NRC's Publicly Accessible Web Applications
Report Information
Recommendations
Develop and document procedures for ensuring publiclyaccessible Web applications are assigned a system ownerwith responsibility for ensuring adequate security measuresare in place for those applications.
Develop and document procedures for ensuring publiclyaccessible Web applications are incorporated into anapproved system authorization boundary and for clearlyidentifying those applications in system authorizationdocumentation.
Develop and document procedures for ensuring OHS isnotified of any changes to the population of publiclyaccessible Web applications to be included in the CyberHygiene scans.
Develop a plan and schedule to identify, review, and updateall NRC cyber security standards that have not beenupdated in the past 12 months.
Develop a plan and schedule for evaluating thevulnerabilities identified, determining the appropriate actionto address the vulnerability (e.g., mitigation, deviation, riskacceptance), and implementing the remedial actions.