Federal Information Security Modernization Act
Report Information
Recommendations
We recommend the Vice President, Chief Information and Digital Officer, Information Technology, consistently implement the defined policies, procedures, and processes for developing and maintaining a comprehensive and accurate inventory for public-facing websites.
We recommend the Vice President, Chief Information and Digital Officer, Information Technology, implement, assess, and maintain common secure configuration settings for all information systems.
We recommend the Vice President, Chief Information and Digital Officer, Information Technology, incorporate vulnerability scanning into the Continuous Diagnostics and Mitigation dashboard in accordance with Binding Operational Directive 23-01, in coordination with Department of Homeland Security as necessary.
We recommend the Vice President, Chief Information and Digital Officer, Information Technology, refine the profiles periodically based on known risk exposure and residual risk, align cybersecurity profiles with risk strategy, and periodically monitor and report on progress in reaching TVA’s target profile.
We recommend the Vice President, Chief Information and Digital Officer, Information Technology, verify the data and corresponding metadata in the data inventories are subject to the monitoring processes defined within TVA’s Information Security Continuous Monitoring strategy.