Reports & Testimonies
Recommendations Database
GAO’s recommendations database contains report recommendations that still need to be addressed. GAO’s priority recommendations are those that we believe warrant priority attention. We sent letters to the heads of key departments and agencies, urging them to continue focusing on these issues. Below you can search only priority recommendations, or search all recommendations.
Our recommendations help congressional and agency leaders prepare for appropriations and oversight activities, as well as help improve government operations. Moreover, when implemented, some of our priority recommendations can save large amounts of money, help Congress make decisions on major issues, and substantially improve or transform major government programs or agencies, among other benefits.
As of October 25, 2020, there are 4812 open recommendations, of which 473 are priority recommendations. Recommendations remain open until they are designated as Closed-implemented or Closed-not implemented.
Browse or Search Open Recommendations
Have a Question about a Recommendation?
- For questions about a specific recommendation, contact the person or office listed with the recommendation.
- For general information about recommendations, contact GAO's Audit Policy and Quality Assurance office at (202) 512-6100 or apqa@gao.gov.
Results:
Subject Term: "Security incidents"
GAO-20-404, Apr 3, 2020
Phone: (202) 512-8777
Agency: Department of Homeland Security: Transportation Security Administration
Status: Open
Comments: TSA concurred with this recommendation and said it would take steps to implement it by updating the BASE Cybersecurity Security Action Item section to ensure it reflects the NIST Cybersecurity Framework Detect and Recover functions. When we confirm what actions TSA has taken in response to this recommendation, we will provide updated information.
GAO-19-545, Jul 26, 2019
Phone: (202) 512-6244
including 1 priority recommendation
Agency: Executive Office of the President: Office of Management and Budget
Status: Open
Priority recommendation
Comments: In January 2020, OMB officials stated that they have incorporated agency feedback for enhancing the CyberStat program into an updated concept of operations document that is currently in draft. To consider this recommendation fully implemented, OMB needs to provide us with an updated concept of operations document for the CyberStat program, and demonstrate the expansion of CyberStat review meetings to agencies that require additional assistance due to persistent information security deficiencies. As of September 2020, OMB has not provided sufficient evidence to close this recommendation.
Agency: Executive Office of the President: Office of Management and Budget
Status: Open
Comments: As of September 2020, we were still waiting to receive OMB's 180-day letter detailing the actions it plans to take to address the recommendation.
GAO-19-415, May 22, 2019
Phone: (202) 512-3841
Agency: Department of Homeland Security: United States Secret Service
Status: Open
Comments: In May 2019 we reported that the Secret Service had not met the established training target (25 percent of work time) and lacked a plan for achieving it. We therefore recommended that the Director of the Secret Service develop and implement a plan to ensure that special agents assigned to the Presidential Protective Division and the Vice Presidential Protective Division reach annual training targets given current and planned staffing levels. The agency concurred with our recommendation. Towards addressing this recommendation, in October 2019, the Secret Service reported that the Office of Protective Operations is currently soliciting training requirements from each internal operational division, including the Presidential and Vice Presidential Protective Divisions, to determine the appropriate amount of training and associated training hours for each division. They further reported that once reviewed, the training requirements are to inform the agency's revised Human Capital Strategic Plan. The revised Human Capital Strategic Plan is to include an overview of Office of Protective Operations' training requirements and corresponding staffing needs. The Secret Service anticipates a revised Human Capital Strategic Plan to be available by the end of January 2020. The Secret Service's efforts to reevaluate the training requirements and targets are a positive first step. However, Secret Service's actions are not fully consistent with the recommendation. Specifically, in its updated response, the Secret Service stated that training hours for Presidential Protective Division and Vice Presidential Protective Division special agents training will only increase once the agency nears its ultimate staffing target. This is inconsistent with our recommendation to establish a plan to ensure these special agents reach annual training targets given current staffing levels. In the interim, affected special agents may continue to lack training required to prevent security breaches, such as that of September 19, 2019, when an intruder jumped the north fence and entered the White House. We will continue to monitor the Secret Service's progress in implementing this recommendation.
Agency: Department of Homeland Security: United States Secret Service
Status: Open
Comments: In May 2019 we reported that training data collected on the Secret Service's Uniform Division were incomplete and in certain cases unrelated to protection or lacked descriptions to clearly link the training to required skills. Further, the process used to capture the data was not consistently employed and did not include information on how or whether to capture internal on-the-job training instances, or instruction on the type of training to be captured to demonstrate that the training is protection-related training. We therefore recommended that the Director of the Secret Service develop and implement a policy that documents the process for collecting complete Uniformed Division officer training data and establishes the types of information that should be collected. The Secret Service, through DHS, concurred with our recommendation, stating that it would develop rigorous and uniform standards for collecting and reporting training data related to the Uniformed Division branch, and would work to capture additional training information. In response to our recommendation, in October 2019 the Secret Service reported that the Uniformed Division has worked with the Office of Training and Performance and Learning Management System (PALMS) team to capture Uniformed Division training requirements. The requirements are to include the 20 formalized on-the-job training programs for officers assigned to the Uniformed Division's White House, Foreign Missions, and Naval Observatory Branches, or one of the Special Operations Branch specialized units. In addition, the Secret Service stated that approximately 19 micro-training courses (also known as Roll Call Training) are currently captured within PALMS-the Department of Homeland Security's learning management system -and additional formalized on-the-job training programs are being reviewed for inclusion in PALMS. According to the Secret Service, use of PALMS should help ensure that the process for collecting and recording Uniformed Officer training is standardized and monitored. The Secret Service's efforts to capture additional training information in PALMS is a positive development. However, we have not yet observed progress towards the Secret Service's implementation of a policy that documents the process for collecting complete Uniformed Division officer training data and establishes the types of information that should be collected, as we recommended. We will continue to monitor the Secret Service's progress in implementing this recommendation.
GAO-19-340, May 9, 2019
Phone: (202) 512-9110
including 1 priority recommendation
Agency: Congress
Status: Open
Comments: No action has been taken on this matter as of December 2019.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Priority recommendation
Comments: In its initial response to our draft report, IRS disagreed with this recommendation. In November 2019, IRS said that it agreed with the intent of the recommendation, but did not agree to implement it, citing the need for additional explicit authority to establish security requirements for the information systems of paid preparers and others who electronically file. IRS reported that to effectively establish data safeguarding policies and implement strategies enforcing compliance with those policies, a centralized leadership structure requires the statutory authority that clearly communicates the authority of the IRS to do so. Without such authority, implementing the recommendation would be an inefficient, ineffective, and costly use of resources, according to IRS. We disagree that convening a governance structure or other centralized form of leadership would require additional statutory authority or be inefficient, ineffective, and costly. As discussed in the report, IRS has seven different offices across the agency working on information security-related activities that could benefit from centralized oversight and coordination, such as updating existing standards, monitoring Authorized e-file Provider program compliance, and tracking security incident reports.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Comments: In its initial response to our draft report, IRS disagreed with this recommendation. In November 2019, IRS said it agreed with this recommendation and would update IRS Publication 1345, Handbook for Authorized IRS e-File Providers of Individual Income Tax Returns, to include security elements that are consistent with the FTC Safeguards Rule. IRS plans to update the publication by November 2020.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Comments: In its initial response to our draft report, IRS disagreed with this recommendation. In November 2019, IRS stated it was in agreement with the intent of this recommendation; however, IRS does not plan to implement it without additional statutory authority to require Authorized e-file Provider Program participants to comply with the NIST Special Publication 800-53. We continue to believe that under IRS's existing authority, IRS has already established some information security requirements for a portion of tax software providers, those that are online providers. IRS has the opportunity to further establish standards for all tax software providers by incorporating the subset of NIST controls into its Authorized e-file Provider program, which would capitalize on the work it has completed with the Security Summit members.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Comments: IRS agreed with this recommendation and in November 2019 said that it will update IRS Publication 1345, Handbook for Authorized IRS e-File Providers of Individual Income Tax Returns, with a formal memorandum to all internal stakeholders during the annual review process. IRS plans to take this action by November 2020.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Comments: In its initial response to our draft report, IRS disagreed with this recommendation. In November 2019, IRS stated it was in agreement with the intent of this recommendation; however, it does not plan to implement it. IRS reported it does not have the statutory authority to establish policy on information security and cybersecurity issues, nor to enforce compliance if noncompliance is observed. Additionally, IRS said that the specialized technical skills required to monitor compliance with information and cybersecurity standards, should statutory authority be granted, would require additional funding to meet those monitoring needs. However, as we reported, IRS already monitors physical aspects of information security, which goes beyond existing Authorized e-file Provider program requirements. Since most individuals now file tax returns electronically, having checks for physical security without comparable checks for cybersecurity does not address current risks, as cyber criminals and fraudsters are increasingly attacking third-party providers, as IRS has noted. We believe that incorporating some basic cybersecurity monitoring into the visits would provide IRS the opportunity to help inform the most vulnerable third-party providers of additional guidance and resources.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Comments: In its initial response to our draft report, IRS disagreed with this recommendation. In November 2019, IRS said it agreed with the intent of this recommendation; however it does not plan to implement it. IRS stated that absent statutory authority and funding, an assessment of the different monitoring approaches is moot. We disagree with this conclusion. As discussed in the report, IRS does not systematically monitor the existing security requirements for online providers, nor does it conduct information security or cybersecurity monitoring for all types of Authorized e-file Providers. We believe that IRS could conduct a risk assessment of its current monitoring program within existing statutory authority and make necessary changes that would provide better assurance that all types of providers are receiving some level of oversight and that IRS is addressing the greatest risk areas appropriately.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Comments: IRS agreed with this recommendation and in November 2019 said that it would develop a standardized process for all Authorized e-file Providers to report security incidents to IRS. IRS said it plans to update IRS Publication 1345, Handbook for Authorized IRS e-File Providers of Individual Income Tax Returns, to include this standardized process by November 2020.
Agency: Department of the Treasury: Internal Revenue Service
Status: Open
Comments: In its initial response to our draft report, IRS agreed with this recommendation. In November 2019, IRS said it agreed with this recommendation with respect to the formal process for tax professionals to report data breaches to the IRS through the Stakeholder Liaison function within the Communications and Liaison organization. According to IRS, procedures are documented in the Data Breach Incident Reporting Instructions that are followed during the intake process. IRS said that upon completion, the breach information is disseminated to other offices within the IRS, depending on the nature of the breach incident reported. According to IRS, all 2018 and 2019 Tax Pro Data Breach incidents remain stored in the Data Breach module of the Return Preparer Database. We will follow up to confirm the information IRS described and determine if these procedures cover all of the IRS offices included in our report.
Phone: (202) 512-2834
Agency: Department of Veterans Affairs
Status: Open
Comments: Shortly after the issuance of the report, VA notified GAO that it was in the process of working with the lnteragency Security Committee (ISC) to update its vulnerability assessment program, with a target completion date of January 2019. Despite multiple attempts, as of June 2020, VA has not provided any information on its progress in updating its program.
Agency: Department of Veterans Affairs
Status: Open
Comments: Shortly after the issuance of the report, VA notified GAO that it had identified OS&LE as the internal entity responsible for conducting a complete review of VA's current risk management policies and processes for VA facilities and that it was reviewing an ISC-certified risk assessment tool for possible implementation consideration. Despite multiple attempts, as of June 2020, VA had not provided an update on its efforts to implement this recommendation.