Beta This is a new resource - your feedback will help us improve it. Learn More.
Recommendations Tracker
HHS-OIG provides independent and objective oversight that promotes economy, efficiency, and effectiveness in HHS programs and operations. To drive this positive change, we produce reports and identify recommendations for improvement. We have developed this public-facing page for tracking all of our open recommendations.
Use the “Top Unimplemented” View below to read OIG’s Top Unimplemented Recommendations—a subset that we think, if implemented, would have the most impact (learn more). Notable differences from our previous Top Unimplemented Recommendations report include:
- The list is comprised of individual recommendations from OIG reports, not rolled up by topic.
- No arbitrary cap is imposed on the number of recommendations included.
- Status updates as recommendations are implemented.
Summary of All Recommendations
Updated Monthly · Last updated on May 15, 2025
1,185
Unimplemented
recommendations
2,961
Implemented and Closed
recommendations since FY 2017
Views
OIG Recommendations Grouped by Report
-
Review of the Department of Health and Human Services' Compliance with the Federal Information Security Modernization Act of 2014 for Fiscal Year 2019
20-A-18-084.01HHS should commit to creating and implementing a Cybersecurity Maturity Migration Strategy to advance the cybersecurity program from its current maturity state to an effective state across HHS. This strategy should include the following. Perform a risk assessment and identify the optimal maturity level that achieves cost-effective security based on your missions and risks faced, risk appetite, and risk tolerance level. Identify gaps between the current state at each OPDIV and the criteria required to reach the optimal level across HHS' enterprise-wide cybersecurity program and develop security controls to implement effective security. Ensure the requirements for all metrics is Consistently Implemented or higher are achieved. Articulate roles and shared responsibilities needed to meet the requirements for effective maturity, including whether requirements are to be implemented through centralized, federated, or hybrid controls.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.02HHS should continue to provide department-wide guidance and DHS-supplied Continuous Diagnostics and Mitigation (CDM) tools to each OPDIV for the implementation of their ISCM programs.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.03The Information Security and Privacy Policy (IS2P) is HHS' primary policy document governing cybersecurity which is pending a rewrite to address the upcoming requirements in NIST 800-53 revision 5. When this update occurs to the IS2P, HHS should specify required cybersecurity control maturity levels in addition to identifying the selection of NIST controls; describe HHS' Cybersecurity Shared Responsibility Model, including the key roles under centralized, federated and hybrid strategies for control implementation; include responsibilities of the OCIO, the OPDIVs, and third-party stakeholders (including contractors); and communicate that a Managed and Measurable or the optimal maturity level, based on HHS's risk assessment, be required to be deemed “Effective".- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.04We recommend that the HHS OCIO work with the OPDIVs to review the monthly reconciliation report, currently provided by the HHS OCIO, to ensure that discrepancies on the POA&M exception report are corrected to enable accurate OPDIV and Department-level reporting.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.05We recommend that the HHS OCIO work with the OPDIVs to ensure that the OPDIVs cybersecurity management create and implement a patch management strategy to ensure that patches are installed timely as required by HHS and Federal requirements.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.06We recommend that the HHS OCIO work with the OPDIVs to develop and document an enterprise-wide configuration management plan that allows for OPDIV-level and system-level configuration management plans to be created and implemented in alignment with the higher-level enterprise plans, to ensure that changes implemented at the system level are consistent with and made only after approval by the OPDIV, and that an HHS level plan defines the role of the OPDIVs for the creation, implementation and execution of OPDIV-specific configuration management plans.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.07We recommend that the HHS OCIO work with the OPDIVs to identify roles of stakeholders to ensure proper identification of responsibilities in a shared responsibility environment.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.08We recommend that the HHS OCIO work with the OPDIVs to communicate the enterprise-wide configuration management plan to all HHS system owners and stakeholders.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.09We recommend that the HHS OCIO work with the OPDIVs to implement the enterprise-wide configuration management plan, working with system owners to align system configuration management plans with the enterprise plan.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.10We recommend that the HHS OCIO work with the OPDIVs to ensure that all ODPIVs conduct background checks on all personnel with information system access before they are granted access. The OPDIV should also conduct reinvestigations on these individuals in accordance with current personnel security policy.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.11We recommend that the HHS OCIO work with the OPDIVs to ensure that all ODPIVs create and implement a process to require privileged users to sign a privileged user rules of behavior agreement for all systems prior to provisioning privileged access to those systems.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.12We recommend that the HHS OCIO work with the OPDIVs to ensure that all ODPIVs establish a repository to retain signed copies of privileged user rules of behavior agreements for holders of privileged access for all systems.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.13We recommend that the HHS OCIO work with the OPDIVs to ensure that all ODPIVs ensure implementation of strong authentication mechanisms for privileged and non-privileged users to all OPDIV systems using multifactor PIV credentials, NIST 800-63 Identity Assurance Level 3/Authenticator Assurance Level 3/Federated Assurance Level 3 credential or other strong authentication for non-privileged and privileged users.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.14We recommend that the HHS OCIO periodically sample systems to ensure that PIAs are created and maintained for all systems that require one.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Non-Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.15We recommend that the HHS OCIO work with the OPDIVs to ensure that all PIAs are reviewed, approved and signed by the appropriate HHS personnel at a minimum within three (3) years of the last PIA approval date.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.16We recommend that the HHS OCIO work with the ODPIVs ensure that OPDIVs' security management improve their processes to consistently and accurately track training to ensure that everyone has taken the training prior to granting them system access. Obtain and retain training certificates as evidence of completed training.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.17We recommend that the HHS OCIO work with the ODPIVs ensure that role-based training is obtained for all users with significant security responsibilities before granting access to the system and annually thereafter.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.18We recommend that the HHS OCIO work with the ODPIVs ensure that a process be designed and implemented that ensures the collection and maintenance of artifacts evidencing the successful completion of annual RBT for all users with significant security responsibilities.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.19We recommend that the HHS OCIO work with the OPDIVs to ensure that they plan and execute resource staffing such that ATOs are kept up to date without a lapse of authorization.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.20We recommend that the HHS OCIO work with the OPDIVs to ensure that they obtain waiver or acceptances of risk approved by senior OPDIV management for those systems continuing to operate in the production environment without authorization.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.21We recommend that the HHS OCIO work with the OPDIVs to ensure that they plan and execute resource staffing such that SCAs are kept up to date as needed to support the ATO process.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.22We recommend that the HHS OCIO work with the OPDIV to define a threat profiling framework that structures and standardizes threat profiling at the OPDIV.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.23We recommend that the HHS OCIO work with the OPDIV to implement threat profiling techniques within the defined framework that helps management understand where the OPDIV's high-value assets are located, who could be interested in taking control of them, and what attack vectors and under which scenarios they would likely be used to exploit vulnerabilities to succeed in their pursuits.- Status
- Closed Implemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.24We recommend that the HHS OCIO require each OPDIV to develop a POA&M to implement activities required to achieve an effective maturity level for contingency planning, pending HHS risk assessment.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No
20-A-18-084.25We recommend that the HHS OCIO work with the OPDIVs to monitor and validate each OPDIV's implementation progress, which should include periodically sampling HHS systems to ensure the effectiveness of contingency plans, including adequate testing based on system categorization.- Status
- Closed Unimplemented
- Responsible Agency
- OCR
- Response
- Concur
- Potential Savings
- -
- Last Update Received
- -
- Closed Date
- 07/20/2021
- Legislative Related
- No