The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
2024-OE-0002a | December 11, 2024
Fiscal Year 2024 Federal Information Security Modernization Act of 2014 Penetration Test
Chief Information Officer
- Status2024-OE-0002a-05OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
- Status2024-OE-0002a-06OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2024-OE-0002a-07OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2024-OE-0002a-08OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2024-OE-0002a-09OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2024-OE-0002a-10OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2024-OE-0002a-11OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2024-OE-0002a-12OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2024-OE-0002a-13OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
2025-FO-0003 | November 15, 2024
Audit of the U.S Department of Housing and Urban Development’s Fiscal Years 2024 and 2023 Financial Statements
Community Planning and Development
- Status2025-FO-0003-001-BOpenClosed
We recommend that the Deputy Assistant Secretary for Operations of Community Planning and Development enhance CPDs existing Grant Accrual Standard Operating Procedures to strengthen governance within CPD and to effectively work within the framework established by the OCFO in recommendation 1A. The updated procedures should include increased ownership and oversight over the reviews, authorizations, approvals, and changes to the CPD grant accrual estimates and methodology.
2024-OE-0002 | October 29, 2024
HUD FY 2024 Federal Information Security Modernization Act (FISMA) Evaluation Report
Chief Information Officer
- Status2024-OE-0002-01OpenClosed
HUD OCIO should a) resolve the conflicts between its Inventory of Automated Systems (IAS) policy and web applications policy to clarify if web applications will be inventories in IAS, the web application Sharepoint site, or both; and b) implement the chosen resolution to this conflict to develop a consistent inventory of web applications (IG FISMA metric 1).
- Status2024-OE-0002-02OpenClosed
HUD OCIO should implement an automated governance, risk, and compliance tool to manage risk from all sources across the three tiers of the organization in a timely manner. This recommendation updates FY 2021 FISMA recommendation number 5 (IG FISMA metrics 5, 9, and 10).
- Status2024-OE-0002-03OpenClosed
HUD OCIO should employ automation to maintain a timely and accurate view of security configuration information for all systems connected to its network (IG FISMA metric 20).
- Status2024-OE-0002-04OpenClosed
HUD OCIO should demonstrate that it can implement its defined security responses if a baseline configuration is changed without authorization. This can be shown by either a response to a real incident if one happens or through a testing exercise if there are no applicable incidents (IG FISMA metric 23).
- Status2024-OE-0002-05OpenClosed
HUD OCIO should review its security training program and determine whether it should provide general cybersecurity awareness training to external users of its systems and data (IG FISMA metric 44).
2024-LA-0001 | September 17, 2024
HUD Grantees Need to Enhance Monitoring of ESG CARES Act Subrecipients
Community Planning and Development
- Status2024-LA-0001-001-AOpenClosed
Take corrective action for the subrecipient monitoring and agreement issues cited for eight of the ESG-CV grantees reviewed, and provide additional guidance and technical assistance as needed to ensure that they understand requirements.
- Status2024-LA-0001-001-BOpenClosed
Develop and implement additional subrecipient monitoring training and guidance for all ESG grantees.
2024-LA-1002 | August 06, 2024
The City and County of Honolulu Should Improve Its Fraud Risk Management Practices for Its ESG CARES Act Program
Community Planning and Development
- Status2024-LA-1002-001-AOpenClosed
Improve or enhance its antifraud efforts for the ESG program and incorporate fraud risk management practices that are consistent with the best practices identified in the Government Accountability Office’s A Framework for Managing Fraud Risks in Federal Programs and Chief Financial Officers Council and Treasury Bureau of the Fiscal Services’ Antifraud Playbook.
- Status2024-LA-1002-001-BOpenClosed
Obtain training or technical assistance as needed on the implementation of fraud risk management practices.
2024-LA-1001 | August 02, 2024
Housing and Community Development Should Improve Its Fraud Risk Management Practices for Its ESG CARES Act Program
Community Planning and Development
- Status2024-LA-1001-001-AOpenClosed
Establish a separate fraud risk management framework or evaluate and build upon its ERM framework by incorporating fraud risk management practices that are consistent with the principles of GAO’s Standards for Internal Control in the Federal Government (Green Book), including developing a fraud risk management framework in alignment with best practices identified in GAO’s A Framework for Managing Fraud Risks in Federal Programs and the Chief Financial Officers Council’s Antifraud Playbook.