The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
2023-OE-0001a | December 20, 2023
Fiscal Year 2023 Federal Information Security Modernization Act of 2014 Penetration Test Evaluation Report
Chief Information Officer
- Status2023-OE-0001a-02OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
- Status2023-OE-0001a-03OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2023-OE-0001a-05OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
- Status2023-OE-0001a-06OpenClosedSensitiveSensitive
Sensitive information refers to information that could have a damaging import if released to the public and, therefore, must be restricted from public disclosure.
The OIG has determined that the contents of this recommendation would not be appropriate for public disclosure and has therefore limited its distribution to selected officials.
2023-BO-0002 | March 30, 2023
HUD Could Improve Its Field Service Management Quality Assurance Surveillance Plans
Chief Procurement Officer
- Status2023-BO-0002-001-AOpenClosedClosed on January 06, 2025
We recommend that the Chief Procurement Officer direct the contracting officers to review the current FSM contracts’ QASP and update accordingly to ensure that all minimum contract requirements are included.
- Status2023-BO-0002-001-BOpenClosedClosed on January 06, 2025
We recommend that the Chief Procurement Officer direct the contracting officers to oversee the implementation of the current FSM contracts’ QASP.
- Status2023-BO-0002-001-COpenClosedClosed on January 06, 2025
We recommend that the Chief Procurement Officer require the contracting officers to implement the policies and procedures in the HUD Acquisition Policy and Procedure Handbook for completion of HUD’s FSM contractor performance assessment reports in CPARS to ensure that Government past performance is documented properly and in a timely manner, at least annually, for use by all Federal agencies and maintained in the contract files.
- Status2023-BO-0002-001-DOpenClosedClosed on January 06, 2025
We recommend that the Chief Procurement Officer require all staff involved in the oversight of FSM contracts to maintain the required documentation in the official contract file identified by HUD policy to support the contracts.
- Status2023-BO-0002-001-FOpenClosedClosed on January 06, 2025
We recommend that the Chief Procurement Officer require the contracting officers to formally designate CORs in a timely manner and maintain the required documentation in the proper location identified in the relevant HUD policies and procedures, which fully supports the CORs’ oversight of the FSM contract.
2021-OE-0007 | February 17, 2023
HUD’s Robotic Process Automation Program Was Not Efficient or Effective
Chief Information Officer
- Status2021-OE-0007-01OpenClosed
Identify short- and long-term plans for the RPA program that align its capabilities, staffing needs, funding projections, and mission needs.
- Status2021-OE-0007-02OpenClosed
Implement procedures to capture and monitor centralized logs to maintain appropriate visibility into bot activities and provide for auditability of bot actions.
- Status2021-OE-0007-03OpenClosed
Implement procedures to periodically review RPA system access and remove access for users that are not authorized or no longer have a need to use the system.
- Status2021-OE-0007-04OpenClosed
Implement procedures to ensure that attended bots use the security rights and credentials of the attending user.
2023-FO-0008 | January 24, 2023
Assessment of HUD’s IT Infrastructure To Support Extensive Telework
Chief Information Officer
- Status2023-FO-0008-001-AOpenClosedClosed on May 24, 2023
Research, evaluate, and implement technical or alternative solutions to deploy essential computer software updates using appropriate secure methods to ensure that computer security updates occur in a timely manner to minimize risk to HUD’s systems and operations
- Status2023-FO-0008-002-AOpenClosedClosed on May 24, 2023
Research, evaluate, and implement technical solutions to provide additional improvements to VPN and related remote working capabilities of HUD system users.
- Status2023-FO-0008-002-BOpenClosedClosed on May 24, 2023
Perform routine VPN stress tests as part of its contingency planning and testing processes to regularly identify and remediate network performance issues and ensure that network capabilities are sufficient for teleworking.
- Status2023-FO-0008-003-AOpenClosedClosed on October 02, 2024
Research, evaluate, and implement technical solutions to resolve the user account management issues and the underlying issue in the technical environment.
- Status2023-FO-0008-004-AOpenClosedClosed on August 26, 2025
Assess its help desk system against other technical solutions and ensure that the help desk solution used captures complete data on technical support requests. This measure includes but is not limited to ensuring that sequence gaps are properly documented or do not occur, valid transactions are accepted by the help desk system, rejected transactions are identified, and the history of each transaction is retained.
2022-OE-0001 | September 30, 2022
HUD FY 2022 Federal Information Security Modernization Act (FISMA) Evaluation Report
Chief Information Officer
- Status2022-OE-0001-01OpenClosed
HUD OCIO should implement procedures to ensure that information in cybersecurity risk registers is obtained accurately, consistently, and in a reproducible format and is used to a. quantify and aggregate security risks, b. normalize cybersecurity risk information across organizational units, and c. prioritize operational risk response (derived from metric 5).
- Status2022-OE-0001-02OpenClosed
HUD OCIO and the HUD Chief Risk Officer should coordinate to implement procedures to monitor the effectiveness of cybersecurity risk responses to ensure that risk tolerances are maintained at an appropriate level (derived from metric 5).