ig_recommendations
Data license: Public Domain (U.S. Government data) · Data source: Federal Register API & Regulations.gov API
6 rows where report_id = "2025-audit-cfpbs-information-security-program"
This data as json, CSV (advanced)
Suggested facets: significant
| Link | rowid ▼ | report_id | rec_number | significant | text | questioned_costs | funds_for_better_use |
|---|---|---|---|---|---|---|---|
| 33 | 33 | 2025 Audit of the CFPB's Information Security Program 2025-audit-cfpbs-information-security-program | 1 | No | Determine what enterprise risk management roles, responsibilities, and strategy components should be defined and leveraged for the development and maintenance of cybersecurity profiles. | 0 | 0 |
| 34 | 34 | 2025 Audit of the CFPB's Information Security Program 2025-audit-cfpbs-information-security-program | 2 | No | Develop and maintain cybersecurity risk registers to aggregate, normalize, and prioritize cybersecurity risks. | 0 | 0 |
| 35 | 35 | 2025 Audit of the CFPB's Information Security Program 2025-audit-cfpbs-information-security-program | 3 | Yes | Develop policies and procedures to create and maintain cybersecurity profiles. | 0 | 0 |
| 36 | 36 | 2025 Audit of the CFPB's Information Security Program 2025-audit-cfpbs-information-security-program | 4 | No | Perform a review of previously granted risk acceptance memorandums to determine whether they were based on a complete review of the system or common controls (as required by National Institute of Standards and Technology Special Publication 800-37, Revision 2) and perform additional risk analysis and/or compensating controls as needed for affected systems. | 0 | 0 |
| 37 | 37 | 2025 Audit of the CFPB's Information Security Program 2025-audit-cfpbs-information-security-program | 5 | No | Ensure that risk acceptance memorandums reflect an assessment of qualitative and quantitative cybersecurity risks, as applicable. | 0 | 0 |
| 38 | 38 | 2025 Audit of the CFPB's Information Security Program 2025-audit-cfpbs-information-security-program | 6 | No | Evaluate options to perform ongoing information continuous monitoring activities commensurate with the current threat environment. | 0 | 0 |
Advanced export
JSON shape: default, array, newline-delimited
CREATE TABLE ig_recommendations (
report_id TEXT REFERENCES ig_reports(report_id),
rec_number TEXT,
significant TEXT,
text TEXT,
questioned_costs INTEGER DEFAULT 0,
funds_for_better_use INTEGER DEFAULT 0
);
CREATE INDEX idx_ig_rec_report ON ig_recommendations(report_id);
CREATE INDEX idx_ig_rec_sig ON ig_recommendations(significant);