In addition to authorization boundary diagrams, Mission Owners are often required to list out each asset in the system in a static hardware/software list; mapping the machine hostname to the network IP. When using Auto Scaling, a recommended approach is to list the Auto Scaling ...
As the government becomes more and more dependent upon commercial-off-the-shelf information technologies, products, and networks/infrastructure, it will become more vulnerable to the infowar threat. This vulnerability includes denial of service or data corruption that could result form malicious code ...
You requested that we review DOD's 2006 report on predatory lending practices. Specifically, we evaluated DOD's approach and support in preparing its mandated report on predatory lending practices. This report documents findings that we briefed to your offices on August 17, 2007. Enclosure I ...