Error status

TIGTA's previous website is temporarily unavailable. We are providing this interim website to keep you informed about our latest reports and how you can submit a complaint or report fraud, waste, and abuse within IRS programs or by IRS employees.

Breadcrumb

The External Network Perimeter Was Generally Secure, Though the Security of Supporting Components...

The Chief Information Officer should ensure that comprehensive and accurate inventories of information system components are maintained, including the GSS-1 inventory, that include the level of granularity necessary for tracking and reporting, and should implement improved procedures for ensuring that the inventory remains accurate and up-to-date.