|
You are subscribed to Reports for Department of State OIG. This information has recently been updated, and is now available. 09/29/2023 10:38 AM EDT
What OIG Audited OIG conducted this audit to determine whether the Department managed the use of temporary structures at overseas posts in compliance with applicable physical security standards and procedures, including maintaining an accurate and complete inventory of temporary structures used for residential and office purposes. OIG conducted testing on six overseas posts. What OIG Recommends What OIG Found The deficiencies identified occurred primarily because the Department did not establish adequate internal controls to oversee the use of temporary structures. Specifically, the Department did not formally and consistently define temporary structures or develop adequate policies and processes. Additionally, the Department did not have a mechanism to determine the inventory of temporary structures at overseas posts. For example, RPA identifies structures by their functional use and does not differentiate among temporary, non-permanent, and permanent structures at post. Furthermore, controls are needed to (a) guide the recording, categorization, and verification of temporary structure information in RPA; (b) reconcile data between databases; (c) address issues identified in physical security surveys; and (d) address issues related to unauthorized use of shipping containers at posts. Until these deficiencies are addressed, the Department will have inaccurate and incomplete information about the types of structures and related security deficiencies at posts and have limited assurance that physical security mitigation actions have been taken to address security and life safety concerns. OIG also found a backlog of more than 800 incomplete physical security surveys as of May 2023, involving both permanent and temporary structures. Factors including a new physical security survey database, the COVID-19 pandemic, and ineffective internal coordination have contributed to the backlog. As a result, security deficiencies may not be appropriately prioritized or remediated in a timely manner.
|
|||||