One Tech, a federal organization, has implemented a continuous monitoring program following the NIST guidelines. A recently detected configuration change in one of their information systems could potentially impact the system's security controls. What should One Tech do next?