This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc., and you are auditing the effectiveness of information security controls implemented by a third-party service provider. What provides the best evidence that the service provider's information security controls are effective?