You are an information system auditor of HDA Inc. You are auditing and evaluating the most efficient method to detect unauthorized changes to production programs in an environment that automatically reports all program changes. What would be the optimal approach or technique for efficiently detecting unauthorized changes to production programs in this scenario?