This is a dedicated watch page for a single video.
During a physical access audit, you discover that the organization has no documented procedures for responding to security incidents involving unauthorized physical access. What steps would you recommend to address this gap in the security program?