Watch this video on YouTube
While reviewing the company's new cloud storage policy, you identify that there are no guidelines on data encryption at rest. What should be your immediate action as the Information Security Manager?