crisc video for a risk assessment has been completed on an application and reported to the application owner. The report includes validated vulnerability
A risk assessment has been completed on an application and reported to the application owner. The report includes validated vulnerability findings that require mitigation. Which of the following should be the NEXT step?