crisc video for an organization recently received an independent security audit report of its cloud service provider that indicates significant control
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?