Watch this video on YouTube
As a security professional conducting a routine audit, you uncover variances from the established security baselines. What should be your immediate course of action upon identifying these discrepancies?