This is a dedicated watch page for a single video.
While reviewing a security control, the information system security officer (ISSO) discovers that an unauthorized change has been made to the security control. What should the ISSO do in this situation?