This is a dedicated watch page for a single video.
XYZ Corporation has engaged a third-party auditor to conduct an assessment of its security and privacy controls. During the assessment, the auditor identifies several deficiencies in the company's access control processes. Which of the following is the most appropriate course of action for XYZ Corporation?