An IS auditor was involved in the design phase for a new system's security architecture. For the planned post-implementation audit, which of the following would be the MOST appropriate course of action for the auditor?
A. Have another auditor review the security architecture.
B. Disclose the independence issues in the audit report.
C. Change the audit scope to exclude security architecture.
D. Postpone the post-implementation audit to a later date.
A. Have another auditor review the security architecture.
B. Disclose the independence issues in the audit report.
C. Change the audit scope to exclude security architecture.
D. Postpone the post-implementation audit to a later date.