Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
A. Escalation processes
B. Security audit reports
C. Technological capabilities
D. Recovery time objective (RTO)
A. Escalation processes
B. Security audit reports
C. Technological capabilities
D. Recovery time objective (RTO)