A business unit requests an exception to bypass multifactor authentication for a legacy system that cannot support it without a costly upgrade.
The system processes sensitive but non-regulated data, and no active exploits are known.
What should the security manager do FIRST?
A. Deny the request and mandate immediate MFA implementation
B. Perform a risk assessment and formally document risk acceptance
C. Approve the exception indefinitely due to technical limitations
D. Compensate by increasing network monitoring without documentation