Your organization is migrating legacy on-premises applications to a multi-cloud environment. The security team discovers that several applications use hardcoded service account credentials that cannot be easily refactored before the migration deadline. Business leadership refuses to delay the timeline. What is the BEST approach?
A. Migrate as planned and prioritize credential refactoring in the next sprint
B. Implement secrets management and network segmentation around the vulnerable applications
C. Present the risk formally to leadership with compensating control options and timeline impacts
D. Reject the migration for applications with hardcoded credentials until remediation is complete