A development team integrates a third-party open-source library that processes customer PII. Six months later, a critical vulnerability is disclosed in that library. The vendor has not released a patch. Business stakeholders resist removing the library because it powers a revenue-generating feature. What is the MOST appropriate action?
A. Implement compensating controls around the vulnerable component and document the accepted risk
B. Fork the library and develop an internal patch
C. Escalate to the risk owner for a formal risk acceptance decision
D. Immediately remove the library and disable the affected feature