Your company relies on a critical SaaS provider for customer onboarding. During a routine review, you learn the provider has added a new sub-processor in a high-risk jurisdiction. Your current contract lacks explicit audit/assessment rights for sub-processors, and the business cannot tolerate downtime on this service.
What should the security manager do FIRST?
A. Issue a risk exception and document acceptance until renewal.
B. Perform a targeted supplier risk assessment focused on the new sub-processor and data flows.
C. Terminate the relationship and move to a contingency provider.
D. Purchase cyber insurance to transfer exposure.