Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
A . Escalation processes
B . Security audit reports
C . Technological capabilities
D . Recovery time objective (RTO)
Answer: C