Final answer:
The security consultant should require the solution owner to accept the identified risks and consequences of the project, which includes hosting data outside of the company's geographical location. Formal documentation of this acceptance is necessary, aligning with recognized privacy principles and ensuring clear communication.
Step-by-step explanation:
As the security consultant of the project, the recommended NEXT step is to require the solution owner to accept the identified risks and consequences. Since no sensitive data will be hosted and the number of users accessing the system will be small, the risks may be considered acceptable. However, it is crucial to document this acceptance formally to ensure that the solution owner is aware of the potential risks involved with the data being hosted and managed outside of the company's geographical location. This can help in aligning with the Personal Data Notification & Protection Act of 2017 that emphasizes the importance of addressing security breaches by defining them comprehensively.
The procurement process concludes with lessons learned, but this step usually comes after the project's completion rather than during the final negotiation phase. Eliciting buy-in from the solution owner on the identified risks aligns with best practices in project management, allowing for clear communication and agreement before moving forward.