Business Continuity- Identify Needed Controls and Programs Research and specify security controls needed to close the security gaps in BRI. Also, be sure to include a description of the following programs for securing BRI: You should justify the need for the agency to invest in your recommendations. Document your findings and recommendations from this step in the “Interim Security Recommendations Report.”