A global manufacturing firm is under pressure to adopt a new AI-based supply chain optimization tool from a startup to remain competitive. The startup refuses to allow a third-party security audit of its source code, citing intellectual property protection, but offers a standard Service Level Agreement (SLA) with 99.9% availability. What is the BEST approach for the Security Manager to manage the risk of this acquisition?
Options:
A. Negotiate a "Software Escrow" agreement and include specific "Right to Audit" clauses in the final contract.
B. Require the startup to provide a recent SOC 2 Type II report and a summary of their last penetration test.
C. Implement a "Sandboxed" environment for the software to run in isolation from the corporate network.
D. Conduct a "Vendor Risk Assessment" to determine the criticality of the data the software will process.