Control: ism-1564; Revision: 0; Updated: May-20; Applicability: ALL; Essential Eight: N/A
At the conclusion of a security assessment for a system, a plan of action and milestones is produced by the system owner.
At the conclusion of a security assessment for a system, a plan of action and milestones is produced by the system owner.