Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.