Select the security controls for a system and document the functional description of the planned control implementations in a security plan.