Document changes to planned security control implementation and establish the configuration baseline for a system.