Watch this video on YouTube
OneTech's information system has just undergone a security control assessment, and several weaknesses have been identified. Which document should be created to outline the necessary steps to remediate these weaknesses?