Appearance
At the conclusion of a security assessment for a system, a plan of action and milestones is produced by the system owner.