After system changes, verify that the impacted controls are operating as intended, meeting the security requirements for the system.