Requiring documentation that the finding will be addressed within the new system is the best course of action for a follow-up audit. An IS auditor should obtain evidence that the complex security vulnerability of low risk will be resolved in the new system and that there is a reasonable timeline for its implementation. The other options are not appropriate courses of action, as they may be too costly, time-consuming, or impractical for a low-risk finding. References: * CISA Review Manual (Digital Version), Chapter 2, Section 2.5.31 * CISA Review Questions, Answers& Explanations Database, Question ID 209