Access control policy
procedures addressing least privilege
list of software that should not execute at higher privilege levels than users executing software
system design documentation
system configuration settings and associated documentation
system audit records
system security plan
other relevant documents or records