Configuration management policy
procedures addressing security impact analyses for changes to the system
procedures addressing privacy impact analyses for changes to the system
configuration management plan
security impact analysis documentation
privacy impact analysis documentation
privacy impact assessment
privacy risk assessment documentation
analysis tools and associated outputs system design documentation
system architecture and configuration documentation
change control records
procedures addressing the authority to test with PII
system audit records
documentation of separate test and operational environments
system security plan
privacy plan
other relevant documents or records