Identification and authentication policy
system security plan
procedures addressing device identification and authentication
system design documentation
list of devices requiring unique identification and authentication
device connection reports
system configuration settings and associated documentation
other relevant documents or records