Identification and authentication policy
system security plan
procedures addressing authenticator management
system design documentation
system configuration settings and associated documentation
logical access scripts
application code reviews for detecting unencrypted static authenticators
other relevant documents or records