Identification and authentication policy
procedures addressing authenticator management
system security plan
list of individuals having accounts on multiple systems
list of security safeguards intended to manage risk of compromise due to individuals having accounts on multiple systems
other relevant documents or records