System and information integrity policy
system and information integrity procedures
procedures addressing system monitoring tools and techniques
system design documentation
system monitoring tools and techniques documentation
system configuration settings and associated documentation
list of inappropriate or unusual activities with security and privacy implications that trigger alerts
suspicious activity reports
alerts provided to security and privacy personnel
system monitoring logs or records
system audit records
system security plan
privacy plan
other relevant documents or records