Access control policy
procedures addressing access enforcement
system design documentation
system configuration settings and associated documentation
list of approved authorizations (user privileges)
system audit records
system security plan
privacy plan
other relevant documents or records