Identification and authentication policy
procedures addressing authenticator management
system security plan
system design documentation
system configuration settings and associated documentation
PKI certification validation records
PKI certification revocation lists
other relevant documents or records