Identification and authentication policy
procedures addressing authenticator management
security categorization documentation for the system
security assessments of authenticator protections
risk assessment results
system security plan
other relevant documents or records