System and communications protection policy
procedures addressing cryptographic protection
system design documentation
system configuration settings and associated documentation
cryptographic module validation certificates
list of FIPS-validated cryptographic modules
system audit records
system security plan
other relevant documents or records