System and communications protection policy
procedures addressing boundary protection
personally identifiable information processing policies
list of key internal boundaries of the system
system design documentation
system configuration settings and associated documentation
enterprise security and privacy architecture documentation
system audit records
system security plan
privacy plan
personally identifiable information inventory documentation
data mapping documentation
other relevant documents or records