The list should include items such as host names, IP addresses, functions, data flow diagrams, network diagrams, system hardware inventory, logging and authentication information — anything that ...